Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

SSO – Single Sign On

Due to recent high profile data breaches users have a heightened awareness of security and how they manage or don’t manage their various account credentials. People are beginning to pay more attention to the advice given to...more

Cyber Security Takes Centre Stage in UK Government’s Strategy

The UK Department for Culture, Media and Sport recently released a statement on cyber security, in which it urged businesses to take better care to protect against cyber criminals. This statement follows publication of its...more

LinkedIn Grapples with the Ripples of a 2012 Data Breach

Last week on the official LinkedIn blog, the company’s chief information security officer, Cory Scott, reported the company had become aware of an additional set of data that has just been released consisting of e-mail and...more

EU Council adopts cybersecurity directive – new rules on security requirements and incident reporting

Background - On 17 May, 2016 the Council of the European Union, which comprises representatives of the Member States’ national governments, formally adopted the Network and Information Security Directive (“Directive“). ...more

A New Cybersecurity Regime and a New Regulation to Mandate Secure Information Systems for Government Contractors

Congress has enacted a recent wave of legislation to address ongoing cybersecurity threats; the Executive Branch, on May 12, 2016, adopted new cybersecurity regulations; and other Federal initiatives are underway and will...more

CSBS Publishes Annual Report

Recently, the Conference of State Bank Supervisors (CSBS) published its 2015 Annual Report to provide an overview of its activities and initiatives in 2015. The report highlights that, throughout 2015, state regulators (i)...more

Recent Investment Management Developments - May 2016

Below is a summary of recent investment management developments that affect registered investment companies, private equity funds, hedge funds, investment advisers, and others in the investment management...more

NAIC Report: 2016 Spring National Meeting

The National Association of Insurance Commissioners (NAIC) held its 2016 Spring National Meeting from April 1 through April 6 in New Orleans, Louisiana. As host, Louisiana provided beautiful weather and bountiful great food....more

Senate hearing reviews ransomware in a school system

On May 18, the Senate Judiciary Committee Subcommittee on Crime and Terrorism heard from Charles C. Hucks, the Executive Director of Technology for the Horry County, South Carolina, School System. The 52 schools and the...more

Data Breaches: Are You Ready (for the inevitable)?

In 2015, identity theft occurred every two seconds, disrupting the lives of 13.1 million people, according to Javelin Strategy and Research. Year after year, U.S. data breaches have hit record highs, reports the Identity...more

Employee Data Security: Perquisite or Prerequisite?

One of the many costs of doing business in this day and age is the threat of a data breach. In the past several years data breach incidents have occurred with increasing frequency. From Target to eBay and Sony to Ashley...more

Mobile apps under close watch of the Kong Kong Privacy Commissioner

The Hong Kong Privacy Commissioner has taken a keen interest in promoting and ensuring the privacy compliance and security of mobile apps. On 21 April 2016, the Office of the Privacy Commissioner for Personal Data (the PCPD)...more

Dual Decisions Provide Narrow Path for Plaintiffs to Establish Standing in Data Breach and Cybersecurity Suits

Last week, decisions by the United States Supreme Court and the Northern District of Georgia provided further guidance regarding the narrow path required for a class action plaintiff to successfully establish Article III...more

A Weak Link In Financial Data Security? Congress Presses FDIC On Its Data Breach Prevention And Response

On Thursday, May 12, the House of Representatives’ Science, Space, and Technology Committee scrutinized the FDIC’s data, privacy and security measures and response plans in a hearing, after the FDIC suffered a spate of data...more

Tough New EU-Wide Cybersecurity Rules in Prospect: The Network and Information Security Directive

Two-thirds of large UK companies have come under cyber attack in the past year, according to the UK Government, and a quarter have been attacked at least once a month. But only half have taken any recommended actions to...more

The Network and Information Security Directive: Serious Cyber Attacks Will Require Notification

The Council of the European Union adopted the EU Network and Information Security (NIS) Directive (the ‘Directive’) 17 May, ready for final adoption by the European Parliament. The Directive, initially proposed in 2013, has...more

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

Treasury Department Issues Marketplace Lending Report

On May 10, the U.S. Department of the Treasury (hereafter, Department or Treasury) released a report on “Opportunities and Challenges in Online Marketplace Lending.” The result of Treasury’s July 20, 2015 Request for...more

Corporate and Financial Weekly Digest - Volume XI, Issue 20

SEC/CORPORATE - SEC Division of Corporation Finance Issues 12 New and Revised C&DIs Regarding Non-GAAP Measures - As noted in the May 13 edition of Corporate and Financial Weekly Digest, SEC Chair Mary Joe White,...more

European Council Adopts the Network and Information Security Directive

On May 17, 2016, the European Council formally adopted its position at first reading of the Network and Information Security Directive (“NIS Directive”). The objective of the NIS Directive is to increase cooperation between...more

Most Frequently Hacked Industries Now Includes Manufacturing

Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more

TeslaCrypt Ransomware Developers Retire, Release Master Decryption Key

Ransomware is a particularly nefarious type of malware that hijacks computers and forces victims to pay a ransom in order to access their files. One of the reasons it is so successful is because ransomware developers use...more

Are You Secure?

U.S. Securities and Exchange Commission (“SEC”) Chair Mary Jo White confirmed Tuesday that cyber security is the biggest risk currently facing the financial system. Her strong warning of the threat posed by hackers follows...more

UK Financial Regulatory Developments - May 2016 #11

The Law Society responds to ESMA’s EU MAR consultation - The Law Society has published the Law Society and City of London Law Society Company Law Committees Joint Market Abuse Working Party’s response to ESMA’s...more

Cybersecurity, Boards and Cyber-Board “Experts”: Caution Should Rule

A continuing frequent question from public companies is how a board should be constituted to oversee cybersecurity. Many public companies foist this additional burden on the audit committee. Those large enough to have a...more

3,093 Results
|
View per page
Page: of 124
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×