Critical infrastructure and essential services in the United States—especially small or rural service providers—are highly vulnerable to disruptions from cyber attacks. Given the ever-growing need for cybersecurity services...more
When an organization experiences a ransomware attack, it must address significant—and sometimes competing—challenges under pressing deadlines. These challenges include the following: evicting the threat actor from the network...more
During the latest webinar in our Energy Transition series, Partners Carl Fleming and Scott Ferber hosted PWC Principals Brad Bauch, US Power and Utilities Cybersecurity & Privacy Leader, and Mark Ray, Cybersecurity & Privacy,...more
When US President Joe Biden signed the Infrastructure Investment and Jobs Act (IIJA) into law on November 15, 2021, $2 billion was allocated to strengthen the nation’s cyber defenses. With this heightened focus on cyber risk...more
3/25/2022
/ Continuing Legal Education ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Department of Justice (DOJ) ,
Enforcement Actions ,
False Claims Act (FCA) ,
Federal Trade Commission (FTC) ,
New Regulations ,
Popular ,
Qui Tam ,
Risk Management ,
Securities and Exchange Commission (SEC) ,
Webinars ,
Whistleblower Awards ,
Whistleblower Hotlines ,
Whistleblower Protection Policies ,
Whistleblowers
What cyber threats are unique to the energy sector? Our Energy Transition Webinar Series continues on April 7 when McDermott Partners Scott Ferber and Carl J. Fleming host two principals in cybersecurity and privacy at PwC,...more
Complementing the patchwork of state data breach notification laws, a number of federal agencies recently have promulgated sector-specific reporting rules affecting a variety of companies, both directly and indirectly, with...more
12/10/2021
/ Biden Administration ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Executive Orders ,
Personally Identifiable Information ,
Popular ,
Reporting Requirements ,
Risk Management
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently issued a Ransomware Profile identifying steps organizations can take to prevent, respond to and recover from...more
9/24/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
NIST ,
Popular ,
Ransomware ,
Risk Management