News & Analysis as of

Sensitive Business Information Cybersecurity

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

ArentFox Schiff

AI in Family Offices: A Closer Look at Privacy, Confidentiality, and Fiduciary Responsibility

ArentFox Schiff on

The integration of artificial intelligence (AI) has revolutionized various industries, offering efficiency, accuracy, and convenience. In the realm of estate planning and family offices, the integration of AI technologies has...more

Integreon

Best Practices for Reducing the Cost of a Cyber Incident for Small to Mid-Sized Businesses

Integreon on

Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more

Foley Hoag LLP

FBI and CISA Issue Advisory on Scattered Spider Ransomware Attacks

Foley Hoag LLP on

Large companies holding sensitive data – including financial services, telecommunications, business process outsourcing, hospitality, and cryptocurrency firms – as well as their IT helpdesks, are increasingly being targeted...more

Spilman Thomas & Battle, PLLC

Remote Work Strategies for Managing Cybersecurity Teams

Managing a remote cybersecurity team at colleges and universities involves addressing a unique set of challenges to ensure the security of sensitive data and infrastructure. There is an additional overlay of potential...more

K2 Integrity

A Strong Foundation: Safeguarding The Construction Industry In The Digital Age

K2 Integrity on

The adoption of new and advanced technologies has allowed for a digital transformation across business industries. Infrastructure and services supported by technologies such as artificial intelligence (AI), advanced analytics...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

Flaster Greenberg PC

7 Key Practices Companies Should Implement to Ensure Cyber Safety in the Age of Remote Work

Flaster Greenberg PC on

Cybersecurity is critically important in the age of remote work. With more people working from home and accessing company systems and data remotely, the potential for cyberattacks and data breaches has increased...more

Tenace

Protecting Confidentiality: The Urgent Need for Strong Cybersecurity in Law Firms

Tenace on

Law firms are one of the most attractive targets for cybercriminals, making strong cybersecurity a critical concern for these organizations. With confidential client information, sensitive legal documents, and valuable...more

Array

Cybersecurity and eDiscovery: What you need to know about your vendor

Array on

Baker McKenzie recently released their sixth annual edition of ‘The Year Ahead: Global Disputes Forecast’ in which senior legal and risk leaders share what they expect to see in the coming year. From an overarching...more

Bass, Berry & Sims PLC

Privacy Peril: End of the Year Investment Planning

Over the years we have offered several recommendations to increase your protection against attacks and intrusions and harden your cybersecurity. In this final tip for 2022, we mention a novel, though somewhat radical,...more

StoneTurn

Shifting Cyber Landscape – Crisis Awareness as a Means to Prevent and Prepare

StoneTurn on

Crises and uncertainty are inevitable forces in modern business, particularly in cyber and digital. General counsels and legal risk executives are well suited to lead preparedness and resiliency for future crises, uniting key...more

HaystackID

[Webcast Transcript] Data Mining in Incident Response: Managing Risk and Spend through an Effective Evidence-Based Approach

HaystackID on

Editor’s Note: On August 31, 2022, HaystackID shared an educational webcast on the topic of data mining in data breach incident response. As data mining has increasingly become one of the largest expenses during a cyber...more

Paul Hastings LLP

China Enhances Scrutiny for Cross-Border Data Transfer that would Impact Multinational Companies

Paul Hastings LLP on

1. Introduction- China’s cross-border data transfer rules are unfolding in real time and taking clearer shape. On July 7, 2022, China’s cybersecurity regulatory agency, the Cyberspace Administration of China (“CAC”), issued...more

Goldberg Segalla

Death by a Thousand Paper Cuts: The Scourge That Is Business Email Compromise

Goldberg Segalla on

In June 2014, the CEO of Omaha-based Scoular Company sent a series of emails to his company’s controller to let him know that the company was in negotiations to buy a Chinese company. The emails highlighted the sensitivity of...more

Wiley Rein LLP

Cleared Defense Contractors at Risk from Russian Cyber Activity; Advisory Shows Government Expectations

Wiley Rein LLP on

What: Cleared Defense Contractors (CDCs) are being actively targeted by Russian state-sponsored cyber activity, according to a Joint Cybersecurity Advisory from the Federal Bureau of Investigation (FBI), National Security...more

Epiq

[Webinar] Beyond the Breach – Managing Data Classification & Notification Projects - November 4th, 6:00 pm AEDT

Epiq on

The immediate cyber incident is over – what happens next? Join our esteemed panellists as they outline key considerations when managing post-breach data classification and notification projects. Setting the scene through the...more

King & Spalding

DOJ Announces Civil CyberFraud Initiative to Use False Claims Act to Enforce Cybersecurity Standards in Government Contracts

King & Spalding on

On October 6, the Deputy Attorney General (“DAG”) announced a new Department of Justice (“DOJ”) Civil Cyber-Fraud Initiative – an effort that pulls together attorneys and experts across DOJ focused on fraud enforcement,...more

Epiq

CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)

Epiq on

Jerich Beason is joined by Erik Weinick. Erik's experience includes privacy, cybersecurity, bankruptcy, commercial torts, defamation/slander, regulatory to name a few. He is also the co-founder of Otterburg’s Privacy &...more

Ankura

[Webinar] Vendor Risk Management in the Modern Economy - July 28th, 1:00 pm - 2:00 pm EST

Ankura on

Organizations are becoming increasingly reliant on external parties to manage parts of their business, including their critical and sensitive data. While the specialized expertise and economies of scale that third parties and...more

Robinson+Cole Data Privacy + Security Insider

Embraer Data Leaked on Darkweb Website

Brazilian airplane manufacturer Embraer’s data has reportedly been uploaded on a dark web website hosted by ransomware group RansomExx (a/k/a Defray 777) after Embraer reportedly refused to pay a ransom following a ransomware...more

Fisher Phillips

Not If But When: Cybercrime Targets Telework

Fisher Phillips on

As a result of the COVID-19 pandemic, millions of Americans have deserted the physical workplace. Modern technology and remote access capabilities have made it possible to transform almost any job to a telework position. As...more

Perkins Coie

OCIE Raises Concerns Regarding Physical and Cyber Security, Supervision, and Business Continuity

Perkins Coie on

The Office of Compliance Inspections and Examinations (OCIE) of the U.S. Securities and Exchange Commission (the SEC) issued a risk alert (the risk alert) on August 12, 2020, highlighting COVID-19 pandemic-related risks and...more

Furia Rubel Communications, Inc.

Protecting Your Privacy and Data During Virtual Meetings

Furia Rubel Communications Intern Like many Americans who’ve been ordered to stay at home until the COVID-19 pandemic wanes, you may have used Zoom, either to stay in touch with a group of friends, family, colleagues, or to...more

Lowndes

Video Calling and Coronavirus: Is Zoom Safe?

Lowndes on

The use of Zoom as a meeting platform has exploded corresponding to the explosion of COVID-19. With that explosion have come many questions regarding its security and privacy....more

38 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide