Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more
10/12/2023
/ Crisis Management ,
Cyber Attacks ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Events ,
Incident Response Plans ,
Risk Mitigation
Cyberinsurance spurs many complaints from US business. The cost is skyrocketing, retentions (deductibles) are rising quickly, and the insurance companies push their own panel lawyers on customers despite other relationships....more
3/24/2022
/ Cyber Attacks ,
Cyber Insurance ,
Hackers ,
Lloyds of London ,
Malware ,
Military Conflict ,
Policy Exclusions ,
Policy Terms ,
Ransomware ,
Russia ,
Ukraine
President Biden has signed into law the Consolidated Appropriations Act of 2022 (2022 CAA), which includes the Cyber Incident Reporting for Critical Infrastructure Act (Cyber Incident Reporting Act). The Cyber Incident...more
Russia initiated a full-scale invasion of one of its sovereign neighbors and the Western world has responded with censure and fury. Our governments and financial institutions have cut off Russian access to money....more
This week I read a worried headline claiming that, in a recent consumer data breach, the hackers had managed to access consumers’ telephone numbers. This was treated as an important and troubling revelation....more
11/19/2021
/ ATDS ,
Bots ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Digital Wallets ,
Hackers ,
Mobile Apps ,
Multi-Factor Authentication ,
Online Banking ,
Phishing Scams ,
Phone Numbers ,
Popular ,
Spyware
The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more
A few years ago, if you wanted to wreak havoc online, you needed some skill. You needed to understand coding and how to break into other computers. You needed to develop attack bots and probe for vulnerabilities....more
In February 2014 the U.S. National Institute of Standards in Technology (‘NIST’) published the ?rst NIST Cybersecurity Framework, responding to an Executive Order on improving critical infrastructure cybersecurity issued by...more
4/23/2018
/ Cloud Service Providers (CSPs) ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Framework ,
Data Protection ,
Data Protection Officers (DPOs) ,
Executive Orders ,
Hackers ,
Internet of Things ,
NIST ,
Point of Sale Terminals ,
Popular ,
Public Safety ,
Regulatory Requirements ,
Risk Management ,
Self-Regulatory Organizations ,
Trump Administration
Your business may have been victim to the latest ransomware attack, or it may be caught in the next wave.
On May 12, 2017, the “WannaCry” ransomware attack compromised over 70,000 organizations in nearly 100...more
The cyber war battlefield has expanded, and your business is now a fighter and a target.
A new U.S. Government report explains many reasons for identifying and penalizing Russian hackers, the Russian intelligence...more