News & Analysis as of

Cyber Attacks Policies and Procedures Cybersecurity

Hogan Lovells

NIST finalizes cybersecurity incident response framework profile aligned with CSF 2.0

Hogan Lovells on

On April 3, NIST published practical incident response guidance aligned with its CSF 2.0 framework. The guidance outlines best practices in security incident preparation and response for organizations mapped across each of...more

Bennett Jones LLP

10 Key Questions to Guide Cyber Risk Management

Bennett Jones LLP on

Asking the right questions within your organization is key to effectively managing cyber risk. Here are 10 questions that you should ask your team...more

Jackson Lewis P.C.

OCR Proposed Tighter Security Rules for HIPAA Regulated Entities, including Business Associates and Group Health Plans

Jackson Lewis P.C. on

As the healthcare sector continues to be a top target for cyber criminals, the Office for Civil Rights (OCR) issued proposed updates to the HIPAA Security Rule (scheduled to be published in the Federal Register January 6). It...more

ArentFox Schiff

DFS Issues Circular Letter Addressing Cybersecurity Risks Related to AI

ArentFox Schiff on

On October 16, the New York Department of Financial Services (DFS) issued a circular letter addressing cybersecurity risks related to the increasing use of artificial intelligence (AI) in relation to insurers, insurance...more

Bilzin Sumberg

Federal Court Makes It Harder for Plaintiffs to Bring Data Breach Claims

Bilzin Sumberg on

In a recent federal case from New York, the court dealt a blow to plaintiffs suing over data breaches. The plaintiffs had filed a putative class action suit, alleging that they (and others like them) had been harmed by the...more

Perkins Coie

Cybersecurity for Lawyers: Open-Source Software Supply Chain Attacks

Perkins Coie on

In this post in our series on basic cybersecurity concepts for lawyers, we address open-source software (OSS) supply chain risk. OSS is software developed using an “open-source” protocol, meaning that its code is fully...more

Fisher Phillips

Insider Threats to Healthcare Data: What You Need to Know and 5 Steps You Can Take Now

Fisher Phillips on

Healthcare data breaches are occurring more frequently and on larger scales than ever before – and while you defend against cyberattacks and other external threats, make sure you do not overlook the critical role your...more

Spilman Thomas & Battle, PLLC

Decoded Technology Law Insights, V 5, Issue 4, May 2024

MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more

ArentFox Schiff

Health Care Providers Navigate Fallout of Major Cyberattack on Change Healthcare

ArentFox Schiff on

Change Healthcare, an affiliate of Optum and UnitedHealth Group, processes more than 15 billion health care transactions annually and touches one of every three patient records. On February 21, Change disconnected its...more

Jackson Lewis P.C.

Is Your Board Cyber-Ready? Leadership Steps to Support Corporate Cybersecurity

Jackson Lewis P.C. on

The growing concern around cyberthreats for companies across the nation is reflected in the increasingly crowded legislative landscape that provides guidance to organizations, employers, employees, consumers, and investors....more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

Pillsbury Winthrop Shaw Pittman LLP

DHS Implements New Security and Privacy Measures for Controlled Unclassified Information

The Department of Homeland Security amended its regulations due to the urgent need to protect Controlled Unclassified Information. On June 21, 2023, the Department of Homeland Security (DHS or Department) issued a final...more

Jenner & Block

Client Alert: Proposed SEC Amendments Will Require Regulated Companies to Scrutinize Cybersecurity Risks

Jenner & Block on

As cyber-attacks and data breaches pose an increasing threat to market participants, the US Securities and Exchange Commission (“SEC”) has become increasingly focused on the cyber risks to the public and the market at large....more

J.S. Held

The Importance of Cybersecurity in the Online Sports Betting Industry

J.S. Held on

Online sports betting has become a booming industry in recent years, with millions of people placing bets and wagers from their phones and computers. Ever since Murphy v. NCAA, the 2018 case in which the United States Supreme...more

Latham & Watkins LLP

Hong Kong Privacy Regulator Highlights Data Security Guidance as Cyberattacks Increase

Latham & Watkins LLP on

The Privacy Commissioner for Personal Data reminds organisations to review and implement appropriate data security measures amidst more data breaches. On 13 February 2023, the Privacy Commissioner for Personal Data of...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity: It begins and ends with preparation

The life cycle of a data security incident begins and ends with preparation. Unfortunately, there is no such thing as a network or system with “zero vulnerabilities.” There are jokes about absolute network security,...more

Jackson Lewis P.C.

How Modern Manufacturing Plants Can Protect Against Ransomware, Cyberattacks

Jackson Lewis P.C. on

To help protect against criminal ransomware and cyberattacks, modern manufacturing plants should ensure they have reasonable physical, administrative, and technical safeguards in place....more

Epiq

It's Time to Blow the Whistle on Deficient Cyber Reporting Programs

Epiq on

What exactly is cybersecurity whistleblowing? That is a question that all organizations should be asking, but the answer is not a simple one. According to the Merriam-Webster dictionary, a whistleblower is defined as an...more

J.S. Held

Cyber Security & Business Interruption: Foundations for Prevention and Mitigation

J.S. Held on

The modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information / data security and privacy evolve at the speed of the technical...more

Spilman Thomas & Battle, PLLC

The Academic Advisor - Education Law Insights, Issue 7, December 2022

Welcome to our 7th and final edition of The Academic Advisor for 2022 - our e-newsletter focused on education law insights. In this issue, we discuss the academic strike occurring at the University of California and how...more

Dechert LLP

Dechert Cyber Bits - Issue 25

Dechert LLP on

SEC Division of Examinations Issues Risk Alert on Regulation S-ID and Identity Theft Prevention Programs - On December 5, 2022, the Securities and Exchange Commission (“SEC”) Division of Examinations (“EXAMS”) issued a...more

Woods Rogers

HIPAA Security Rule: What are “Recognized Security Practices” and why are they important?

Woods Rogers on

A strong cybersecurity program can help defend against cyber attacks and protect sensitive patient data. Thanks to a 2021 amendment of the HITECH Act, when a breach occurs, it can also reduce enforcement penalties. The...more

Vinson & Elkins LLP

More Regulations Coming Down the Tracks: TSA Issues New Security Directive for Enhanced Railroad Cybersecurity

Vinson & Elkins LLP on

On October 18, 2022, the Transportation Security Administration (“TSA”) issued its Security Directive 1580/82-2022-01 on Rail Cybersecurity Mitigation Actions and Testing (the “Railroad Directive”), regulating designated...more

StoneTurn

Cyber Threat Actors 2022 – Understanding the Drivers of Crisis

StoneTurn on

Moving towards more predictive postures, leveraging multiple sources of information such as cyber threat, business, and geopolitical intelligence, allow organizations to gain a better handle on crises before they occur. By...more

80 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide