News & Analysis as of

Crisis Management Cybersecurity Cyber Insurance

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 3rd, Atlanta, GA

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 2nd, Charlotte, NC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 1st, Raleigh, NC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - October 30th, Washington, DC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Locke Lord LLP

Privacy And Cybersecurity Work From Home Considerations In The Context of Coronavirus

Locke Lord LLP on

We want to enable our personnel to work from home during this health crisis. What do we need to worry about from a privacy and cybersecurity perspective? 1.Equipment. Personnel working remotely will need equipment, and you...more

Carlton Fields

COVID-19 and Cybersecurity: Best Practices in an Uncertain Landscape

Carlton Fields on

For many people and organizations, COVID-19 caused a rapid transition to remote learning and working; for hackers and other bad actors, it has created new opportunities. Whether by virtue of a remote and distracted workforce,...more

Lowndes

Five Cybersecurity Practices to Minimize Risk During Coronavirus

Lowndes on

As concerns about the coronavirus (COVID-19) continue to grow, many companies are planning to have more employees work from home. While these measures are aimed at keeping employees healthy and safe, it’s also important to...more

Pillsbury - Policyholder Pulse blog

The Missing Piece of the Cyber Response Plan Puzzle – The Insurance Component

Experts are full of advice about the importance of designing and implementing a robust cyber breach response plan. They opine frequently on its key components, such as identifying the roles and responsibilities of the...more

Fisher Phillips

Cyber Insurance: Get What You Pay For              

Fisher Phillips on

Due to the increasing number of successful and attempted cyber-attacks and increased government scrutiny surrounding protection of confidential information, companies cannot ignore the various risks associated with potential...more

Bass, Berry & Sims PLC

Privacy Perils: To Insure or Not to Insure – Options for Cyberliability Insurance

The commercial cyberliability insurance market is well-established, with U.S. corporations now spending in excess of $1 billion annually on insurance premiums for coverage....more

Foley Hoag LLP - Security, Privacy and the...

Cybersecurity and Risk Management: “Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers”

A timely new resource for business executives, technology professionals, and lawyers alike is the newly-published Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers from the New York...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide