News & Analysis as of

Risk Assessment Cyber Crimes

J.S. Held

Benefits of a vCISO in the Age of AI-Driven Cyberattacks

J.S. Held on

Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more

Mitratech Holdings, Inc

One of the Millions Impacted in the USDoD Social Security Data Breach? Here’s What to Do Next.

Millions of individuals could be at the mercy of cybercriminals after a hacking group launched a large-scale data breach impacting 2.9 billion records, including Social Security numbers and other sensitive information. The...more

McGlinchey Stafford

Cyberattacks Against U.S. Water Supplies on the Rise: EPA Urges Utilities to Fortify Defenses

McGlinchey Stafford on

The increasing threat of cyberattacks against U.S. water supplies has raised significant concerns among federal officials, who emphatically stress the need for utilities to bolster their cybersecurity measures. A recent...more

Guidepost Solutions LLC

Defending Your Law Firm Against Cyber Threats

In an increasingly digitized world, law firms are prime targets for sophisticated cyber threats that can result in substantial financial losses and reputational damage. Recently, a prominent law firm, esteemed for its...more

Guidepost Solutions LLC

Investment Advisers and Generative AI

Start Planning Now to Reduce Your Increased Money Laundering, Sanctions, and Conflicts of Interest Risks The introduction and use of generative artificial intelligence (GenAI) and predictive data analytics (PDAs) by...more

BakerHostetler

DSIR Deeper Dive: 2023 Crypto Threat Landscape

BakerHostetler on

Following one of the most turbulent years in crypto history, 2023, in contrast, unfolded as a year of reprieve, including from crypto threats. According to a July 12, 2023, report from blockchain analytics firm Chainalysis,...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

Amundsen Davis LLC

Don’t Gamble With Your Cybersecurity and Incident Response Plan: Lessons Learned from the Las Vegas Ransomware Attacks

Amundsen Davis LLC on

Typically, we beat the drum of the need to prepare for a data incident—anything from a full-blown ransomware attack to an employee accidently sharing data with the wrong person—by having your Incident Response Plan developed...more

Epiq

Move it or Lose it – With Cyber Breach Response, Time is of the Essence

Epiq on

There are so many factors that go into breach response. Determining the size of the breach, time limitations, legal requirements, notification needs, urgency for containment, and interrupted business operations are just a...more

Goodwin

Generative AI and Financial Services: A Recent View From the UK Regulator

Goodwin on

In a recent speech, Nikhil Rathi, CEO of the UK Financial Conduct Authority (FCA), set out the FCA’s latest views on the role of artificial intelligence (AI) in financial services. The speech highlights many benefits but also...more

Butler Snow LLP

Cybersecurity: What Businesses Need to Know

Butler Snow LLP on

Cybersecurity is a top concern for all industries, particularly for the pharmaceutical and medical device industries. These industries hold some of the most sensitive data and highly valuable technology, making them prime...more

Shipkevich PLLC

US Treasury Releases Risk Assessment Report on Decentralized Finance

Shipkevich PLLC on

On April 6, 2023, the US Department of the Treasury released a report analyzing the risks of decentralized finance (DeFi) and potential vulnerabilities in the United States' anti-money laundering (AML) and countering the...more

Ankura

The Cybersecurity Insurance Market: What to Expect in 2023

Ankura on

In recent years, especially through 2019 and 2020, the cyber insurance market in the U.S. has seen significant growth. Middle-market companies have been actively requesting cyber insurance policies with low rates and broad...more

StoneTurn

THE INSIDER THREAT: Mitigating Risk Within the DNA of Your Organization

StoneTurn on

Understanding and managing insider risks is not a new discipline. The manifestation of insider-related risks can be disastrous but the fact that these events are caused by people inside an organization rarely receives enough...more

King & Spalding

FBI Sounds Alarm on Cyber Attacks Against Healthcare Payment Processors

King & Spalding on

On September 14, 2022, the Federal Bureau of Investigation (FBI) issued a Private Industry Notification (Notification) warning the industry regarding increasing cyber-attack activity against healthcare providers and payment...more

Porter Hedges LLP

Cybersecurity Risk Management Practices for Small and Midsize Businesses

Porter Hedges LLP on

Cybersecurity is the goliath of tech-related concerns for companies of all sizes, not just large corporations. The Cybersecurity & Infrastructure Security Agency (“CISA”) encourages small and midsize businesses to focus on...more

Benesch

Ransomware Response Complicated by Growing Number of Sanctions in Wake of Russian invasion of Ukraine

Benesch on

Entities facing significant legal risk, no matter the circumstances, if they make ransom payments to attackers connected to, or originating from Russia. As the Russian invasion of Ukraine continues, the U.S. government...more

Health Care Compliance Association (HCCA)

2022 Outlook: More Dangerous Ransomware Coupled With Inadequate Security Practices

Report on Patient Privacy 22, no. 1 (January, 2022) - As the COVID-19 pandemic enters its third year, real “security fatigue” with pandemic-related issues will combine with cybercriminals’ increasingly sophisticated...more

Fox Rothschild LLP

Holiday Weekends Offer No Time Off From Cyber Threats

Fox Rothschild LLP on

Labor Day weekend is upon us. Unfortunately, history has shown that, rather than resting, hackers and other threat actors take advantage of holidays to attack closed or understaffed businesses when they least expect it. To...more

Ballard Spahr LLP

FinCEN Identifies AML/CFT “Priorities” For Financial Institutions

Ballard Spahr LLP on

Breadth of List Undermines Usefulness to Industry - As required by the Anti-Money Laundering Act (“AML Act”), the Financial Crimes Enforcement Network (“FinCEN”) issued on June 30, 2021 the first government-wide list of...more

Proskauer - Employee Benefits & Executive...

U.S. Department of Labor Steps into the Cybersecurity Discussion

Formally wading into the cybersecurity discussion for the first time, on April 14, 2021, the U.S. Department of Labor (DOL) posted on its website a suite of new guidance, including Tips for Hiring a Service Provider with...more

Husch Blackwell LLP

New York’s DFS Publishes A Cyber Insurance Risk Framework

Husch Blackwell LLP on

Keypoint: New York’s Division of Financial Services (DFS) now requires Property and Casualty Insurers writing cyber insurance to comply with the Division’s Cyber Insurance Risk Framework to manage their risk. In her...more

Proskauer on Privacy

SolarWinds Vendor Supply Chain Attack: A Timely Reason to Review Procedures for Risk Assessments and Vendor Contracts

Proskauer on Privacy on

As reported last week, a state-sponsored hacker may have breached multiple U.S. government networks through a widely-used software product offered by SolarWinds. The compromised product, known as Orion, helps organizations...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

McDonnell Boehnen Hulbert & Berghoff LLP

2019 Review of Notorious Markets for Counterfeiting and Piracy

The 2019 Review of Notorious Markets for Counterfeiting and Piracy provides a list of such markets (the NML), of both physical and virtual (online) varieties.  These include...more

40 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide