News & Analysis as of

Business Continuity Plans Cybersecurity Risk Management

Mitratech Holdings, Inc

The Crucial Role of Business Impact Analysis (BIA) in Cyber Resilience

Cyber threats aren’t a distant possibility — they’re a daily reality. And according to IBM’s Cost of a Data Breach Report, they’re costing businesses more than ever. The global average data breach cost has surged to $4.88...more

Mitratech Holdings, Inc

5 Common Pitfalls in IT Disaster Recovery (and How to Avoid Them)

Even the strongest IT/DR plans can fail if they aren’t proactive about avoiding these common mistakes. When systems go down, business grinds to a halt. Downtime leads to $9,000 in losses per minute on average, damaged...more

Mitratech Holdings, Inc

Red Flags In Your Vendor’s Business Continuity Plan

Ensure your vendors are crisis-ready by recognizing these key indicators of weak continuity planning. The interconnected nature of modern business means that your vendors’ operational resilience can, and frequently does,...more

Mitratech Holdings, Inc

BCP & IT/DR: Why Your Business Continuity Strategy Needs Both

Balancing Business Continuity and IT Disaster Recovery is crucial for robust organizational resilience. So, how does your organization integrate both strategies for maximum impact?...more

Troutman Pepper Locke

6 Tips for Cos. Facing Service Provider Cyber Incidents

Troutman Pepper Locke on

It is no secret that ransomware dominates headlines, and cybersecurity incidents have become part of our everyday language. However, the criminal “business model” behind ransomware keeps evolving. Originally published in...more

Mitratech Holdings, Inc

Aligning your cyber risk management program with your company’s bottom line

The key to gaining buy-in for your cyber risk roadmap under tightening budgets and staffing challenges. This statement should come as no surprise: there’s been an alarming rise in the number and sophistication of cyber...more

Mitratech Holdings, Inc

[Webinar] Expert Perspectives: Implementing DORA, Mastering the Challenges and Opportunities - May 17th, 9:00 am ET

DORA is set to transform how European based Financial Institutions enhance the operational resilience of their critical business processes. With an implementation date of 17th January 2025 the evolving nature of the...more

Woods Rogers

Cybersecurity Awareness Month: Tips On Practicing Basic Cyber Hygiene

Woods Rogers on

In our first article to kick off Cybersecurity Awareness Month, we will discuss some steps businesses can take to improve their cyber hygiene.  Over the past few years, some of the largest and well-known companies have been...more

BCLP

Supervision of Vendors When Outsourcing - The Buck Stops with FINRA Member Firms

BCLP on

Key Takeaways: ..On August 13, 2021, FINRA issued Regulatory Notice 21-29 (“RN 21-29”) to remind member firms that they must establish and maintain an adequate supervisory system, including written supervisory procedures...more

Opportune LLP

Top 4 Tips When Creating Your Business Continuity Plan

Opportune LLP on

Find out why developing and continually maintaining a business continuity plan can help energy companies better prepare for unexpected disturbances....more

Woods Rogers

Colonial Pipeline – A Ransomware Attack Hits Close To Home

Woods Rogers on

If you had never heard of the Colonial Pipeline Company before this week, chances are that you have heard about it now.  Sitting in your car waiting in long lines to fill up at your local gas station hoping they don’t run out...more

Bennett Jones LLP

Crisis and Risk Management Survey 2020 Summary of Findings

Bennett Jones LLP on

To learn more about the current state of crisis and risk management, Bennett Jones commissioned an independent survey by Environics to understand what corporate concerns are most pressing for Canadian general counsel and...more

American Conference Institute (ACI)

[Virtual Event] Crown Corporate Governance Annual Conference - January 19th - 20th, 10:15 am - 6:00 pm EST

Practical Strategies for Board Oversight of Government-Owned Entities and Agencies. The CI’s 16th Annual Conference on Crown Corporate Governance returns in a completely interactive virtual format to help you navigate a...more

Miller Canfield

Risks For RIA Firms in a COVID World

Miller Canfield on

In light of COVID-19, the U.S. Securities and Exchange Commission ("SEC"), recognizing that RIA Firms are facing operational, technological, commercial and other issues, has also outlined "regulatory and compliance questions...more

Robinson+Cole Data Privacy + Security Insider

The Importance of Focusing on Data Recovery and Business Continuity

In the wake of the increase in ransomware attacks, including data exfiltration prior to or during a ransomware attack, I think it is worth the time and resources to focus on data recovery and business continuity....more

Mitratech Holdings, Inc

Privacy, Pandemics, and Business Change…OH MY!!!

Economic uncertainty, health and safety, work from home, IT security issues, continuity, and operational resiliency…it is like an intricate pattern of dominos falling over....more

Shumaker, Loop & Kendrick, LLP

Client Alert: Employer Considerations for Remote Workers During and After COVID-19

Many employers found themselves supporting a remote workforce during the COVID-19 pandemic as they adapted quickly to stay-at-home orders and social distancing guidelines. As employers contemplate and implement a...more

Akerman LLP

Across the Digital Divide: Managing Remote Workers

Akerman LLP on

The explosive growth of teleworking during the COVID-19 pandemic has re-shaped notions about how we work, presenting novel challenges for management. Re-opening business worksites brings new legal and operational challenges...more

Allen Matkins

Mitigating Cybersecurity Risks In Remote Work Environments

Allen Matkins on

Due to the coronavirus pandemic, more employees are working from home than ever before. Companies have been forced to react to maintain productivity, often on reduced timelines and without the careful consideration, rigorous...more

Seyfarth Shaw LLP

Belonging, Connection, and Inclusion Amid COVID-19

Seyfarth Shaw LLP on

In a short span of time, we have gone from thinking about the virus as a distant concern to working remotely from home as we have been asked to help flatten the curve by social distancing. We are daily bombarded with news and...more

Cadwalader, Wickersham & Taft LLP

COVID-19 Update: Cybersecurity and Data Privacy Best Practices Remain Critical During the Coronavirus Pandemic

With much of the nation’s workforce transitioning to telework for the foreseeable future, hackers and scammers are lurking to take advantage of technical vulnerabilities and anxious targets. ...more

Foley Hoag LLP - Security, Privacy and the...

Beware of COVID-19-Based Cyber Attacks, Say US and UK Agencies

Malicious cyber actors have been exploiting the COVID-19 crisis, warn the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s National Cyber Security Centre (NCSC) in a joint...more

K2 Integrity

COVID-19: Managing the Security Risks of a Remote Workforce

K2 Integrity on

As COVID-19 remains prevalent, working remotely has become the new normal. This means that many organizations will have people working from home for extended periods, many of whom may not be familiar with the organization’s...more

Proskauer on Privacy

FTC Ramps up COVID-19 Activity After Improving its Data Security Enforcement Orders

Proskauer on Privacy on

With the spread of the novel coronavirus (COVID-19), cybersecurity criminals and scammers are ramping up their efforts to target vulnerable employers and workforces. The FTC announced today that since January they have...more

Lathrop GPM

Cybersecurity for a Remote Workforce

Lathrop GPM on

Coronavirus (COVID-19) has prompted a rush by many organizations to a remote working environment. This alert outlines key security considerations for remote work, plus some resources....more

38 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide