News & Analysis as of

Cybersecurity Risk Management SaaS

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Robinson+Cole Data Privacy + Security Insider

Privacy Tip #434 – Use of GenAI Tools Escaping Corporate Policies

According to a new LayerX report, most users are logging into GenAI tools through personal accounts that are not supported or tracked by an organization’s single sign on policy. These logins to AI SaaS applications are...more

Baker Donelson

Best Practices for Protecting Operations from Vendor's Cyber Incidents

Baker Donelson on

In the aftermath of a vendor's hack that crippled an industry, ensure your business is up to date on best practices for mitigating the risks of third-party cyber incidents. Many businesses struggle to adequately consider the...more

The Volkov Law Group

Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance

The Volkov Law Group on

Dottie Schindlinger is Executive Director of Diligent Institute, the global corporate governance research arm of Diligent - the largest SaaS software company in the Governance, Risk, Compliance (GRC), and ESG space. Diligent...more

Ankura

Common Causes of CFIUS Agreement Non-Compliance and Enforcement Risk

Ankura on

Following the update to the Committee on Foreign Investment in the United States (“CFIUS” or the “Committee”) Enforcement and Penalty Guidelines, the Committee has continued to signal its intention to more heavily leverage...more

Ankura

What is MDR and How Does it Fit Into Your Security Strategy?

Ankura on

The global cyber threat landscape is rapidly evolving. The number of attacks, threat vectors, and endpoints continues to grow exponentially alongside the average time to detect and respond to a security incident. Today,...more

Mitratech Holdings, Inc

Emerging Cyber Risks in the US & UK

Mitratech Holdings, Inc on

Cyber risk management has significantly escalated in importance, during the last couple of years, as a result of companies overcoming the operational challenges of the pandemic, transitioning to hybrid working, preparing for...more

EDRM - Electronic Discovery Reference Model

[Webinar] Managing Data Related Procedures Inside Corporate! - September 27th, 1:00 pm - 2:15 pm ET

Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more

Mitratech Holdings, Inc

The Impact of SEC’s Proposed New Rules in Cyber Risk Management

A new discourse in the cyber risk management landscape of US public companies is here. This past March 2022, the US Securities and Exchange Commission (SEC) added another item to their to-do list by announcing a...more

Mitratech Holdings, Inc

Leveraging Enterprise Risk Management for Business Advantage

Enterprise Risk Management (ERM) is not a new discipline. However, its profile has continued to evolve in recent years as organizations overcome the ongoing challenges of today’s ever changing business world....more

Mitratech Holdings, Inc

Cyber Risk Management in 2022: New Challenges and Opportunities

Cyber risk management has undergone a significant change over the last couple of years. What once was the headache of the IT or risk management department is now an issue of considerable interest to the Board and senior...more

Mitratech Holdings, Inc

What’s the OCC Banking Regulatory Outlook for 2022?

As the year’s end approaches, the US Office of the Comptroller of the Currency (OCC), a primary US banking regulator, has published its Banking Supervision Operating Plan for 2022. As you might expect, much of the OCC’s...more

Woods Rogers

Colonial Pipeline – A Ransomware Attack Hits Close To Home

Woods Rogers on

If you had never heard of the Colonial Pipeline Company before this week, chances are that you have heard about it now.  Sitting in your car waiting in long lines to fill up at your local gas station hoping they don’t run out...more

Mitratech Holdings, Inc

The Top 10 Vendor Risks & How to Manage Them

Increasing globalization, a heavy reliance on outsourcing, growth of cloud computing, and the transition to digitization and remote work since the COVID-19 crisis have each heightened the regulatory focus on vendor risk...more

Proskauer - New Media & Technology

Work-Outs of Technology and Services Agreements Challenged by COVID-19

In early February 2020, before most of us were truly aware of the implications of COVID-19, a well-respected IT consulting group predicted a $4.3 trillion global spend on information technology in 2020. Drivers of the...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2020 #4

Robinson & Cole LLP on

It’s getting difficult to keep up with the jargon of all of the new digital scams. The SaaSes in the beginning became regular business terms, such as Software-as-a-Service (SaaS), and Business Processes-as-aService (BPaaS)....more

Robinson+Cole Data Privacy + Security Insider

Data Privacy and Security in the Cannabis Industry

In November, cannabis won big in the midterm elections–in Michigan, the legalization of recreational cannabis passed, the legalization of medical cannabis passed in Utah and Missouri, and several states elected governors who...more

Hogan Lovells

The UK Cyber Essentials Requirements for IT Infrastructure provides a window into GDPR expectations for data security requirements

Hogan Lovells on

The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide