News & Analysis as of

Data Security Private Sector Data Privacy

Mayer Brown

The Cyber Executive Order: Key Takeaways for Businesses

Mayer Brown on

With high-profile cybersecurity incidents hitting the headlines, President Biden’s recent cybersecurity executive order seeks to strengthen security practices at federal agencies and government contractors. But what does the...more

Wiley Rein LLP

CISA Publishes Cybersecurity Incident Response and Vulnerability Response Playbooks with Intent of Increasing Expectations for the...

Wiley Rein LLP on

What: On November 16, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released Federal Government Cybersecurity Incident and Vulnerability Playbooks as part of the Biden Administration’s efforts to improve...more

Wiley Rein LLP

DHS/CISA Mandates Fixing Security Vulnerabilities, Warning Companies to be Vigilant

Wiley Rein LLP on

The Cybersecurity and Infrastructure Security Agency (CISA) issued a sweeping binding directive to federal agencies to patch hundreds of cybersecurity vulnerabilities that are considered major risks for cyber actors to cause...more

Lighthouse

Cybersecurity Defense: Recommendations for Companies Impacted by the Biden Administration Executive Order

Lighthouse on

As summarized in the first installment of our two-part blog series, President Biden recently issued a sweeping Executive Order aimed at improving the nation’s cybersecurity defense. The Order is a reaction to increased...more

Wiley Rein LLP

DHS and Cyber: What Should Companies Expect?

Wiley Rein LLP on

Megan Brown sits down with one of Wiley’s newest attorneys, Sam Kaplan, former Assistant Secretary for Cyber, Infrastructure, Risk and Resilience Policy at the U.S. Department of Homeland Security (DHS), to discuss the...more

McDermott Will & Emery

International News: Focus on Global Privacy and Cybersecurity - September 2020

McDermott Will & Emery on

Generally, contact tracing refers to an effort by public health officials to identify individuals with whom a patient who has tested positive for an infectious disease has been in close proximity. Public health officials will...more

Bryan Cave Leighton Paisner

Fingerprint Identification Technology

Fingerprint identification technology uses fingerprints to uniquely identify individuals. The technology has been used by law enforcement agencies for decades, and dozens of statutes regulate when government agencies may...more

Robinson+Cole Data Privacy + Security Insider

NIST draft report: international cybersecurity standardization needed

An interagency working group led by The National Institute of Standards and Technology (NIST) and The Department of Commerce recently published a draft report (the “Report”) recommending that the U.S. government increase its...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide