News & Analysis as of

Risk Mitigation Cybersecurity

No Rules, Just Be Right? The ABA's New Technology Ethics Opinion

by JD Supra Perspectives on

On the heels of the recent Petya ransomware attack, which infected DLA Piper's IT systems, a superb analysis by Peter Norman of the ABA's Formal Opinion 17-477R on lawyers' ethical responsibilities when using information...more

Cybersecurity: When Social Engineering Fraud is Not Covered Under Your Insurance Policy

by Bennett Jones LLP on

We live in an age of escalating cybersecurity threats. Many intrusion threats are social engineering attacks, which seek to gain entry to an organization's computer systems via its personnel and not a hack to the computer...more

Preparing For and Responding to the Petya Ransomware Attack

While still reeling from last month’s WannaCry attack, organizations worldwide were hit with another global ransomware attack this week, June 27, 2017. The infection began inside the Ukraine but has quickly spread across four...more

Yet another Target settlement highlights data breach costs

by Thompson Coburn LLP on

In what appears to be the closing act of the saga that is the Target data breach, on May 23 the retailer announced it had reached a settlement agreement with a coalition of 47 states’ attorneys general. Pursuant to the...more

HHS Releases Health Care Industry Cybersecurity Task Force Report

Last week, the Department of Health and Human Services (HHS) issued its “Report on Improving Cybersecurity in the Health Care Industry,” which is the culmination of a year-long effort on behalf of the Cybersecurity Task...more

Privacy & Cybersecurity Update - May 2017

In this edition of our Privacy and Cybersecurity Update, we take a look at the Trump administration's executive order outlining its cybersecurity plans, Acting FTC Chairwoman Maureen Ohlhausen's comments on the possible...more

OIG reports on CFPB’s public website security controls

by Ballard Spahr LLP on

The Office of Inspector General for the Fed and CFPB has completed a report setting forth its findings from an audit in which it evaluated “selected security controls for protecting the [CFPB’s] consumerfinance.gov website...more

OCIE Publishes Risk Alert In Response to WannaCry Ransomware

by Dechert LLP on

The Office of Compliance Inspections and Examinations (OCIE) of the U.S. Securities and Exchange Commission (SEC) issued a National Exam Program Risk Alert (Risk Alert) on May 17, 2017 in response to “WannaCry,” the ongoing...more

When “WannaCry” Strikes: Preparing for and Responding to the Largest Ransomware Attack in History

As many around the world were preparing for the Mother’s Day weekend, the WannaCry ransomware attack hit over 70,000 organizations in nearly 100 countries in just one day, Friday, May 12th. After the weekend, the attack had...more

Compliance’s Role in Preventing the Next “WannaCry” Cyberattack

by NAVEX Global on

The global chaos unleashed by the WannaCry ransomware virus reinforces that cyberattacks are not just the problem of IT departments. Compliance must play an integral part of any organization’s cross-functional cybersecurity...more

Global Ransomware Attack: Preparation is Key

by Foley & Lardner LLP on

Businesses have been scrambling since Friday evening when news spread that a ransomware attack named WannaCry is compromising organizations at an alarming rate. In less than 48 hours, it has compromised more than 130,000...more

Tips to Help a Business Avoid Data Breach Litigation

by Revision Legal on

Little else is as stressful for a company than handling the aftermath of a data breach. Not only does the company have the obligation of making notifications to clients about the data breach, but it may also be confronted by...more

[Webinar] Be Compromise Ready: Go Back to the Basics - May 9th, 12:00pm EDT

by BakerHostetler on

Cyber threats are here to stay. No company, large or small, is immune. But there are basic measures you can take to prepare for the legal and business risks associated with an attack....more

Data Breach Response: Orchestrating Legal and Technical Resources to Contain and Mitigate

Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly....more

Cybersecurity: Yes, They Will Hack Your Car

by Foley & Lardner LLP on

Auto manufacturers are increasingly equipping vehicles with rapidly advancing technologies, raising concerns regarding how the public will be affected by these changes. Manufacturers are beginning to implement automated...more

Proposed Federal Cybersecurity Regulations for Financial Institutions Face an Uncertain Future

Last year’s proposed comprehensive framework for cybersecurity rules for large financial institutions is suddenly facing an uncertain future. With the comment period having closed as of February 2017, the framework was facing...more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

by Sedgwick LLP on

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

Private Equity and the New Trump Administration: Your Top Ten Questions Answered

by Foley & Lardner LLP on

The election of President Trump contained more than a few positive signs for Private Equity (PE) firms. Promises of a lower corporate tax environment, a ten-percent tax holiday for funds parked overseas, large infrastructure...more

Incident Response: The Increasing Risks to Corporate Legal Departments

The consequences of a data breach reached new heights last week when Yahoo announced the resignation of its General Counsel in response to a series of security incidents the company suffered. A more fulsome explanation of...more

White Collar Enforcement and the New Trump Administration: Your Top Ten Questions Answered

by Foley & Lardner LLP on

Enforcement activity under the Obama administration often made headlines for the eye-popping level of fines, with the Foreign Corrupt Practices Act (FCPA), Anti-Money Laundering (AML) regulations, and economic sanctions...more

FCC Releases Cybersecurity Risk Reduction White Paper

by King & Spalding on

On January 18, 2017, during the final days of the Obama Administration, the Federal Communications Commission (“FCC”) released a white paper (the “FCC Paper”) on cybersecurity risk mitigation in communications networks. The...more

Rock and a Hard Place: Banks In Search of Compliance Amid Diverging Regulatory Regimes

Last year was the first that national banks and federal savings associations subject to supervision by the Office of the Comptroller of the Currency (“OCC”) were armed with a sense of the agency’s regulatory expectations when...more

The Robins Kaplan Insurance Insight - Vol. 1, No. 1

by Robins Kaplan LLP on

Welcome to our newest publication, The Robins Kaplan Insurance Insight. Our goal is to deliver practical content to help you navigate the current challenges and latest developments in the insurance industry. This newsletter...more

FINRA’s 2017 Regulatory & Exam Priorities

by Burr & Forman on

On January 4, new President and CEO Richard Cook issued FINRA’s Annual Regulatory and Examination Priorities Letter. This year’s list in summary is: New for 2017: Targeted electronic off-site reviews “on select...more

[Webinar] Business E-mail Compromise Scams - Practical Perspectives - January 12th, 10:30am EST

by Locke Lord LLP on

An increasing number of businesses are targeted by very sophisticated email scams designed to convince company employees responsible for executing financial transactions to wire funds to overseas accounts controlled by...more

103 Results
|
View per page
Page: of 5
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.