Join members of McDermott’s Global Privacy & Cybersecurity team and Alan Gutierrez-Arana of Mazars for the next installment in our PCI DSS 4.0 series. PCI DSS 4.0 brings major changes to payments with an increased focus on...more
5/26/2023
/ Continuing Legal Education ,
Credit Cards ,
Cybersecurity ,
Data Security ,
Debit and Credit Card Transactions ,
Information Security ,
Payment Processors ,
Popular ,
Risk Assessment ,
Risk Management ,
Sensitive Personal Information ,
Third-Party Risk ,
Third-Party Service Provider ,
Webinars
Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more
6/10/2022
/ Continuing Legal Education ,
Contract Drafting ,
Contract Negotiations ,
Contract Terms ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
International Data Transfers ,
Popular ,
Privacy Laws ,
Risk Management ,
Standard Contractual Clauses ,
Vendors ,
Webinars
In an effort to “promote privacy and cybersecurity by upholding the legal right of individuals, network owners, operators, and other persons to ensure the confidentiality, integrity, and availability of information stored in...more
On December 10, 2021, multiple media outlets, the Cybersecurity and Infrastructure Security Administration (CISA), and the director of cybersecurity at the National Security Agency (NSA) began alerting to a significant...more
12/13/2021
/ Corporate Counsel ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Data Security ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
National Security ,
National Security Agency (NSA) ,
Popular ,
Software
McDermott Will & Emery is hosting a webinar with ON2IT to discuss cybersecurity risk and what has become the prevailing cybersecurity strategy known as “Zero Trust.” The webinar will be a fireside chat between Todd...more
10/11/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Incident Response Plans ,
Popular ,
Risk Management ,
Webinars
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently issued a Ransomware Profile identifying steps organizations can take to prevent, respond to and recover from...more
9/24/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
NIST ,
Popular ,
Ransomware ,
Risk Management
We invite you to attend McDermottTech 2021, a virtual conference exploring the latest global trends impacting the technology industry.
Please join us for this complimentary program on September 21, 2021, for the opportunity...more
8/18/2021
/ Banking Sector ,
Central Bank Digital Currency (CBDCs) ,
Cryptocurrency ,
Cyber Attacks ,
Cybersecurity ,
Digital Assets ,
Digital Currency ,
Financial Services Industry ,
Non-Fungible Tokens (NFTs) ,
Popular ,
Ransomware ,
Smart Car ,
Smart Devices ,
Technology Sector ,
Webinars
On August 20, 2020, a criminal complaint was filed charging Joseph Sullivan, Uber’s former chief security officer, with obstruction of justice and misprision of a felony in connection with an alleged attempted cover-up of a...more
9/1/2020
/ Bug Bounty Program ,
Confidential Information ,
Corporate Counsel ,
Data Breach ,
Enforcement Actions ,
Ethics ,
Extortion ,
Federal Trade Commission (FTC) ,
Hackers ,
Information Management ,
Information Technology ,
Personal Information ,
Popular ,
Risk Management ,
State Data Breach Notification Statutes ,
Uber