News & Analysis as of

Chief Information Security Officer (CISO) Data Protection

Woodruff Sawyer

How to Hire a CISO as Scrutiny Intensifies

Woodruff Sawyer on

The role of the chief information security officer (CISO) in 2024  is evolving. With budgetary limitations, an increasingly complex threat environment, generative artificial intelligence (AI) tools, new regulatory mandates, a...more

Society of Corporate Compliance and Ethics...

[Webinar] Navigating the Changing Cybersecurity Landscape - September 12th, 12:00 pm - 1:30 pm CT

Learning Objectives: - Gain an understanding of recent changes to the cyber security landscape - Where to start: elevate your cyber security risk management - Educate on the future of cyber security in healthcare and...more

Accelerynt, Inc.

Silent Threats, Unseen Risks: A Call to Transform Operational Security

Accelerynt, Inc. on

What if a single compromised credential could silently bring down your entire organization? Our recent threat hunts across Fortune 100 clients suggest that this isn't just a possibility—it's a reality....more

Orrick, Herrington & Sutcliffe LLP

RegFi Episode 42: Beyond the Breach: The CISO’s Role as a Strategic Risk Manager

RegFi co-hosts Jerry Buckley and Sherry Safchuk welcome Orrick partner Aravind Swaminathan for a conversation exploring the critical and evolving role of the Chief Information Security Officer in today’s corporate landscape.....more

Health Care Compliance Association (HCCA)

[Webinar] Understanding HIPAA De-Identification: Exploring the Mysterious 18th Identifier - August 22nd, 12:00 pm - 1:30 pm CT

Learning Objectives: - Understand the methods for de-identification - Learn about the differences between anonymization, de-identification, and pseudonymization - Understand what “potential for re-identification”...more

Holland & Knight LLP

SEC Cyber Enforcement Update: Which Way Are the SolarWinds Blowing?

Holland & Knight LLP on

The SEC has been aggressively pursuing cybersecurity investigations and enforcement actions against public companies and foreign private issuers. In these actions, the SEC often alleges one of two theories: 1) that the...more

Health Care Compliance Association (HCCA)

[Webinar] Mending the Fence: How State Privacy Laws are Closing the Gap on Health Consumer Privacy - June 18th, 12:00 pm - 1:30 pm...

Learning Objectives: - Explain the evolution of state data protection laws over the past year - Explore the focus on protecting health consumers - Describe practical approaches on how to build a privacy program when...more

Robinson+Cole Data Privacy + Security Insider

Proofpoint Survey Outlines Challenges for CISOs

Since I hang out with a lot of CISOs, and understand their pain points, I urge readers to send a “thank you” and “you are the best” message to their CISO. You can’t imagine the pressure and stress they are under to try to...more

Gardner Law

[Ongoing Program] SESSION 3: Privacy Policy Pop Quiz – Are You Ready? - August 8th, 1:00 pm - 1:45 pm CT

Gardner Law on

Are you responsible for privacy compliance at your company? Sharpen your pencils and grab your highlighters for this three-part series on critical privacy laws, DPOs and privacy officers (and when you should appoint one), and...more

Gardner Law

[Ongoing Program] SESSION 2: Do I Really Need A Privacy Officer, DPO or CISO? - July 18th, 1:00 pm - 1:45 pm CT

Gardner Law on

Are you responsible for privacy compliance at your company? Sharpen your pencils and grab your highlighters for this three-part series on critical privacy laws, DPOs and privacy officers (and when you should appoint one), and...more

Gardner Law

[Ongoing Program] SESSION 1: 10 Things You Should Know About Privacy, Consent, and HIPAA - June 13th, 1:00 pm - 1:45 pm CT

Gardner Law on

Are you responsible for privacy compliance at your company? Sharpen your pencils and grab your highlighters for this three-part series on critical privacy laws, DPOs and privacy officers (and when you should appoint one), and...more

Carlton Fields

No Password Required: LIVE From Sunshine Cyber Con

Carlton Fields on

Tamiko Fletcher —CISO at Kennedy Space Center With a Heart of Gratitude Tamiko Fletcher’s career at NASA began in 1999 as a cooperative education student. Her journey to CISO over the following 20 years is nothing short of...more

Miller Nash LLP

[Webinar] Privacy 101: Navigating the Digital Frontier - June 4th, 9:00 am - 10:00 am PT

Miller Nash LLP on

Join us for an insightful webinar with Miller Nash’s head of privacy and data security team, Eva Novick, and colleague, Delfina Homen, where we will delve into the essentials of privacy and data security in 2024. Whether...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2024

Robinson & Cole LLP on

CYBERSECURITY CISOs: New Report Outlines Risks of LLMs - I hang out with a lot of Chief Information Security Officers (CISOs), so this piece is for them. Of course, it will be of interest to all security professionals...more

Robinson+Cole Data Privacy + Security Insider

CISOs: New Report Outlines Risks of LLMs

I hang out with a lot of Chief Information Security Officers (CISOs), so this piece is for them. Of course, it will be of interest to all security professionals struggling with assessing the risk of large multimodal models...more

Health Care Compliance Association (HCCA)

As AI-Assisted Research Advances, Experts Share Worries, Oversight Strategies; Collaboration Urged

At Cornell University, institutional review board (IRB) members meet with the chief information security officer and a liaison to the general counsel’s office. Their regular attendance has been “really critical,” said IRB...more

Jones Day

New York Governor Proposes Stringent Cybersecurity Regulations for Hospitals

Jones Day on

New York is the first state to propose cybersecurity requirements for all hospitals operating in the state to address patient safety and other cybersecurity related issues....more

A&O Shearman

NYDFS Finalizes Significant Amendment to Part 500 Cybersecurity Regulation

A&O Shearman on

On November 1, 2023, the New York State Department of Financial Services (“NYDFS”) issued its Second Amendment (the “Amendment”) to its Cybersecurity Requirements for Financial Services Companies adopted in 2017, codified in...more

Jones Day

NYDFS Expands Cybersecurity Regulations: Extortion Payment Reporting, Corporate Governance, and Technical Requirements

Jones Day on

A major amendment to the New York State Department of Financial Services' cybersecurity regulations establishes affirmative cybersecurity oversight duties and requires companies to report extortion payments to the agency....more

Kramer Levin Naftalis & Frankel LLP

NY Department of Financial Services Finalizes Significant Amendments to Its Cybersecurity Regulations

The New York State Department of Financial Services (NYDFS) adopted comprehensive amendments to its cybersecurity regulations (known as Part 500) on Nov. 1. The draft amendments were first published in July 2022 and finalized...more

Troutman Pepper

NY DFS Amendments to Cybersecurity Regulations

Troutman Pepper on

On November 1, New York Governor Kathy Hochul announced that the state’s Department of Financial Services (NY DFS) has amended its Cybersecurity Regulations to “enhance cyber governance, mitigate risks, and protect New York...more

Paul Hastings LLP

NYDFS Releases Major Update to Part 500 Cybersecurity Requirements for Financial Services Companies

Paul Hastings LLP on

The New York Department of Financial Services (NYDFS) adopted a long-expected amendment to its Part 500 Cybersecurity Regulations (Part 500) this week. These are the first significant changes to Part 500 since its inception...more

The Volkov Law Group

Episode 282 -- CISO and CCOs -- The Evolving Partnership

The Volkov Law Group on

If you ask corporate board members and senior executives to list their number one risk (other than financial operations), the answer in today’s risk environment is clear – cybersecurity and data privacy. The rapid elevation...more

Guidepost Solutions LLC

Lines of Authority: The Critical Need for Role Clarity in Information Security Compliance

Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more

The Volkov Law Group

The Evolving Partnership: Compliance and Cybersecurity (Part I of IV)

The Volkov Law Group on

If you ask corporate board members and senior executives to list their number one risk (other than financial operations), the answer in today’s risk environment is clear – cybersecurity and data privacy.  The rapid elevation...more

142 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide