News & Analysis as of

Data Security Cybersecurity Chief Information Security Officer (CISO)

Accelerynt, Inc.

Trapped in the Vendor Web: When More Vendors Can Mean Less Security

Accelerynt, Inc. on

More vendors were supposed to mean more protection. The thinking was simple: pick the best in every category—endpoint, identity, SIEM, automation—and assemble a flexible, layered defense. But over time, that flexibility...more

NAVEX

Business resiliency needs to take centerstage if you want to keep pace with cyber threats and supply chain disruptions

NAVEX on

2024 was a year of numerous and notable cybersecurity failures – although, to be fair, most years are now marred by numerous and notable cybersecurity failures. That’s no longer anything special. What makes 2024 interesting...more

Jackson Lewis P.C.

AI versus MFA

Jackson Lewis P.C. on

Ask any chief information security officer (CISO), cyber underwriter or risk manager, or cybersecurity attorney about what controls are critical for protecting an organization’s information systems, you’ll likely find...more

Sheppard Mullin Richter & Hampton LLP

Amendments to NYDFS’ Cybersecurity Regulations Take Effect November 1

The New York Department of Financial Services has modified its cybersecurity requirements for regulated entities. These requirements are in addition to those included in the regulations as last updated in November of last...more

Woodruff Sawyer

How to Hire a CISO as Scrutiny Intensifies

Woodruff Sawyer on

The role of the chief information security officer (CISO) in 2024  is evolving. With budgetary limitations, an increasingly complex threat environment, generative artificial intelligence (AI) tools, new regulatory mandates, a...more

Society of Corporate Compliance and Ethics...

[Webinar] Navigating the Changing Cybersecurity Landscape - September 12th, 12:00 pm - 1:30 pm CT

Learning Objectives: - Gain an understanding of recent changes to the cyber security landscape - Where to start: elevate your cyber security risk management - Educate on the future of cyber security in healthcare and...more

Accelerynt, Inc.

Silent Threats, Unseen Risks: A Call to Transform Operational Security

Accelerynt, Inc. on

What if a single compromised credential could silently bring down your entire organization? Our recent threat hunts across Fortune 100 clients suggest that this isn't just a possibility—it's a reality....more

HaystackID

Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity

HaystackID on

Editor’s Note: In this exploration of cybersecurity in the digital era, the article “Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity” considers the crucial intersection of...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2024

Robinson & Cole LLP on

CYBERSECURITY CISOs: New Report Outlines Risks of LLMs - I hang out with a lot of Chief Information Security Officers (CISOs), so this piece is for them. Of course, it will be of interest to all security professionals...more

Patterson Belknap Webb & Tyler LLP

New York’s Department of Financial Services Amplifies its Cybersecurity Regulations

On November 1, 2023, the New York State Department of Financial Services (“DFS”) amended its cybersecurity regulations to institute additional standards and controls aimed at securing sensitive data among the financial...more

Alston & Bird

The SEC Sues SolarWinds and Its CISO for Alleged Fraud and Disclosure Controls Failures

Alston & Bird on

Our Securities Litigation, Securities, and Privacy, Cyber & Data Strategy teams outline vital takeaways for public companies and their directors and officers in light of the Securities and Exchange Commission’s recent civil...more

Skadden, Arps, Slate, Meagher & Flom LLP

Private Equity CISO Fireside Chat – Cybersecurity Leadership in the Age of Generative AI

Partner and co-head of Skadden’s Cybersecurity and Data Privacy practice David Simon recently sat down with two chief information security officers (CISOs) from the private equity sector as part of the firm’s National Cyber...more

The Volkov Law Group

Episode 282 -- CISO and CCOs -- The Evolving Partnership

The Volkov Law Group on

If you ask corporate board members and senior executives to list their number one risk (other than financial operations), the answer in today’s risk environment is clear – cybersecurity and data privacy. The rapid elevation...more

Guidepost Solutions LLC

Lines of Authority: The Critical Need for Role Clarity in Information Security Compliance

Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more

Cozen O'Connor

Regulators and Cybersecurity Leaders Advise Businesses on How to Prepare For A Major Attack and the Consequences of Failure to Act

Cozen O'Connor on

On April 4, 2023, the office of Illinois Attorney General Kwame Raoul was joined by leaders in technology and law enforcement for a full-day symposium designed to inform CISOs, CTOs and CIOs on how best to protect their...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 3, March 2023

Amazon Sued for Not Telling New York Store Customers about Tracking Biometrics - “Thanks to a 2021 law, New York is the only major American city to require businesses to post signs letting customers know they’re tracking...more

Ankura

[Webinar] CMMC – Practical Solutions to Managing and Securing CUI Data, Perspectives of a Foreign Defense Contractor - November...

Ankura on

Currently defense contractors who receive or create Controlled Unclassified Information (“CUI”) from or for the U.S. Department of Defense (“DoD”) are subject to several contract-based cybersecurity requirements, including...more

Epiq

Cyberside Chats: Protect Your Crown Jewels – Nobody breaks into a bank to steal the posters

Epiq on

Security expert, Roselle Safran, joins hosts Jerich Beason & Whitney McCollum have come together after realizing more people know more about “The Queen’s Crown Jewels” than those that are vital to their company. How do you...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, Volume 3, Issue 12

Universities Share Lessons Learned from Ransomware Attacks "According to a recent Sophos poll of IT professionals, 44 percent of educational institutions suffered ransomware attacks in 2020, and 58 percent of those hit...more

Epiq

Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law

Epiq on

Professor, Attorney and Expert in Cybersecurity Policy & Governance, Kevin Powers joins Jerich Beason & Whitney McCollum to discuss where the law stands on “Hacking Back”. Everyone at some point wants to be Batman. During...more

Carlton Fields

No Password Required: The Philosopher CISO of Tallahassee Who Lives to Help Other People

Carlton Fields on

Thomas Vaughn is the current Chief Information Security Officer (CISO) of the City of Tallahassee and the former CISO of Florida. A kindhearted introvert who began his cybersecurity career in the Army and then the U.S. Coast...more

K2 Integrity

Cyber Predictions 2022

K2 Integrity on

Where We Stand - This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 22, Number 1. Privacy Briefs: January 2022

Report on Patient Privacy 22, no. 1 (January, 2022) - New Jersey issued its third settlement in three months on state-level health care privacy and security laws, announcing that three cancer care providers would adopt new...more

Epiq

CyberSide Chats: Recap of the White House Cyber Summit (with Amanda Fennell)

Epiq on

During this special edition of CISO vs CISO, Jerich Beason, CISO at Epiq, and Amanda Fennel, CSO & CIO at Relativity, discuss the White House Cyber Summit that took place in August. During this candid discussion, they provide...more

NAVEX

Moving Beyond Borders: How to Achieve Information Security in a Time of Zero Trust

NAVEX on

October is cybersecurity awareness month. So, what better time than now to talk about the more detailed proposals emerging from the current administration to strengthen cybersecurity, and how compliance officers and CISOs...more

47 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide