News & Analysis as of

Data Breach Strategic Planning

Furia Rubel Communications, Inc.

Embracing Data Privacy to Drive Business Growth with Aihong Yu, Chief Privacy Counsel of CDK Global

In this episode of On Record PR, Gina Rubel goes on record with Aihong Yu, Chief Privacy Counsel of CDK Global, to discuss how embracing privacy and security measures…...more

J.S. Held

Cyber Security & Business Interruption: Foundations for Prevention and Mitigation

J.S. Held on

The modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information / data security and privacy evolve at the speed of the technical...more

WilmerHale

In Case You Missed It: Launch Links - September 2021 #3

WilmerHale on

Some interesting links we found across the web this week: What Does the US Data Breach Bill Mean for Your Organization? A business must always be wary of the potential for cyberattacks and data breaches, and Congress...more

BCLP

Avoiding Management Struggles When it Comes to Data Breaches: Part 3

BCLP on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

Akin Gump Strauss Hauer & Feld LLP

Top 10 Topics for Directors in 2019

1. Corporate Culture - The corporate culture of a company starts at the top, with the board of directors, and directors should be attuned not only to the company’s business, but also to its people and values across the...more

Akin Gump Strauss Hauer & Feld LLP

Top 10 Topics for Directors in 2018

EXECUTIVE SUMMARY - 1. Cybersecurity threats. Cybersecurity preparedness is essential in 2018 as the risk of, and associated adverse impact of, breaches continue to rise. The past year redefined the upward bounds of the...more

BCLP

Avoiding Management Struggles When it Comes to Data Breaches: Part 6

BCLP on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

BCLP

Avoiding Management Struggles When it Comes to Data Breaches: Part 4

BCLP on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

BCLP

Avoiding Management Struggles When it Comes to Data Breaches: Part 3

BCLP on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

BCLP

Avoiding management struggles when it comes to data breaches: Part 2

BCLP on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

Poyner Spruill LLP

Lessons Learned from Target’s Data Breach Discovery Win - Five Strategies for Maintaining Privilege in the Aftermath of a Data...

Poyner Spruill LLP on

A thousand questions immediately flood any lawyer’s mind when they first hear that their client may have been affected by a data breach. How did it happen? What data were affected? Was there any personal information affected,...more

Pillsbury Winthrop Shaw Pittman LLP

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

Katten Muchin Rosenman LLP

Cyber-Attacks: Threats, Regulatory Reaction and Practical Proactive Measures to Help Avoid Risks

I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more

Troutman Pepper

Is Your Financial Institution the Next Target of a Cyber-Attack?

Troutman Pepper on

In This Presentation: - Regulatory expectations for financial institutions - Risks for financial institutions - Planning to reduce risks - The Breach - Duties and responsibilities -...more

Dorsey & Whitney LLP

Guidance for Incident Response Plans  

Dorsey & Whitney LLP on

Organizations are preparing for data incidents and breaches by developing, updating, implementing, and testing incident response plans. This article provides a checklist of key components of an incident response plan. ...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide