News & Analysis as of

Chief Information Security Officer (CISO) Data Security Data Protection

Woodruff Sawyer

How to Hire a CISO as Scrutiny Intensifies

Woodruff Sawyer on

The role of the chief information security officer (CISO) in 2024  is evolving. With budgetary limitations, an increasingly complex threat environment, generative artificial intelligence (AI) tools, new regulatory mandates, a...more

Society of Corporate Compliance and Ethics...

[Webinar] Navigating the Changing Cybersecurity Landscape - September 12th, 12:00 pm - 1:30 pm CT

Learning Objectives: - Gain an understanding of recent changes to the cyber security landscape - Where to start: elevate your cyber security risk management - Educate on the future of cyber security in healthcare and...more

Accelerynt, Inc.

Silent Threats, Unseen Risks: A Call to Transform Operational Security

Accelerynt, Inc. on

What if a single compromised credential could silently bring down your entire organization? Our recent threat hunts across Fortune 100 clients suggest that this isn't just a possibility—it's a reality....more

Health Care Compliance Association (HCCA)

[Webinar] Understanding HIPAA De-Identification: Exploring the Mysterious 18th Identifier - August 22nd, 12:00 pm - 1:30 pm CT

Learning Objectives: - Understand the methods for de-identification - Learn about the differences between anonymization, de-identification, and pseudonymization - Understand what “potential for re-identification”...more

Miller Nash LLP

[Webinar] Privacy 101: Navigating the Digital Frontier - June 4th, 9:00 am - 10:00 am PT

Miller Nash LLP on

Join us for an insightful webinar with Miller Nash’s head of privacy and data security team, Eva Novick, and colleague, Delfina Homen, where we will delve into the essentials of privacy and data security in 2024. Whether...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2024

Robinson & Cole LLP on

CYBERSECURITY CISOs: New Report Outlines Risks of LLMs - I hang out with a lot of Chief Information Security Officers (CISOs), so this piece is for them. Of course, it will be of interest to all security professionals...more

The Volkov Law Group

Episode 282 -- CISO and CCOs -- The Evolving Partnership

The Volkov Law Group on

If you ask corporate board members and senior executives to list their number one risk (other than financial operations), the answer in today’s risk environment is clear – cybersecurity and data privacy. The rapid elevation...more

Guidepost Solutions LLC

Lines of Authority: The Critical Need for Role Clarity in Information Security Compliance

Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more

Ankura

[Webinar] CMMC – Practical Solutions to Managing and Securing CUI Data, Perspectives of a Foreign Defense Contractor - November...

Ankura on

Currently defense contractors who receive or create Controlled Unclassified Information (“CUI”) from or for the U.S. Department of Defense (“DoD”) are subject to several contract-based cybersecurity requirements, including...more

Epiq

Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law

Epiq on

Professor, Attorney and Expert in Cybersecurity Policy & Governance, Kevin Powers joins Jerich Beason & Whitney McCollum to discuss where the law stands on “Hacking Back”. Everyone at some point wants to be Batman. During...more

Carlton Fields

No Password Required: The Philosopher CISO of Tallahassee Who Lives to Help Other People

Carlton Fields on

Thomas Vaughn is the current Chief Information Security Officer (CISO) of the City of Tallahassee and the former CISO of Florida. A kindhearted introvert who began his cybersecurity career in the Army and then the U.S. Coast...more

K2 Integrity

Cyber Predictions 2022

K2 Integrity on

Where We Stand - This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more

Perkins Coie

GLBA Safeguards Rule Updated to Impose New Data Security Requirements

Perkins Coie on

Following a 3-2 vote, the Federal Trade Commission (FTC) recently announced amendments to the Safeguards Rule under the Gramm-Leach-Bliley Act. The Safeguards Rule was first promulgated in 2002. The revisions are meant to...more

Epiq

CyberSide Chats: Recap of the White House Cyber Summit (with Amanda Fennell)

Epiq on

During this special edition of CISO vs CISO, Jerich Beason, CISO at Epiq, and Amanda Fennel, CSO & CIO at Relativity, discuss the White House Cyber Summit that took place in August. During this candid discussion, they provide...more

NAVEX

Moving Beyond Borders: How to Achieve Information Security in a Time of Zero Trust

NAVEX on

October is cybersecurity awareness month. So, what better time than now to talk about the more detailed proposals emerging from the current administration to strengthen cybersecurity, and how compliance officers and CISOs...more

Health Care Compliance Association (HCCA)

As Pandemic Enters 2nd Year, CISOs Face Ongoing Telework, Telemedicine Challenges

Report on Patient Privacy 21, no. 4 (April 2021) - As the COVID-19 pandemic progressed from its urgent beginning to almost a “new normal,” chief information security officers (CISOs) at health systems have been fighting...more

Fisher Phillips

New Federal Tools Can Help Private Sector Protect Trade Secrets From Cyberattacks – And May Soon Require Reporting

Fisher Phillips on

Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more

Mintz - Privacy & Cybersecurity Viewpoints

Data Breaches Can Cost $$ – Plus Ongoing Obligations (ask Home Depot): Lessons and Takeaways

The Home Depot, Inc. (“Home Depot”) recently entered into a multi-state Assurance of Voluntary Compliance with Attorneys General of 46 states and the District of Columbia (the “Settlement”) stemming from a massive 2014 data...more

White and Williams LLP

Ready or Not: NY SHIELD Act’s Data Security Requirements Go Into Effect March 21, 2020

White and Williams LLP on

As was previously written, last fall New York enacted the "Stop Hacks and Improve Electronic Data Security Act" (SHIELD ACT), which required businesses having private information of New York residents to implement a written...more

Sheppard Mullin Richter & Hampton LLP

New Trends Emerge in FTC Data Security Orders, Including Emphasis on C-Suite Involvement

The FTC recently summarized three major changes it made to its orders in data security cases. In a blog signaling these changes, the FTC Indicated that some of the things it has been requiring of companies in 2019 are here to...more

Bricker Graydon LLP

[Event] Ohio Insurance Cybersecurity Seminar - January 24th, Cincinnati, OH

Bricker Graydon LLP on

What GCs, CIOs, CSOs and CPOs need to know about Ohio's new requirements under S.B. 273 - Please join GBQ and Bricker & Eckler for our Ohio Insurance Cybersecurity Seminar on Ohio Senate Bill 273 (codified @ Ohio Rev....more

McGuireWoods LLP

5 Cybersecurity Questions To Ask Your CISO

McGuireWoods LLP on

Continuing our coverage of cybersecurity issues during National Cybersecurity Awareness Month (NCSAM), we have identified 5 important cybersecurity questions and talking points you can use to start a meaningful cybersecurity...more

Womble Bond Dickinson

Data Breaches and Educational Institutions

Womble Bond Dickinson on

Five things schools, colleges and universities can do this summer to address data privacy and protect against cybersecurity threats. Consider these five steps during your summer break to address the protection of...more

Kelley Drye & Warren LLP

Raising the Bar: FTC’s Proposed Changes to the Safeguards Rule Would Establish a New Standard for Information Security Programs

The Federal Trade Commission (FTC) announced this week that it is seeking comments on proposed amendments to the Privacy Rule and Safeguards Rule under the Gramm-Leach-Bliley Act (GLBA)....more

The Volkov Law Group

Cybersecurity Compliance for Financial Institutions

The Volkov Law Group on

The New York Department of Financial Services has adopted detailed cybersecurity regulations for financial institutions. (Here). The NYDFS has filled a vacuum created by the failure of the federal government to act in this...more

28 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide