Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
The Compliance Challenge: Managing Legal & Regulatory Risk
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
Polsinelli Podcasts - FDA Denies Amgen Citizen Petition in Biosimilar Dispute
FCPA Compliance and Ethics Report-Episode 51-Interview with Tim Haidar
ACADEMI's Suzanne Rich Folsom and PwC's Glenn Ware on Moral Hazard
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
On March 12, 2024, the Department of Defense (DoD) finalized a rule to open its Defense Industrial Base (DIB) Cybersecurity (CS) Program to all defense contractors who own or operate an unclassified information system that...more
Canadian Institute’s Law of Policing Conference, Eastern Edition, returns to Mississauga with the latest updates on how policing is progressing in Canada. Join this conference for two days of meaningful conversations and...more
For years, federal cyber policy has been based on successful public-private partnerships, collaboration, and the promotion of voluntary standards that can be tailored to sector and organization-specific risk and needs....more
This week, the New York State Department of Financial Services (NYDFS) issued the Report on the SolarWinds Cyber Espionage Attack and Institutions’ Response....more
Seyfarth Synopsis: As the COVID-19 pandemic continues to spread and affect our lives and businesses across the U.S., we are continually following the latest updates and providing insight. ...more
Department of Homeland Security Warns of Cyber-Attacks by Iran - The Department of Homeland Security (DHS) issued a grave warning to U.S. businesses and critical infrastructure operators on January 6, 2020, alerting the...more
The Cybersecurity Information Sharing Act of 2015 (CISA) was intended to incentivize private entities to share threat intelligence information with the federal government (specifically the Department of Homeland Security),...more
Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more
On December 14, the Financial Stability Oversight Council (FSOC), which was established by the Dodd-Frank Act to analyze and mitigate potential threats to the financial sector, released its first report under the Trump...more
New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more
The Financial Crimes Enforcement Network, or FinCEN, an arm of the United States Department of the Treasury, issued an advisory last week to remind financial institutions of their obligations to report cyber-events on...more
When President Obama signed into law the Cybersecurity Act of 2015, which was designed to facilitate information sharing on cybersecurity threats between the public and private sectors, proponents hailed it as “our best...more
On June 15, the Department of Homeland Security (DHS) and the Department of Justice (DOJ) jointly issued final guidance on how the private sector and government will communicate cyber threat data and defensive measures under...more
Following a series of thefts from international banks utilizing the Society for World Interbank Financial Telecommunication (SWIFT) communication system, the Chief Executive Officer of SWIFT announced a sweeping five part...more
After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more
Part of Bradley Arant’s Privacy and Information Security Team’s seven-part Data Breach Toolkit Webinar Series, the “Data Breach Response Planning: Laying the Right Foundation” webinar, led by Paige Boshell and Amy Leopard,...more
Twelve automakers that make up the Alliance of Automobile Manufacturers (AAM) have agreed to form an information sharing and analysis center (Auto ISAC) that will facilitate the sharing of cyber security data to stay abreast...more
Having strong cybersecurity policies is critical for protecting a company's business, as the amount of commerce conducted over networks and the Internet increases each year. Last month the Congressional Research Service...more