As we noted in Federal Cybersecurity Policy in 2025: What to Watch in Changing Times, key parts of the Cybersecurity Information Sharing Act of 2015 (CISA 2015), the United States’ foundational cybersecurity information...more
We invite you to join us for an insightful webinar on Best Practices in Cyber Preparedness for Government Contractors and Critical Infrastructure Operators on Wednesday, October 23, 2024, from 12:00 p.m. – 1:00 p.m. EDT....more
10/10/2024
/ Best Practices ,
Continuing Legal Education ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Federal Contractors ,
Incident Response Plans ,
Regulatory Requirements ,
Risk Mitigation ,
Webinars
As cybersecurity threats continue to evolve, the sports industry faces unique challenges in safeguarding its data, athletes, and events. During a recent panel discussion at the Aspen Cyber Summit, Reynold Hoover, CEO of the...more
9/20/2024
/ Arenas and Stadiums ,
Athletes ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Protection ,
Hackers ,
NBA ,
NFL ,
Olympics ,
Popular ,
Sports Betting
Next week in Las Vegas, the Mobile World Congress (MWC) will bring together policymakers, industry experts, and stakeholders across the wireless ecosystem to discuss critical issues impacting the industry. Hosted by trade...more
In a June 14, 2023 speech at the Center for Democracy and Technology (CDT), Federal Communications Commission (FCC or Commission) Chairwoman Jessica Rosenworcel announced that the FCC is launching a new, “first-ever” “Privacy...more
On August 30, 2022, the California Legislature passed A.B. 2273, the California Age-Appropriate Design Code Act. The bill – which is modeled after the United Kingdom Information Commissioner’s Office code of practice for age...more
9/1/2022
/ Algorithms ,
California ,
California Consumer Privacy Act (CCPA) ,
COPPA ,
Data Profiling ,
Data Protection ,
Marketing ,
Online Advertisements ,
Privacy Settings ,
Private Right of Action ,
UK
Wiley Partner Megan Brown sits down with Tatyana Bolton, the Policy Director, Cyber Security and Threats at the R Street Institute, to discuss mandatory cyber incident reporting. They discuss how recent legislation and...more
Late 2021 and early 2022 have been full of federal government activity related to cybersecurity incident reporting. Congress passed the Cyber Incident Reporting for Critical Infrastructure Act of 2022 to require mandatory...more
3/21/2022
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Incident Reporting ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Breach ,
Data Protection ,
Department of Homeland Security (DHS) ,
Popular ,
Securities and Exchange Commission (SEC) ,
TSA
In the inaugural episode of Wiley’s 2022 Privacy & Cyber Series, Wiley partner Megan Brown and special counsel Lyn Brown, who recently joined Wiley from the FBI, discuss cyber trends that picked up speed in 2021 and offer...more
What: On November 16, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released Federal Government Cybersecurity Incident and Vulnerability Playbooks as part of the Biden Administration’s efforts to improve...more
11/18/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Popular ,
Private Sector ,
Technology Sector
The Cybersecurity and Infrastructure Security Agency (CISA) issued a sweeping binding directive to federal agencies to patch hundreds of cybersecurity vulnerabilities that are considered major risks for cyber actors to cause...more
11/9/2021
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
National Security ,
Popular ,
Private Sector ,
Technology Sector
WHAT: On November 4, 2021, the U.S. Department of Defense (DOD) announced the completion of a months-long internal review and significant changes to the strategic direction of its Cybersecurity Maturity Model Certification...more
11/8/2021
/ Controlled Unclassified Information (CUI) ,
Corporate Counsel ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Protection ,
Data Security ,
Department of Defense (DOD) ,
DFARS ,
Federal Contractors ,
NIST ,
Popular
On September 22, 2021, the California Privacy Protection Agency (CPPA or Agency)—the new agency established by the California Privacy Rights and Enforcement Act (CPRA)—released an Invitation for Preliminary Comments on...more
WHAT: On August 26, 2021, the Federal Acquisition Security Council (FASC) issued its final rule to implement the 2018 Federal Acquisition Supply Chain Security Act. See 86 Fed. Reg. 47582 (Aug. 26, 2021). The FASC made minor...more
Utah has become the second state to establish a legal safe harbor for private-sector entities that follow certain cybersecurity best practices. On March 11, 2021, Utah’s Governor Spencer Cox signed into law the Cybersecurity...more
The old saying goes, personnel is policy. This may be particularly true at this point in federal cybersecurity policy, where multiple agencies and Congressional committees play changing roles, including expanding capacities...more
On November 17, 2020, by unanimous consent, the United States Senate passed bipartisan legislation to secure internet connected devices—The Internet of Things (IoT) Cybersecurity Improvement Act of 2020. This bill, which was...more
Megan Brown sits down with one of Wiley’s newest attorneys, Sam Kaplan, former Assistant Secretary for Cyber, Infrastructure, Risk and Resilience Policy at the U.S. Department of Homeland Security (DHS), to discuss the...more
11/17/2020
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
National Security ,
Private Sector ,
Technology Sector
The U.S. Department of Defense (DOD) continues to pursue innovations in its approach to security vulnerabilities, building on its earlier Hack the Pentagon program and recent moves by the U.S. Department of Homeland Security...more
11/4/2020
/ Comment Period ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Defense Sector ,
Department of Defense (DOD) ,
Disclosure Requirements ,
Federal Pilot Programs ,
Hackers ,
Popular ,
Vulnerable Victims
The UK-US Bilateral Data Sharing Agreement (Agreement) came into force from over the Summer. In certain circumstances it enables law enforcement in the UK and U.S. to seek domestic court orders to require production of data...more
10/29/2020
/ Bilateral Agreements ,
Criminal Investigations ,
Cross-Border Transactions ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Data-Sharing ,
Information Governance ,
Law Enforcement ,
Request for Production ,
UK ,
Webinars
Congress is currently negotiating the final version of the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2021, which sets funding levels and outlines policy priorities for the U.S. Department of Defense...more
As fall has arrived, so has a flurry of privacy activity on Capitol Hill. Though this Congress is highly unlikely to pass any privacy legislation before the end of the Term, the latest developments reflect efforts by key...more