News & Analysis as of

Best Practices Cyber Incident Reporting Risk Management

StoneTurn

2025 Incident Response Landscape: Practical Tips for Cybersecurity Readiness

StoneTurn on

Organizations seeking to improve their cybersecurity posture in 2025 must assess what happens after an incident has occurred, and how an incident response team will be able to mobilize to respond. This article provides...more

Brooks Pierce

Business Associate Victim of Ransomware Attack Pays $100,000 to HHS OCR

Brooks Pierce on

Is your organization a business associate? You could be subject to enforcement action if you fail to protect health information within your control from ransomware attacks. In October, for the first time, the U.S....more

Ankura

[Webinar] SEC New Cybersecurity Final Rule: A Different Perspective from the Viewpoints of the CISO, General Counsel, & The Board...

Ankura on

Any time a regulation is put forth, there is always a level of uncertainty, especially regarding understanding the roles and responsibilities of key business leaders. The SEC’s new cybersecurity final rule means heightened...more

American Conference Institute (ACI)

[Event] 9th National Conference on CFIUS - April 13th - 14th, Arlington, VA

Hosted by American Conference Institute (ACI), the 9th National Conference on CFIUS returns for another exciting year with curated programming and an impressive lineup of leaders from government, industry and private practice...more

Health Care Compliance Association (HCCA)

[Virtual Event] 2021 Virtual Regional Healthcare Compliance Conference - Atlanta, GA - January 22nd, 8:25 am - 5:30 pm EST

Our Virtual Regional Healthcare Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask...more

Harris Beach Murtha PLLC

Six Steps To Take Immediately After You Suspect Wire Fraud

Wire fraud is on the rise. Health care providers engaging in transactions, whether operational or financial, need to remain aware of crimes involving compromised emails and fraudulent wire transfers....more

Pillsbury - Policyholder Pulse blog

The Missing Piece of the Cyber Response Plan Puzzle – The Insurance Component

Experts are full of advice about the importance of designing and implementing a robust cyber breach response plan. They opine frequently on its key components, such as identifying the roles and responsibilities of the...more

Fisher Phillips

Don’t Take the Bait! “Spear Phishing” and “Whaling” Take Scams to the Next Level

Fisher Phillips on

For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide