The White House has introduced the Cyber Trust Mark program, a voluntary labeling initiative to help consumers easily identify secure Internet of Things (IoT) devices....more
In the United States, the CRI pledge would only limit payments by the federal government, not state and local governments nor private-sector entities.
The International Counter Ransomware Initiative (CRI) convened in...more
The Department of Homeland Security amended its regulations due to the urgent need to protect Controlled Unclassified Information.
On June 21, 2023, the Department of Homeland Security (DHS or Department) issued a final...more
7/21/2023
/ Controlled Unclassified Information (CUI) ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Incident Reporting ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Defense (DOD) ,
Department of Homeland Security (DHS) ,
Federal Contractors ,
Policies and Procedures
The Strategy’s liability proposal represents a fundamental change in the cybersecurity market for software markers.
Proposed legislation would seek to restrict software providers’ ability to limit liability while also...more
The grant program will be authorized and appropriated through the Infrastructure Investment and Jobs Act.
The State and Local Cybersecurity Grant Program will provide a “first-of-its-kind” investment to state, local and...more
American Data Privacy and Protection Act would require organizations to limit collection of personal information, grant consumers access to their own data, enhance data protections for children, mandate implementation of...more
7/11/2022
/ California Consumer Privacy Act (CCPA) ,
Corporate Counsel ,
Data Privacy ,
Data Protection ,
Enforcement ,
Federal Data Privacy ,
Federal Trade Commission (FTC) ,
General Data Protection Regulation (GDPR) ,
Personal Information ,
Privacy Policy ,
Private Right of Action ,
Proposed Legislation ,
Small Business ,
Third-Party Service Provider
The SEC’s recent enforcement actions, public statements and proposed rulemaking indicate that cybersecurity will be an area of heightened focus for the Gensler Commission.
New proposed rules would require public companies...more
3/30/2022
/ Broker-Dealer ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Enforcement Actions ,
Investment Adviser ,
National Security ,
Popular ,
Proposed Rules ,
Rulemaking Process ,
Securities and Exchange Commission (SEC) ,
Securities Exchange Act
Brian Finch recently returned to Joel Simon‘s Industry Insights podcast to discuss the uptick in cyberattacks, data breaches perpetuating insider trading and strategies companies can employ to guard against these problems....more
In this election cycle, technology and internet policy is a persistent factor across multiple issue areas. With implications for national security, economic equality, infrastructure and market regulation, the next...more
11/4/2020
/ California Consumer Privacy Act (CCPA) ,
China ,
Communications Decency Act ,
Data Privacy ,
Data Protection ,
Department of Defense (DOD) ,
Department of Justice (DOJ) ,
Donald Trump ,
Fair Labor Standards Act (FLSA) ,
FCC ,
Federal Trade Commission (FTC) ,
General Data Protection Regulation (GDPR) ,
Gig Economy ,
Internet ,
Joe Biden ,
PACT Act ,
Popular ,
Remote Learning ,
Research and Development ,
SHIELD Act ,
Standard Contractual Clauses ,
Telehealth
As COVID-19 fuels technological adoption and adaptation in all walks of life, the CCPA and New York SHIELD Act are front and center in the minds of both government enforcers and the private plaintiffs’ bar.
The increased...more
Practical steps to address cybersecurity threats—precautions to prepare for the possible system impacts from COVID-19.
Organizations preparing for COVID-19 are testing and implementing business continuity plans to address...more
3/10/2020
/ Business Continuity Plans ,
Centers for Disease Control and Prevention (CDC) ,
Coronavirus/COVID-19 ,
Cybersecurity ,
Data Protection ,
Infectious Diseases ,
Phishing Scams ,
Popular ,
Public Health ,
Remote Working ,
Risk Management ,
Telecommuting
Practical steps to address cybersecurity threats—what you should do when heightened tension in the Middle East or other events increase the threat of cybersecurity incidents.
- When news events or business initiatives turn...more
1/24/2020
/ Best Practices ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Information Technology ,
Policies and Procedures ,
Popular ,
Risk Mitigation ,
SHIELD Act
New cybersecurity and data privacy laws will impose substantial new obligations on businesses that collect information about residents of those states.
Regardless of their location or size, nonprofit organizations that...more
New law in New York State extends requirements on companies doing business with New York residents to have cybersecurity programs and expands New York’s breach notification requirements.
New law extends the reach of New...more
The DoD clarifies its expectation for full compliance to protect Controlled Unclassified Information (CUI) residing on Contractor Systems from cyber incidents.
A defense contractor’s updated and current System Security...more
12/21/2017
/ Cloud Computing ,
Controlled Unclassified Information (CUI) ,
Cyber Threats ,
Cybersecurity ,
Data Protection ,
Data Security ,
Defense Contracts ,
Defense Sector ,
Department of Defense (DOD) ,
DFARS ,
Federal Contractors ,
NIST ,
Reporting Requirements
On May 11th, in the wake of a series of wide-ranging cyber breaches and attacks plaguing public and private sectors alike, President Trump signed a long-awaited Executive Order on Strengthening the Cybersecurity of Federal...more
6/2/2017
/ Critical Infrastructure Sectors ,
Cybersecurity Framework ,
Data Protection ,
Executive Orders ,
Hackers ,
Information Technology ,
National Security ,
NIST ,
Popular ,
Risk Management ,
Trump Administration
Retirement plan sponsors face ever-evolving cyber-related threats to plan assets and participant personal information. To combat such threats, plan sponsors should proactively assess the third-party service providers’ ability...more
Innovation is prized in the growing space of the Internet of Things (IoT). But an innovative product design is not enough, and potential pitfalls abound. As demonstrated in a report published by the Federal Trade Commission...more
Words matter when it comes to cybersecurity.
With security concerns dominating today’s corporate planning from the Board on down, the CIO often comes in as a technical expert, providing an analysis of the threat...more
The U.S. House of Representatives took a major positive step towards increasing the nation’s cyber security posture today when, on a voice vote, it passed H.R. 3696, the “National Cybersecurity and Critical Infrastructure...more