Latest Publications

Share:

Fiduciary Duty in the Digital Age: Cybersecurity Best Practices for ERISA Plans

Cybercriminals look for two things when seeking a victim—access and opportunity. ERISA retirement plans offer both. Cybercriminals exploit weaknesses in systems, software, or human behavior to find opportunities for easy...more

Cyber 101: Understand the Basics of Cyber Liability Insurance

Cyber risk has grown demonstrably in frequency and severity in the past 10 years—and, in tandem, the cyber insurance policy has grown in breadth and complexity. This past year, a record number of organizations fell victim to...more

Healthcare’s Ever-Evolving Privacy Landscape: Litigation, Regulation, and the Perpetual Data Breach Risk

This webinar focuses on the privacy, security, regulatory, and litigation landscape that the healthcare sector is facing in in the privacy and cybersecurity arena. Leveraging Polsinelli’s experience working with healthcare...more

How to Hire a CISO as Scrutiny Intensifies

The role of the chief information security officer (CISO) in 2024  is evolving. With budgetary limitations, an increasingly complex threat environment, generative artificial intelligence (AI) tools, new regulatory mandates, a...more

The Rise in SIM-Swap Attacks: What Executives Should Know

SIM-swapping attacks targeting executives are on the rise. In 2023, the FBI investigated 1,075 SIM-swapping attacks, which resulted in nearly $50 million in losses. SIM swapping has become so pervasive that it has prompted...more

Harness the Potential of GenAI and Mitigate the Potential Legal Risk, Part 1: A Risk-Aware Approach

This article focuses on the risks associated with inputting data into GenAI tools and models. The outputs of GenAI systems also create risks; we will explore this in Part 2 of this series. A Risk Aware Approach to Data,...more

[Virtual Event] Managing Media Risk in the Age of Social Media Influencers: Risk Mitigation and Insurance Considerations - March...

Influencer marketing has become one of the fastest growing trends in marketing, yet it comes with a growing set of media liability claims. In this webinar, we will contextualize some of the legal liability issues in using...more

Deepfakes and the Use of AI in Cyberattacks

The headlines about a $25 million wire transfer fraud employing deepfake technology have rightfully given chief financial officers and finance departments considerable pause. The attack began with a phishing email delivered...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide