Latest Publications

Share:

SEC Proposes New Cybersecurity Regulations for RIAs and Funds

On February 9, 2021, the Securities and Exchange Commission (SEC) announced new proposed cybersecurity rules (Proposed Rules) for registered investment advisors and investment companies (funds) addressing cybersecurity risk...more

Patch Your Systems! Log4j Vulnerability Sparks a Warning From the FTC

Since first announced in December 2021, the critical Log4j vulnerability has stolen the attention of many cybersecurity professionals. The Federal Trade Commission (FTC) has taken notice too....more

How to Handle a Ransomware Attack

Small and medium-sized business are prime targets for ransomware attacks. After breaching a business's computer network and encrypting the company's key files and systems, attackers will demand a ransom payment in exchange...more

DoD's Revamped "CMMC 2.0" for Defense Contractors

The Department of Defense (DoD) has announced major changes to its Cybersecurity Maturity Model Certification (CMMC) program for defense industrial base (DIB) contractors and subcontractors. The revamped program, called "CMMC...more

Commerce Publishes Export Controls for Cybersecurity Intrusion and Surveillance Tools

On October 21, 2021, the Department of Commerce's Bureau of Industry and Security (BIS) published its long-awaited Interim Final Rule establishing export controls for tools and related technology that can be used for hacking...more

"Whole of Government" Anti-Ransomware Campaign on Full Display

November 8, 2021, may have been the most significant single day in the United States' "whole of government" anti-ransomware campaign. The Department of Justice, Department of the Treasury, and Department of State all...more

[Webinar] Privacy and Security for M&A: When Questionnaires are Not Enough - December 7th, 11:00 am - 12:00 pm PT

Privacy and security diligence has become standard in M&A transactions, but a one-size-fits-all approach won’t work. While form questionnaires have their place, companies need to know when to take a deeper, more technical...more

Say Hello to 2.0: DoD's Significantly Revamped "CMMC 2.0" Program for Defense Contractors

The Department of Defense (DoD) has announced major changes to its Cybersecurity Maturity Model Certification (CMMC) program for defense industrial base (DIB) contractors and subcontractors. The revamped program, called "CMMC...more

FTC Strengthens GLBA Information Security Requirements

The Federal Trade Commission (FTC) recently announced significant new information security requirements for non-bank financial institutions subject to the Gramm-Leach-Bliley Act (GLBA). The new requirements are incorporated...more

Warning of "Very Hefty Fines," DOJ Launches Civil Cyber-Fraud Initiative to Pursue Violations of Cybersecurity Requirements in...

The Department of Justice (DOJ) is bringing one of its trustiest tools to the project of improving the nation's cybersecurity. The DOJ announced last week the launch of its Civil Cyber-Fraud Initiative which will use the...more

OFAC Makes Waves in Fight Against Ransomware, but Practical Effects Unclear

On September 21, 2021, the U.S. Department of the Treasury announced two major actions by the Office of Foreign Asset Control (OFAC) to combat ransomware: the release of OFAC's Updated Advisory on Potential Sanctions Risks...more

NIST Starts Consumer Labeling Program for IoT Cybersecurity

Over the last several weeks, the National Institute of Standards and Technology (NIST) has taken key steps towards the creation of a consumer labeling program for the cybersecurity of Internet of things (IoT) devices....more

Federal Technology Providers Take Note: White House Announces Federal "Zero Trust" Strategy for Cybersecurity

Earlier this week, the White House announced that the Office of Management and Budget (OMB) has released a draft of the Federal Zero Trust Strategy—a plan for moving federal civilian executive branch (FCEB) agencies toward...more

Recent SEC Enforcement Activity Highlights Issuers' Cybersecurity Disclosure Obligations and Pitfalls

The U.S. Securities and Exchange Commission (SEC) has continued to make cybersecurity disclosures an enforcement priority. Recent enforcement activity, summarized below, highlights these key points for SEC-regulated issuers....more

TSA Issues Second Security Directive for "Critical" Pipelines and LNG Facilities and Plans to Revise Pipeline Cybersecurity...

The Department of Homeland Security (DHS) announced the issuance of the Transportation Security Administration's (TSA) second Security Directive (Directive) creating mandatory cybersecurity rules for owners and operators of...more

Multiple States Toughen Data Breach and Cybersecurity Requirements

It has been a busy summer for data breach and cybersecurity laws. Several states have shortened their data breach notification timelines, expanded their definitions of personal data breaches triggering notification...more

Biden Administration's National Security Memorandum Focuses on Bolstering Cyber Defenses for Critical Infrastructure,...

Following several high-profile cyberattacks against operators of U.S. critical infrastructure (CI), the White House has issued a National Security Memorandum (NSM) outlining the Biden Administration's plan to encourage...more

Another Court Limits Discovery Protections for Digital Forensic Investigations

A recent magistrate decision from the Middle District of Pennsylvania adds to the growing body of cases limiting discovery protection for forensic reports and other materials prepared in response to a data security incident....more

Biden Administration Rescinds Trump's TikTok and WeChat Bans, Issues Two Executive Orders Highlighting Policies on Chinese Tech...

Earlier this month, President Biden issued two executive orders designed to address risks allegedly posed by Chinese technology companies. One order rescinds President Trump's orders banning TikTok, WeChat, and other Chinese...more

White House Urges U.S. Businesses to Adopt Best Practices to Fight Ransomware

The White House released an open letter on June 2, 2021, urging U.S. businesses to take "immediate steps" to protect themselves, their customers, and the broader economy against ransomware attacks. The letter comes amid...more

SCOTUS Limits Reach of Computer Fraud and Abuse Act: Nefarious Reasons Are Not Enough for Criminal Liability

Last week, the U.S. Supreme Court resolved an important question about the meaning of provisions prohibiting "unauthorized access" or "exceeding authorized access" to computer systems and databases under the Computer Fraud...more

TSA Security Directive Requires 30-Day Cybersecurity Assessments, Rapid Incident Notification for "Critical" Pipeline and LNG...

Less than a month after the high-profile ransomware attack against Colonial Pipeline, the Department of Homeland Security's (DHS) Transportation Security Administration (TSA) has issued its first-ever set of mandatory...more

Following Colonial Pipeline Ransomware Attack, Oil and Natural Gas Companies Must Prepare for New Regulations and Added Scrutiny...

The May 7, 2021, ransomware attack against Colonial Pipeline may be a turning point in the way the United States thinks about cybersecurity. The attack underscores the significant threat cyberattacks pose to operational...more

Center for Internet Security Updates CIS Controls With Focus on Cloud, Mobile, and Remote Work

Now is a great time to review your security posture, as you have a new tool to help you. On May 18, 2021, the Center for Internet Security (CIS) released Version 8 of its CIS Controls, formerly known as the CIS Critical...more

White House Releases Wide-Ranging Executive Order on Cybersecurity

On Wednesday, the White House released a widely anticipated Executive Order on Improving the Nation’s Cybersecurity (EO). The EO addresses four major areas of cybersecurity maturity for the federal government and its private...more

101 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide