Latest Posts › Cyber Attacks

Share:

Creating a Cyber Volunteer Force: Strategy and Options

Critical infrastructure and essential services in the United States—especially small or rural service providers—are highly vulnerable to disruptions from cyber attacks. Given the ever-growing need for cybersecurity services...more

Ransomware: To Pay or Not to Pay? It Just Got More Complicated

When an organization experiences a ransomware attack, it must address significant—and sometimes competing—challenges under pressing deadlines. These challenges include the following: evicting the threat actor from the network...more

Key Takeaways | Keeping the Lights On: Cyber Threat, Vulnerability and Oversight Considerations for the Energy Sector

During the latest webinar in our Energy Transition series, Partners Carl Fleming and Scott Ferber hosted PWC Principals Brad Bauch, US Power and Utilities Cybersecurity & Privacy Leader, and Mark Ray, Cybersecurity & Privacy,...more

[Webinar] Cyber Whistleblowing - New Risks and Exposures - April 21st, 12:00 pm - 1:00 pm EDT

When US President Joe Biden signed the Infrastructure Investment and Jobs Act (IIJA) into law on November 15, 2021, $2 billion was allocated to strengthen the nation’s cyber defenses. With this heightened focus on cyber risk...more

[Webinar] Keeping the Lights On: Cyber Threat, Vulnerability, and Oversight Considerations for the Energy Sector - April 7th,...

What cyber threats are unique to the energy sector? Our Energy Transition Webinar Series continues on April 7 when McDermott Partners Scott Ferber and Carl J. Fleming host two principals in cybersecurity and privacy at PwC,...more

Federal Data Breach Reporting Requirements Continue to Evolve

Complementing the patchwork of state data breach notification laws, a number of federal agencies recently have promulgated sector-specific reporting rules affecting a variety of companies, both directly and indirectly, with...more

NIST Issues Cybersecurity Framework for Ransomware Risk Management

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently issued a Ransomware Profile identifying steps organizations can take to prevent, respond to and recover from...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide