News & Analysis as of

Data Breach Chief Technology Officer (CTO)

Miller Nash LLP

[Webinar] Panic! at the Firewall: Cyber Incident Response and the Role of Insurance - May 17th, 9:00 am - 10:30 am PDT

Miller Nash LLP on

Cyber incidents are increasing in frequency and severity across all businesses and industries. As the saying goes, it’s not a matter of IF but WHEN an incident will occur. In this webinar we will explore ways that you can...more

Fisher Phillips

Security Breached – Tips for Mitigating and Protecting Private Information from Inside and Outside Threats

Fisher Phillips on

If you’re going to demote or terminate your in-house tech expert, you should plan that event very carefully. Our firm is now helping a client with damage control and data recovery upon discovering – a week after their...more

Thomas Fox - Compliance Evangelist

The Mummy’s Hand and a Risk-Based Approach at the Board Level

Today we consider the 1940’s film, The Mummy’s Hand as the second installment in Universal Pictures series featuring this creature. Boris Karloff departed the role and it was taken over for one film by Tom Tyler, who was...more

Foley Hoag LLP - Security, Privacy and the...

Cybersecurity, Corporate Governance, and Risk Management: Best Practices

As litigators, we help clients resolve conflicts that have matured into disputes. In the realm of cybersecurity, we defend claims brought by private parties or governmental entities against companies facing the fallout from...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide