News & Analysis as of

Vulnerability Assessments

Funds Talk: May 2017 - CFTC Among Regulators Demanding Cybersecurity Vigilance

While the Securities and Exchange Commission (SEC) has garnered significant attention for its increased efforts and focus on regulating and enforcing enhanced cybersecurity measures within the U.S. financial markets, the...more

Orrick's Financial Industry Week In Review

Rating Agency Developments - On April 19, 2017, Fitch issued a report entitled Airport Operating Lease ABS Rating Criteria. On April 14, 2017, Fitch issued a report entitled North America and Asia-Pacific...more

It’s Getting Hot in Here! – Employers React with Concern and Confusion to Cal/OSHA Draft Indoor Heat Illness Standard

by Fisher Phillips on

For the past 12 years, California has maintained a Cal/OSHA standard designed to minimize heat illness in outdoor places of employment. However, legislation enacted last year (SB 1167) now requires Cal/OSHA to develop a heat...more

The FTC’s Public Comment on the NTIA’s Draft Coordinated Vulnerability Disclosure Template Reflects Further Support for the NIST’s...

by Moore & Van Allen PLLC on

In August 2016, the Federal Trade Commission (“FTC”) addressed the effect of the Cybersecurity Framework (“NIST Framework”) issued by the National Institute of Standards and Technology on FTC enforcement actions under Section...more

Bounty or Bug Programs: A How-To Guide

by Bryan Cave on

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

No Harm, But Foul? FTC Sues Internet of Things Maker D-Link for Security “Vulnerabilities” Despite No Allegations of Breach

by Orrick - Trust Anchor on

Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more

Global Cybersecurity Threats to the Maritime Sector

by Holland & Knight LLP on

Cybersecurity risks to the nation's critical infrastructure (CI) – defined as 16 CI sectors, including transportation and maritime – continue to grow exponentially. The incoming Trump Administration has made it clear that...more

FTC Releases Data Breach Response Guide

by Morgan Lewis on

On October 25, the Federal Trade Commission (FTC) released new guidance for businesses that outlines recommended actions to take when facing a data breach. This data breach response guide (Guide) follows the FTC's prior...more

Data Privacy Considerations for Starting or Evaluating a Bounty Program

by Bryan Cave on

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

Privacy Tip #31 – Landlines still a safe way to communicate but telephone companies want to drop them

I am pretty up to date on data privacy and security and technology, but the 60 Minutes episode this past Sunday night floored even me. If you didn’t see it, it is worth streaming. Basically, 60 Minutes showed Karsten...more

Preparing Your Organization Today to Win Its Future (Possibly Inevitable) Cyber Lawsuit: Making Crown Jewels Out of Paper

One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more

FAA calls for contractors to assess airplane cyber threats and vulnerabilities

The Federal Aviation Administration (FAA) is now reaching out to contractors to help assess cyber-attack threats and vulnerabilities to communications systems on airplanes. This new effort is part of the Aircraft Systems...more

The CFTC’s Proposed Standards Identify Cybersecurity Best Practices

by BakerHostetler on

The Commodity Futures Trading Commission (CFTC) offered several reasons for proposing five new cybersecurity testing requirements for the commodity trading platforms it regulates in its December 23, 2015, Notice of Proposed...more

Recent Government Cyber Alert and Draft Guide for Financial Institutions: Lessons for All Organizations

by Baker Donelson on

All organizations, including financial institutions, continue to face significant security threats across their wide ranging IT systems. Such organizations are particularly vulnerable if they cannot track networked devices...more

“Bug Bounty” Programs Grow In Popularity

by King & Spalding on

In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more

ESAs report on risks in the EU financial system

by Dentons on

The European Supervisory Authorities (ESMA, EBA and EIOPA jointly) have issued their August 2015 report on risks and vulnerabilities in the EU financial system. The report informs on risks in the banking, securities and...more

OPM data breach update: OPM shuts down background check system

The OPM announced this week that it is temporarily shutting down its background security clearance system, e-QIP, as vulnerabilities were found during a review of systems. Presently, according to OPM, the vulnerabilities did...more

EBA Report on Risks and Vulnerabilities of the EU Banking System

On July 17, the European Banking Authority (EBA) published a report on risks and vulnerabilities of the EU banking system. The report considered EBA key risk indicators and EBA risk assessment questionnaires for banks and...more

In Response To Sea Level Rising At Double The Global Rate, Delaware Debates Whether To Accommodate, Avoid, Protect Or Retreat

On February 19, 2013, the Delaware Sea Level Rise Advisory Committee ("DSLRAC") held the second of three "public engagement sessions" to solicit public comment on a list of 61 "Options for Preparing Delaware for Sea Level...more

19 Results
|
View per page
Page: of 1
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!