Employment Law This Week®: Protecting Your Trade Secrets from Insider Threats
In the continuously evolving landscape of cyber threats, organizations must be proactive in identifying and mitigating potential risks to their digital assets and operations. A critical step in building cyber resilience is...more
Navigating the dynamic landscape of insider risk management requires a nuanced understanding of organisational dynamics, culture and regulatory imperatives. The costs (both direct and indirect) of getting it wrong are high,...more
StoneTurn Partner Sarah Keeling and Senior Adviser Richard Mackintosh host a discussion on the evolving risk landscape, examining geopolitical shifts, emerging threats in the Middle East, and the impact of AI on security....more
The concept of “security by obscurity” is officially outdated. In recent years, cyber-attacks have become increasingly sophisticated, destructive, and indiscriminate. In today’s landscape, cyber threats can come from internal...more
Cyberattacks have emerged as a critical threat to trade secret security. This Employment Law This Week Deep Dive episode focuses on cybersecurity and protecting your trade secrets from attacks that occur from inside your...more
Most companies have strengthened their cybersecurity defenses against outside hackers, but many often neglect the equal threat posed by those within their network walls — employees who already have privileged access to...more
Q: In my company, the IT directors see cybersecurity as an IT and software issue to be solved with software and hardware. How do I convince the team that employees need to also be trained on risky behavior – something that...more
Experian Data Breach Resolution sponsored a recently released Ponemon Study entitled “Managing Insider Risk through Training & Culture.” The report is quite timely in light of all of the recent successful W-2 phishing...more
Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more
A recent decision of the United States District Court for the Southern District of New York (the “District Court”), affirming a decision of the United States Bankruptcy Court for the Southern District of New York (the...more
Even as organizations hunker down for a long and expensive siege against attackers from cyberspace, a determined employee with the right kind of access can be as much of a threat, if not more. ...more
With EU Safe Harbor Invalidated, Companies Ask: What Now? - What happens now?: That is the question that businesses across the country are asking after the Court of Justice of the European Union (CJEU) threw out the...more
Greenberg Glusker litigation partner Ricardo Cestero was quoted in a Law360 article, Daily Fantasy Sports Industry Could Fall Apart After Scandal, (subscription required), addressing a customer class action filed against the...more
Last week, the FTC sent a closing letter to Morgan Stanley Smith Barney LLC (“Morgan Stanley”) relating to the agency’s investigation over whether Morgan Stanley engaged in unfair or deceptive acts or practices by failing to...more
Enforcement actions raise potential disclosure concerns for private equity sponsors exploring investments in public companies - Earlier this year, the U.S. Securities and Exchange Commission (“SEC”) announced charges...more
Perhaps it’s the books I’ve been reading or the television shows I’ve been watching, but my mind can’t seem to stop linking the recent barrage of cybersecurity attacks with those ne’er-do-wells that plagued the Caribbean from...more