News & Analysis as of

Risk Mitigation Today's Popular Updates Information Technology

Spilman Thomas & Battle, PLLC

HHS Cybersecurity Performance Goals and the Healthcare Industry

The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more

Skadden, Arps, Slate, Meagher & Flom LLP

What Does the SEC’s Complaint Against SolarWinds Mean for CISOs and Boards?

On October 30, 2023, the SEC filed a litigated complaint against SolarWinds, a software development company, and Timothy Brown, its chief information security officer (CISO). The SEC alleges that from October 2018, when...more

Mayer Brown

Cybersecurity Risks in Technology Transactions

Mayer Brown on

Engaging third-party providers for technology transactions involves a certain level of cybersecurity risk. In fact, most companies have been through a third-party incident. In this episode, partners Justin Herring and Adam...more

Epiq

Elevating Cyber Risk Analysis During M&A Due Diligence

Epiq on

Before a deal closes on a merger or acquisition, due diligence investigation will ensue to confirm goal alignment and identify any obstacles present. There are several integral components of this process such as identifying...more

Robinson+Cole Health Law Diagnosis

Privacy Tip – Health Care Sector Continues to Be Hit with Ransomware

According to the 2022 State of Ransomware Report issued recently by Sophos, it surveyed 5,600 IT professionals from 31 countries, including professionals in the health care sector. Those professionals in the health care...more

Robinson+Cole Data Privacy + Security Insider

CISA/FBI/NSA Issue Two Joint Cybersecurity Alerts for Critical Infrastructure

The Cybersecurity & Infrastructure Security Agency, the Federal Bureau of Investigation, and the National Security Agency recently issued two joint alerts to critical infrastructure entities—one addressing BlackMatter...more

Womble Bond Dickinson

Operational Technology: New Target For Network Security Obligations

Womble Bond Dickinson on

The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more

K&L Gates LLP

Not "If" But "When"—The Ever Increasing Threat of a Data Breach in 2021

K&L Gates LLP on

Fourth of July Data Breach - The latest in a recent string of high profile and wide-reaching cyber-attacks occurred over the fourth of July weekend. A criminal hacking enterprise known as REvil targeted information technology...more

Steptoe & Johnson PLLC

[Webinar] Are You Prepared for a Potential Breach? - May 19th, 12:00 pm - 1:00 pm EDT

Steptoe & Johnson PLLC and Exclamation Labs invite you to a joint webcast to help institutions mitigate cybersecurity issues and identity governance risks. Our panel of technology and legal professionals will discuss: -...more

McDermott Will & Emery

NIST Guidance on Internet of Things (IoT)

McDermott Will & Emery on

Standard, everyday appliances like dishwashers and ovens, and necessary devices such as lights and thermostats, are increasingly likely to be Wi-Fi enabled, allowing them to send and receive data. These objects are widely...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Faegre Drinker Biddle & Reath LLP

Emerging Cyber-Security Threats for 2020: The Rise of Disruptionware and High-Impact Ransomware Attacks

Disruptionware is defined by the Institute for Critical Infrastructure Technology (ICIT) as a new and “emerging category of malware designed to suspend operations within a victim organization through the compromise of the...more

Pillsbury Winthrop Shaw Pittman LLP

International Pressure Raises Cybersecurity Threats

Practical steps to address cybersecurity threats—what you should do when heightened tension in the Middle East or other events increase the threat of cybersecurity incidents. - When news events or business initiatives turn...more

Holland & Knight LLP

Significant Changes to Supply Chain Compliance

Holland & Knight LLP on

This is the fifth blog post in a series analyzing the 2019 National Defense Authorization Act (NDAA) as signed into law on Aug. 13, 2018. Stay tuned for more blog posts covering additional topics in the near future from...more

Foley & Lardner LLP

Navigating Cybersecurity Risk in the Age of the Connected Car

Foley & Lardner LLP on

A boom in automobile technology and connectivity in 2018 further boosted expectations of consumers regarding the integration and functionality of their devices and vehicles. Automobile manufacturers have responded by...more

Fisher Phillips

Don’t Take the Bait! “Spear Phishing” and “Whaling” Take Scams to the Next Level

Fisher Phillips on

For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more

Holland & Knight LLP

Impact of the New Health Industry Cybersecurity Practices: 2019 Outlook

Holland & Knight LLP on

• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more

Bradley Arant Boult Cummings LLP

Understanding cyber insurance risks of target companies

Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more

Foley Hoag LLP - Security, Privacy and the...

Advanced Cyber Security Center Panel Explores Reasonableness in Cybersecurity

I had the pleasure of moderating an excellent panel at the Advanced Cyber Security Center’s annual conference on November 4. The panel’s topic for discussion was “What is Reasonable in Cybersecurity: Responsibility and...more

Foley Hoag LLP - Security, Privacy and the...

Cybersecurity and Risk Management: “Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers”

A timely new resource for business executives, technology professionals, and lawyers alike is the newly-published Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers from the New York...more

Zelle  LLP

Big Data in Human Resources = Big Decisions for HR Pros

Zelle LLP on

Big data, data analytics, talent analytics, HR analytics, people analytics. There are many names to describe the use of data science in human resources, and as the list grows, the promise of this technology continues to...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide