News & Analysis as of

Risk Mitigation Cybersecurity

Data Breach Response: Orchestrating Legal and Technical Resources to Contain and Mitigate

Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly....more

Cybersecurity: Yes, They Will Hack Your Car

by Foley & Lardner LLP on

Auto manufacturers are increasingly equipping vehicles with rapidly advancing technologies, raising concerns regarding how the public will be affected by these changes. Manufacturers are beginning to implement automated...more

Proposed Federal Cybersecurity Regulations for Financial Institutions Face an Uncertain Future

Last year’s proposed comprehensive framework for cybersecurity rules for large financial institutions is suddenly facing an uncertain future. With the comment period having closed as of February 2017, the framework was facing...more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

by Sedgwick LLP on

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

Private Equity and the New Trump Administration: Your Top Ten Questions Answered

by Foley & Lardner LLP on

The election of President Trump contained more than a few positive signs for Private Equity (PE) firms. Promises of a lower corporate tax environment, a ten-percent tax holiday for funds parked overseas, large infrastructure...more

White Collar Enforcement and the New Trump Administration: Your Top Ten Questions Answered

by Foley & Lardner LLP on

Enforcement activity under the Obama administration often made headlines for the eye-popping level of fines, with the Foreign Corrupt Practices Act (FCPA), Anti-Money Laundering (AML) regulations, and economic sanctions...more

FCC Releases Cybersecurity Risk Reduction White Paper

by King & Spalding on

On January 18, 2017, during the final days of the Obama Administration, the Federal Communications Commission (“FCC”) released a white paper (the “FCC Paper”) on cybersecurity risk mitigation in communications networks. The...more

Rock and a Hard Place: Banks In Search of Compliance Amid Diverging Regulatory Regimes

Last year was the first that national banks and federal savings associations subject to supervision by the Office of the Comptroller of the Currency (“OCC”) were armed with a sense of the agency’s regulatory expectations when...more

The Robins Kaplan Insurance Insight - Vol. 1, No. 1

by Robins Kaplan LLP on

Welcome to our newest publication, The Robins Kaplan Insurance Insight. Our goal is to deliver practical content to help you navigate the current challenges and latest developments in the insurance industry. This newsletter...more

FINRA’s 2017 Regulatory & Exam Priorities

by Burr & Forman on

On January 4, new President and CEO Richard Cook issued FINRA’s Annual Regulatory and Examination Priorities Letter. This year’s list in summary is: New for 2017: Targeted electronic off-site reviews “on select...more

[Webinar] Business E-mail Compromise Scams - Practical Perspectives - January 12th, 10:30am EST

by Locke Lord LLP on

An increasing number of businesses are targeted by very sophisticated email scams designed to convince company employees responsible for executing financial transactions to wire funds to overseas accounts controlled by...more

Regulators Diverge on How Best to Manage Growing Cybersecurity Risks

by White & Case LLP on

On October 19, the Federal Reserve Board, Federal Deposit Insurance Corporation, and Office of the Comptroller of the Currency (the Agencies) issued an advance notice of proposed rulemaking (ANPR) seeking to enhance cyber...more

Cybersecurity Advice from President Obama

We’re writing this week to highlight some of the ways in which President Obama’s evolving views on cybersecurity can help guide corporate governance of data security risks. In an interview with Wired Magazine, the President...more

"Privacy & Cybersecurity Update - October 2016"

In this edition of our Privacy & Cybersecurity Update, we take a look at the FCC's new rules for broadband privacy, the FTC's new playbook for data breach response and notification, the NHTSA's voluntary guidance for...more

FTC Releases a Data Breach Response Guide For Business

by Snell & Wilmer on

Data breaches are fast becoming a fact of life. Experiencing a data breach is never a pleasant experience, regardless of how it happens – by accident, by criminal intent, or by system failure. Someone steals a company...more

The C-Suite’s Perspective on Cybersecurity and Liability

by LeClairRyan on

Recently, IBM surveyed more than 700 C-Suite executives in 18 industries and 28 countries about their views on cybersecurity. Ninety-four percent of those interviewed believe that their respective companies will experience a...more

Privacy and Cybersecurity Checklist When Designing a Family Office

by Shearman & Sterling LLP on

As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more

FFIEC Provides Concrete Guidance on Setting Up Information Security Programs

by Ballard Spahr LLP on

The Federal Financial Institutions Examination Council (FFIEC)—the interagency body tasked with setting uniform principals and standards for the examination of financial institutions by federal prudential regulators,...more

[Event] Data Breaches - What To Do When Your Client Falls Victim - September 28th, Mountain View, CA

by Fenwick & West LLP on

The number of data breaches has risen significantly in the past few years. More and more companies, both large and small, are having their computer networks compromised and are looking for guidance on how to respond. This...more

Naughty Secrets – Findings in the Ashley Madison Breach

by Bennett Jones LLP on

A quote attributed to FBI Director Robert Mueller is, “There are only two types of companies: those that have been hacked and those that will be”. The assessment of the Ashley Madison cyber-attack has lessons for all...more

NIST and FAIR develop tool to merge cybersecurity risk standards

by Thompson Coburn LLP on

One key issue when developing a cybersecurity protocol for your business is ensuring compliance with industry standards to protect your business and adequately address cybersecurity risks. Fail to comply with the standard for...more

Cyber Risk and Reality – Procuring Transportation in the 21st Century

by Nossaman LLP on

With the rapid pace of innovation and deployment of intelligent transportation systems (ITS) to enhance existing transportation infrastructure, transportation officials frequently procure and manage sophisticated systems that...more

King & Spalding Lawyers Discuss The Regulatory Landscape At Medical Device Cybersecurity Risk Mitigation Conference

by King & Spalding on

On July 25 and 26, 2016, industry stakeholders assembled in Arlington, Virginia, to participate in the Medical Device Cybersecurity Risk Mitigation Conference sponsored by Q1 Productions. The conference focused on the...more

[Webinar] Ethics and Cybersecurity - June 29th, 12pm CDT

by Thompson Coburn LLP on

With recent headlines about successful attacks on corporate computer systems, safeguarding client electronic information is an issue that all attorneys must address. This presentation will discuss the ethical rules that...more

Cybersecurity News & Notes – June 2016 #2: A brief digest of cybersecurity news you can use...

In Case You Missed It: The SEC fined Morgan Stanley $1 million for a 2014 data breach. While the FTC had declined to pursue an enforcement action, blaming the breach on technical issues rather than any actions or omissions...more

89 Results
|
View per page
Page: of 4
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!