Cost of Noncompliance: More Than Just Fines
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
2023 DSIR Report Deeper Dive into the Data
Episode 282 -- CISO and CCOs -- The Evolving Partnership
Cyber Threats
No Password Required: A Developer Advocate with Auth0 and an "Accordion Guy" with Rockstar Aspirations
Cybersecurity Threats Facing Food and Agribusiness Companies & the Preparation and Protection Safeguards to Help Mitigate Them
[Podcast] NSA Cybersecurity Services for Defense Contractors
Dark Web Monitoring - Unauthorized Access Podcast
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Mandatory Cyber Incident Reporting: Pros, Cons, and Next Steps
Fighting the Constantly Evolving Threat of Cybercrimes
Part 2: Cybersecurity and the Role of Management
Part 1: Cybersecurity and the Role of Management
No Password Required: The Philosopher CISO of Tallahassee Who Lives to Help Other People
Ransomware, Geopolitical Tensions, and the Race to Regulate
In today’s digital world, cyber incidents pose a significant risk to businesses of all sizes. From data breaches to ransomware attacks, organisations face a barrage of threats and unfortunately, the discussion has moved from...more
If you feel like every day you wake up to a new data privacy law or piece of guidance, you’re not dreaming. Regulation and rulemaking are happening faster than ever before. The complexities relating to ethical data usage are...more
As cybersecurity breaches remain a common threat globally, the UK government has published a cybersecurity breach survey detailing various cybersecurity policies, processes, and reliances for all types of business....more
The United Kingdom’s National Cyber Security Centre (NCSC) recently released its 2022 Annual Review, which reports on the state of cyber security threats in the country. As the UK’s technical authority for cyber security, the...more
The crucial question that a company and its board will face if it suffers a cyber security breach is: "Had you taken reasonable steps to try to prevent a breach, and to prepare to handle any breach that occurred?" If the...more
The Department for Digital, Culture, Media & Sports (DCMS) confirmed on August 30, 2022, that it will push forward with tough new regulations and a code of practice to bolster the security and resilience of the United...more
Activity in the cybersecurity and data protection space continues to pick up as new laws and regulations are enacted in the U.S. and overseas. Highlighted below are five recent developments that could impact your business . ....more
In May the PRA’s Lyndon Nelson gave a speech about the development of the Regulator’s response to cyber risk. In his speech he...more
AI Public-Private Forum: BoE publishes minutes of second meeting The Bank of England (BoE) has published minutes from the second meeting of the Artificial Intelligence Public-Private Forum (AIPPF), which was held on 26...more
PIs and EMIs: HM Treasury consults on a new special administration regime - HM Treasury is consulting on proposed insolvency changes for payment institutions (PIs) and electronic money institutions (EMIs), including a...more
Two developments in the United Kingdom demonstrate the country’s renewed commitment to a sustainable data strategy with appropriate privacy and security safeguards. First, on September 9, 2020, the U.K. government published a...more
The UK National Cyber Security Centre and Canada’s Communications Security Establishment released an advisory linking APT29 (also known as, ‘the Dukes’ or ‘Cozy Bear’) to attacks against COVID-19 vaccine development in...more
As we reported in March, the COVID-19 pandemic is being leveraged by malicious cyber actors to make various cybersecurity attacks. ...more
On March 28, 2019, the Oversight Board of the United Kingdom’s Huawei Cyber Security Evaluation Centre (HCSEC) released a report identifying “serious and systematic defects in Huawei’s software engineering and cyber security...more
In a paper published last month,[i] the UK’s Financial Conduct Authority (“FCA”) set out various cybersecurity insights gleaned from the work of cyber coordination groups (“CCGs”) the regulator established in 2017. The...more
In this newsletter, we provide a snapshot of the principal European, US and selected international governance and securities law developments of interest to European corporates. ...more
In this month's edition of our Privacy & Cybersecurity Update, we discuss all 50 states now having data breach notification laws, state attorneys general and their opposition to a federal data breach notification law, the FBI...more
Cybercrime has become a critical issue for buyout firms as hackers are increasingly targeting sensitive business data to profit from insider knowledge. According to a Private Funds Management survey of 91 PE houses, 54% of PE...more
New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more
The European Banking Authority (EBA) has published its consultation document on security measures for operational and security risks under the revised Payment Services Directive (PSD2). The WannaCry ransomware attack that...more
Cybersecurity is a topical issue for pension schemes, and an increasingly important regulatory risk. Not only does the Pensions Regulator believe that trustees should be taking action to mitigate cyber risks, but there is...more
The PRA has published a Consultation Paper, which proposes the adoption of a new Supervisory Statement on affirmative and silent cyber underwriting risk. The consultation closes on 14 February 2017. For these purposes,...more
On 4 November 2015 the Home Secretary published a Draft Investigatory Powers Bill (the “Bill”), emphasising its importance in combating the increasingly sophisticated communication technologies used by criminals to intercept,...more
As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more