News & Analysis as of

Cyber Attacks General Data Protection Regulation (GDPR) Risk Management

J.S. Held

2025 J.S. Held Global Risk Report: Managing Cyber Risk

J.S. Held on

Cyber incidents such as the 2024 event involving Change Healthcare, which compromised the personal information of over 100 million people, highlight the evolving nature of cyber threats – increasingly becoming risk management...more

Mitratech Holdings, Inc

‘Tis the season for better cyber hygiene: navigating IT risk management in 2024

Mitratech Holdings, Inc on

Prepare your organization to stay one step ahead in the ongoing battle against cyber and IT risk management. As organizations increasingly leverage third-party services and cloud technologies, cybercriminals are becoming...more

HaystackID

[Webcast Transcript] Data Mining in Incident Response: Managing Risk and Spend through an Effective Evidence-Based Approach

HaystackID on

Editor’s Note: On August 31, 2022, HaystackID shared an educational webcast on the topic of data mining in data breach incident response. As data mining has increasingly become one of the largest expenses during a cyber...more

HaystackID

[Webcast Transcript] From Strategy to Tactics: Data Remediation at Private Equity and Hedge Funds

HaystackID on

On April 20, HaystackID shared an educational webcast developed to discuss best practices for handling big data and provide tangible field-experienced methods for data remediation. These best practices can be implemented at...more

Pullman & Comley, LLC

An Overview of Data Privacy and Protection Laws for Manufacturers

Pullman & Comley, LLC on

For many manufacturers, data privacy and protection laws may seem like legal concerns that apply to other, more consumer-facing companies.  While that may be largely true, given the ubiquitous nature of data, no business can...more

Latham & Watkins LLP

Vermeidung von DSGVO-Risiken nach Datenpannen und Cyberangriffen

Latham & Watkins LLP on

Die DSGVO macht es deutlich komplizierter, richtig auf Angriffe von Hackern, Datenpannen oder sonstige Cybersecurity-Vorfälle zu reagieren. Bei Fehlern drohen hohe Bußgelder, Schadensersatzforderungen, Kündigungen von...more

Hogan Lovells

Hogan Lovells Asia Pacific Data Protection and Cyber Security Guide 2020

Hogan Lovells on

It is no overstatement to say that 2019 saw a torrid pace of development of Asia-Pacific region data protection and cybersecurity laws. Such was the rate and complexity of change that it is not straightforward to distil...more

Seyfarth Shaw LLP

Powering Data Breach Response with AI: A Case Study

Seyfarth Shaw LLP on

The specter of a data breach is an unfortunate reality for anyone that uses a computer. Corporations are obviously large targets, with potentially thousands of employees doing things on computers. Some of those things are...more

Mitratech Holdings, Inc

Data Governance And Data Management: What’s The Difference?

Mitratech Holdings, Inc on

A lot of attention is now being paid to the topic of data governance, and what it means versus data management. Within the last few years, data governance has leapt from an esoteric term bandied about only by IT...more

BCLP

Hotels and GDPR

BCLP on

We are now over a year on from the major changes made to the European data protection regime by the GDPR so it is time to revisit what the changes mean now for the hospitality sector and investment in it, given increased...more

Mitratech Holdings, Inc

The Scariest Data Privacy Breaches of 2019

Mitratech Holdings, Inc on

With it being Halloween, October being National Cybersecurity Awareness Month, and 2019 drawing to an end, let’s take a look at the data privacy breaches giving compliance professionals a fright this year! ...more

Farella Braun + Martel LLP

Keeping Up With the Risks and Protections of Cyber Insurance

An obscure niche product less than a decade ago, cyber insurance is now a staple of many companies’ risk transfer programs. Its rise in prominence is no wonder. High-profile data breaches have caused businesses millions of...more

Hogan Lovells

Best practices for managing cybersecurity risks related to IoT-connected medical devices

Hogan Lovells on

Connected medical devices deliver numerous benefits not available before, including improved monitoring of patient welfare and a wealth of vital data. But for all the advantages available through these devices, their...more

A&O Shearman

WannaCry Global Ransomware Attack: What You Need to Know

A&O Shearman on

The WannaCry ransomware attack was first reported on Friday, May 12. Within hours, it shut down thousands of computer systems, locking users out of their own files. The latest report estimates over 300,000 computers in 150...more

Alston & Bird

The Digital Download - Alston & Bird’s Privacy & Data Security Newsletter – November 2016

Alston & Bird on

Updates on the EU: German DPA Publishes First Privacy Shield Guidelines, Requires German-Law Contracts for Transfers. On June 7, 2016, the European Commission adopted the EU-U.S. Privacy Shield. One question that many...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide