News & Analysis as of

"Insights Conversations: Cybersecurity"

This past year has been called the "year of the massive data breach," with many high-profile attacks on well-known companies. Skadden partners Cyrus Amir-Mokri, Patrick Fitzgerald, Marc S. Gerber, Stuart D. Levi and Timothy...more

Alert: Five Ways to Reduce Your HIPAA Liability

As of early December 2014, 1,170 security breaches under the Health Insurance Portability and Accountability Act (HIPAA) involving 31 million records had been reported to the U.S. Department of Health and Human Services (HHS)...more

Dealing with High Risk Data

When people think of high risk data, most think of Personal Health Information and Personally Identifiable Information as it relates to HIPAA and the health care industry, but Steve Shebest’s very informative article “High...more

Navigating the Cyber Liability Storm - Part II

Franchisors are facing a precarious three-way intersection of increased accountability and regulation over consumer privacy, the growing volume and sophistication of cyber-attacks on consumer data, and the expanding...more

What Do Employers Need to Know in the Wake of the Latest Data Breach?

Sony Pictures Entertainment, Inc. is the latest high-profile business victim of data theft. The consequences have been significant. In response to threats of violence, Sony has reconsidered its range of options for the...more

On the Sixth Day of Privacy, the hackers gave to Sony……

many more than six different hacks……and headaches…… - With the holiday season in full swing, many of us are struggling with that age-old question: “what do you get for the person who has everything?” Well, if that...more

Five Tips to Help Companies Protect Themselves from Data Breaches

With every swipe of a credit card this holiday season, consumers put their faith in the companies that process and store their information. Yet, it is no secret that data breaches are on the rise, hitting companies large and...more

Ten Common Myths of Data Breach Mitigation and Response

2014 has been dubbed by many as “The Year of the Data Breach.” While data breaches are not new, the recent slew of highly publicized retailer breaches has left companies wondering – If breaches can’t be prevented, why should...more

Cyber-Breach & NISPOM Conforming Change 2 – It’s What’s on the Inside That Counts

Most companies are worried about external threats – things that are coming at their people, their group, their company, their government, all from an outside actor. Like government’s with an eye on counter-intelligence,...more

Data Breach Prevention and Response: Avoiding Potential Pitfalls and Implementing Best Practices to Protect Your Company

In This Presentation: - Overview of data breach landscape - Data breach response ..Technical best practices ..Legal best practices - Data breach prevention ..Technical best practices ..Legal best...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

Information security has continued to play prominently in the news as this series has evolved. Just today AT&T announced a data breach. Home Depot and Jimmy John’s, also added to the list in the past month, are still...more

The General Counsel’s Role Before and After a Data Breach Incident

“It is often said that there are two kinds of companies out there — those that have suffered a data breach and those that will have one,” said Latham & Watkins partner Kevin Boyle. “So it makes a lot of sense to be prepared...more

Federal Financial Regulators Issue Warning on ‘Shellshock’ Security Vulnerability

The Federal Financial Institutions Examination Council (FFIEC) recently issued an alert warning financial institutions of a security vulnerability nicknamed “Shellshock” in software commonly used in servers and other...more

Cyber Risk Insurance: Surging Demand and Evolving Coverage

Cyber risk insurers are doing a brisk business these days. Reports of data breaches abound, and risk managers are understandably looking to offload some of the risk through insurance. As a result, insurers are issuing new...more

The Home Depot Data Breach: There’s No Time Like the Present for Cybersecurity

As Home Depot’s recent cybersecurity breach emphasizes, there is no time like the present to institute controls designed to prevent an attack. In the latest data security breach, Home Depot’s servers were broken into,...more

Information Security Training Master Class: Winning the Battle Against Data Breaches, Malicious and Negligent Employees, and...

Disclaimer: I am a crazy person. I read over 50 articles before I wrote this (WHO DOES THAT) and I’m not even sure how I got so sucked in. In short, information security is a big deal right now – and there are tons of ways to...more

New York AG Reports that Data Breaches Cost New York Businesses over $1B Last Year

The current headline in data security is a just-released report from the New York Attorney General's Office (the "AG Report") announcing that the number of reported data breaches more than tripled between 2006 and 2013,...more

New York Attorney General Report Shows the Number of Data Breaches is on the Rise and Recommends Steps to Take for Protecting...

On July 15, 2014, the New York Attorney General issued a report examining the growing number and costs of data breaches in the state of New York. The report titled, “Information Exposed: Historical Examination of Data...more

To keep data safe, law firms must embrace a culture of security

As the White House report on big data indicates, an enormous amount of information is collected, stored, analyzed and relayed in digitized form over the Internet and, increasingly, using mobile technology. Headlines...more

Survey Shows U.S. Organizations Need More Improvement To Counter Cybercriminals

Despite a surge in both the number of detected cybersecurity incidents and the financial costs associated with such breaches, a new report shows that U.S. organizations lack the necessary defenses to effectively counter...more

Key Questions to Ask When Preparing a Data Breach Response Plan (Part II)

Following up on last week’s post, we return to the wide range of questions about a company’s operations that can guide a team building a data breach response plan to cover many of the risks encountered in the wake of a...more

Cyber-Security Corporate Governance: Three Essential Steps To Form A Cyber-Security SWAT Team

Last year, Canadian Lawyer InHouse Magazine posed the question, "Should in-house counsel be asking more questions about the strength of their company's cyber systems…" and they cited the Association of Corporate Counsel 2012...more

Plugging the Leak: Guidelines for a Data Breach Response Plan

Though data breaches have been on the forefront of many large company’s risk management efforts for a number of years, it has become clear that the threat of a data breach is very real and touches on every business,...more

Cyber Risks for the Boardroom Part 1: The Recent Increase in Focus on Privacy Issues

Each day this week, we are going to explore some of the issues in the rapidly growing area of cyberliability. We will examine the recent increase in focus on privacy issues, why directors should be concerned, the top...more

Security Rule Compliance: The Importance of Performing Regular Risk Analyses

It is likely that you are familiar with the HIPAA Security Rule’s mandate that covered entities and business associates document the decision making process that led to the selection of their means to achieve security for...more

37 Results
|
View per page
Page: of 2