Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more
6/10/2022
/ Continuing Legal Education ,
Contract Drafting ,
Contract Negotiations ,
Contract Terms ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
International Data Transfers ,
Popular ,
Privacy Laws ,
Risk Management ,
Standard Contractual Clauses ,
Vendors ,
Webinars
The Apache Log4j vulnerability continues to command significant attention throughout the public and private sectors. In a recent interview, the director of the US Cybersecurity and Infrastructure Security Agency (CISA)...more
On December 10, 2021, multiple media outlets, the Cybersecurity and Infrastructure Security Administration (CISA), and the director of cybersecurity at the National Security Agency (NSA) began alerting to a significant...more
12/13/2021
/ Corporate Counsel ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Data Security ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
National Security ,
National Security Agency (NSA) ,
Popular ,
Software
McDermott Will & Emery is hosting a webinar with ON2IT to discuss cybersecurity risk and what has become the prevailing cybersecurity strategy known as “Zero Trust.” The webinar will be a fireside chat between Todd...more
10/11/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Incident Response Plans ,
Popular ,
Risk Management ,
Webinars
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently issued a Ransomware Profile identifying steps organizations can take to prevent, respond to and recover from...more
9/24/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
NIST ,
Popular ,
Ransomware ,
Risk Management
In April, the Chinese government issued a second version of the draft Personal Information Protection Law (Draft PIPL), which will impact global companies. Join us for a joint webinar as we discuss the key provisions of the...more
6/14/2021
/ China ,
Cybersecurity ,
Data Privacy ,
Data Processors ,
Data Protection ,
Data Security ,
International Data Transfers ,
Legislative Agendas ,
Multinationals ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
Webinars