News & Analysis as of

Cyber Crimes Data Security Best Practices

Frost Brown Todd

Managing Data Security and Privacy Risks in Enterprise AI

Frost Brown Todd on

Artificial intelligence (AI), particularly generative AI, thrives on vast amounts of data, fueling AI capabilities, insights, and predictions. But with this reliance on data comes potential privacy and security risks. And...more

Kelley Drye & Warren LLP

[Webinar] 2022 WORKing Lunch Series: Protecting Your (Human) Resources: Fighting Business Email Compromise and Ransomware -...

HR employees are, willingly or not, the guardians of the company’s most sensitive collection of data—its employee’s personal information. Cybercriminals often perceive the human resources department as the perfect gateway...more

Hinshaw & Culbertson LLP

[Webinar] Cyber and Privacy Law for School Districts: An Overview of the Legal Issues and Risks - February 17th, 10:00 am CT

From remote classrooms to student devices—and everything in between—school districts have been thrown into the deep end with no life jacket when it comes to managing cybersecurity. Join us for a discussion of the unique...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

[Webinar] Privacy, Data and Cyber Security: The Current Legal Landscape - November 11th, 12:00 pm - 1:00 pm EST

Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more

Society of Corporate Compliance and Ethics...

[Virtual Event] 2021 Alaska Regional Compliance & Ethics Conference - February 26th, 8:25 am - 4:30 pm AKST

Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more

Fisher Phillips

Cybercriminals Target Healthcare Industry During The Pandemic

Fisher Phillips on

Several federal agencies have teamed up to warn healthcare employers of the increased threat they face as a result of malicious cybercriminals aiming to take advantage of the pandemic to wreak havoc on their operations. The...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

Blank Rome LLP

[Webinar] Primers for Pandemic Litigation Update - Critical Assets at Risk: Protecting Data Privacy and Trade Secrets during...

Blank Rome LLP on

With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more

NAVEX

Impact of Digitized Environments & Modern Workplaces on Internal Investigations

NAVEX on

One of the hallmarks of a successful investigation is rooted in the expression “knowing what you don’t know.” An experienced investigator knows a lot about a lot of things – different types of fraud, corruption, theft,...more

Cozen O'Connor

Eight Data Security Best Practices

Cozen O'Connor on

More and more companies are experiencing crippling data breaches. The statistics make for depressing reading. According to IBM Security’s Cost of a Data Breach Report 2019, the average cost of a data breach is $3.9 million...more

Foley Hoag LLP - Security, Privacy and the...

Minimizing Risk and Liability from Man in the Middle Attacks (or, How to Keep Your Company’s Wire Transfers from Going Awry)

Imagine this scenario: you’ve had a productive and mutually advantageous ongoing contractual relationship of several years with another party. You have built up quite a bit of trust over the years, and communicate regularly...more

Fisher Phillips

Don’t Take the Bait! “Spear Phishing” and “Whaling” Take Scams to the Next Level

Fisher Phillips on

For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more

Robinson+Cole Data Privacy + Security Insider

New York Stock Exchange releases cybersecurity guide for public companies

We continue to urge CEOs and boards of public companies (and private and not-for profits) to harken the call of getting a handle on cybersecurity risk to companies today. Not too soon, the New York Stock Exchange published a...more

Perkins Coie

SEC’s Increased Cybersecurity Enforcement and How to Reduce Your Risks

Perkins Coie on

The SEC announced last week that an investment adviser had agreed to settle charges that it failed to take required steps to protect against and respond effectively to a cybersecurity breach. The action comes on the heels of...more

Robins Kaplan LLP

9 Key Provisions of Outsourcing Contracts That Matter

Robins Kaplan LLP on

Outsourcing, whether technical or process-centric, has become an increasingly important component of businesses of all sizes. Handing over the complexity of ever-changing systems that require increasing expertise can often...more

Ballard Spahr LLP

FTC Can Regulate Cybersecurity Practices, Third Circuit Rules

Ballard Spahr LLP on

The Federal Trade Commission (FTC) can regulate cybersecurity policies and procedures as “unfair” acts or practices under Section 5 of the FTC Act, the U.S. Court of Appeals for the Third Circuit has ruled in a very important...more

Polsinelli

Mobile Health Devices and Cybersecurity: Federal Guidance for Management of Threats in Medical Devices

Polsinelli on

New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide