Risk Mitigation Risk Assessment

News & Analysis as of

NIST and FAIR develop tool to merge cybersecurity risk standards

One key issue when developing a cybersecurity protocol for your business is ensuring compliance with industry standards to protect your business and adequately address cybersecurity risks. Fail to comply with the standard for...more

Cyber Risk and Reality – Procuring Transportation in the 21st Century

With the rapid pace of innovation and deployment of intelligent transportation systems (ITS) to enhance existing transportation infrastructure, transportation officials frequently procure and manage sophisticated systems that...more

King & Spalding Lawyers Discuss The Regulatory Landscape At Medical Device Cybersecurity Risk Mitigation Conference

On July 25 and 26, 2016, industry stakeholders assembled in Arlington, Virginia, to participate in the Medical Device Cybersecurity Risk Mitigation Conference sponsored by Q1 Productions. The conference focused on the...more

Dealing with Violence in Wake of the Attack in Orlando

The weekend of June 11, 2016, saw another act of violence committed against innocent and unsuspecting people as they gathered together, an occurrence that has become all too frequent in today's world. While the latest attack...more

Ukrainian bank loses $10 million in latest swift cyber-attack

An unnamed bank in Ukraine is the most recent victim in a series of cyber-attacks exploiting vulnerabilities in the international banking communications system. According to an independent IT monitoring organization, hackers...more

Global Boardroom Risk Solutions Newsletter

“Risk is sexy?” - Anonymous GC - Not every Director or General Counsel (GC) is likely to describe risk analysis as “sexy” but there is little doubt that risk issues have demanded a board level focus which would have been...more

[Webinar] Ethics and Cybersecurity - June 29th, 12pm CDT

With recent headlines about successful attacks on corporate computer systems, safeguarding client electronic information is an issue that all attorneys must address. This presentation will discuss the ethical rules that...more

Cybersecurity News & Notes – June 2016 #2: A brief digest of cybersecurity news you can use...

In Case You Missed It: The SEC fined Morgan Stanley $1 million for a 2014 data breach. While the FTC had declined to pursue an enforcement action, blaming the breach on technical issues rather than any actions or omissions...more

Dawn raids: How to prepare for, manage, and mitigate the increasing risk to multinational tech companies

Dawn raids and enforcement actions throughout Europe are becoming more and more prevalent. And increasingly, the targets of these raids are multinational tech companies with foreign headquarters, which through their global...more

2016 Trends #8: Getting Serious About Anti-Bribery & Corruption Efforts and Third-Party Risk Management

By now, most organizations understand the importance of identifying and addressing any exposure they have to violations of anti-corruption and bribery (ABC) laws. Much attention has been given to recent cases, and to...more

Addressing Adulterated Food Risk

As we enter 2016, adulterated food-related investigations are leading the headlines—and should be leading companies in the food and beverage industry to ask what they can do to prevent and prepare for a potential outbreak on...more

Best in Law: Data Security and the Inside Job

If you are a business owner in the Inland Empire, what would you identify as the greatest threat to the security of your data? Is it hackers looking for credit-card numbers? Could it be foreign governments stealing industrial...more

Tips for Going Global: Plan Before You Expand

Companies enjoying success in the U.S. often seek global expansion to gain strategic benefits from accessing new markets—new revenue potential, talent acquisition and increased brand awareness. Before replicating your...more

The Asia-Pacific Investigations Review 2016

It goes without saying that wrongful conduct in a corporate setting can have drastic and irreparable legal, commercial and reputational consequences for the individuals and entities involved. Internal investigations, which...more

Gavel to Gavel: Ambiguity poses risks

As a business owner, you’ve probably put together a team of skilled individuals to help effectively market your products and services by developing memorable and informative product labels, advertisements, and marketing...more

New Study Highlights Anti-Bribery & Corruption Gaps & Risks

Everyone reading this post should have conducted a corporate risk assessment (CRA) in the past couple years. If not, stop reading and go conduct one now. Seriously, how can you know if your compliance program resources,...more

The Modern Slavery Act 2015

The UK’s Modern Slavery Act is an effort by the government to end all forms of labour exploitation. The UK’s Modern Slavery Act 2015 aims to prevent all forms of labour exploitation and increase transparency of labour...more

Update on Significant DOT, FAA and Other Federal Agencies’ Aviation-Related Regulatory Actions - October 2015

This edition of the Cozen O’Connor Aviation Regulatory Update reports on Congress’s six-month extension of FAA’s reauthorization; new U.S. Bilateral Aviation Safety Agreements with the European Union and Canada; the FAA’s...more

SEC Issues Cybersecurity Examination Risk Alert

On September 15, the Securities and Exchange Commission’s (SEC) Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert re-emphasizing the careful scrutiny it will give to the data security practices of...more

Organizational Conflicts of Interest

OVERVIEW - - Introduction to Organizational Conflicts of Interest (“OCI”) - Unequal Access to Information - Biased Ground Rules - Impaired Objectivity - Waiving an OCI - Strategic...more

NAIC Cybersecurity Forum Focuses on Escalating Threats and Best Remediation Practices

On September 10, the National Association of Insurance Commissioners (NAIC) co-sponsored a cybersecurity forum at the Center for Strategic and International Studies in Washington, DC. Featuring an impressive line-up of senior...more

Medical Device Cybersecurity: Maybe Dick Cheney Was Not So Paranoid After All

Dick Cheney famously disclosed a few years ago that he had the wireless function of his pacemaker disconnected while he was Vice President because he was concerned that hackers might fiddle with the device remotely and do him...more

Swipe Right For Unions? Companies Should Brace Themselves For Labor Organizing Version 2.0

Unless you’ve been hibernating, hiding under a rock, or vacationing in a location without Wi-Fi reception, you may have noticed that the last several months have been kinder to labor unions than any in recent memory. Changes...more

Spain Sets a New Milestone with its Corporate Compliance Statute

As of July 1 of this year, Spain becomes the latest in a string of nations with a corporate compliance defense. Article 33 of Spain’s criminal code will provide an exemption from corporate criminal liability where the company...more

Hacking Your Health: For Healthcare Providers, Risk Analysis Must Be Ongoing

Healthcare providers would be wise to keep in mind that if a patient is harmed by a hacked medical device, Exhibit A in the negligence suit against them may be that provider’s risk analysis, or lack thereof....more

120 Results
|
View per page
Page: of 5
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×