News & Analysis as of

Data Security Risk Mitigation

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

BakerHostetler

Let’s Get Physical - OCR Issues Reminder that HIPAA Security Isn’t Just Technical

BakerHostetler on

While most entities that are subject to the HIPAA Security Rule spend considerable time and effort ensuring that they have implemented appropriate administrate and technical safeguards to protect the health information that...more

Harris Beach PLLC

What to Include in Your Company’s Internal Generative AI Use Policy

Harris Beach PLLC on

As generative artificial intelligence continues to revolutionize business operations across industries, it has become imperative for companies to establish robust internal policies governing its use by employees. This alert...more

Benesch

AI Reporter - August 2024

Benesch on

Google and Microsoft are spearheading the Coalition for Secure AI, focusing on supply chain security and mitigation strategies. Whether this attempt at self-regulation will ultimately succeed is unknown, as it overlaps with...more

Alston & Bird

CISA and JCDC Conduct First-Ever Public-Private AI Security Incident Tabletop Exercise

Alston & Bird on

On June 13, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) collaborated with the Joint Cyber Defense Collaborative (JCDC) to hold the federal government’s first tabletop exercise for “AI security...more

Epiq

The Importance of Data Security in Bankruptcy Claims

Epiq on

Data security is a major concern across virtually all areas of the legal profession particularly in 2024 thanks in part to a record-breaking number of cyber incidents last year that cost companies an average of $4.45 million...more

Robinson+Cole Data Privacy + Security Insider

Halcyon Provides Intel on Volcano Demon Ransomware

Security research firm Halcyon recently reported that it “encountered” a new ransomware organization dubbed Volcano Demon several times in the past few weeks....more

Wyrick Robbins Yates & Ponton LLP

Possible… but Practical? HUD’s New 12 Hour Cyber Incident Reporting Requirement for FHA-Approved Mortgagees

On May 23, 2024, the U.S. Department of Housing and Urban Development (“HUD”) issued requirements, effective immediately, for all FHA-approved mortgagees to report certain cyber incidents to HUD within 12 hours of detection....more

EDRM - Electronic Discovery Reference Model

[Webinar] Generative AI for Smart Discovery Professionals: An Introduction to Large Language Models - July 16th, 1:00 pm - 2:00 pm...

On July 16th at 1 pm ET,  join legal luminary John Tredennick and GenAI pioneer Dr. William Webber of Merlin Search Technologies for a Master Class on how Large Language Models (LLMs) are transforming investigations and...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #404 – July is Military Consumer Month Helpful Tips for Those in Service + Thank You

July is Military Consumer Month. This month, we celebrate democracy and the past service of our veterans and those presently in service for protecting us and our democracy. Thank you so very much....more

Robinson+Cole Data Privacy + Security Insider

HC3 Issues Threat Reports on Qilin + MoveIt

The Health Sector Cybersecurity Coordination Center (HC3) provides timely updates to the health care sector on cybersecurity threats and mitigation. In the last several weeks, HC3 has issued two alerts worth paying close...more

Pillsbury - Global Sourcing Practice

The UK Government Announces Ambitious Proposals to Improve Software Security and Resilience

In light of the increasing organizational use of and reliance on software and the concerns raised regarding the malicious use of the same, the UK Government has published a response to its call for views on software...more

EDRM - Electronic Discovery Reference Model

Enhancing Security in Law Firms: The Imperative of Multi-Factor Authentication

In today’s digital age landscape, where 27% of law firms experience security breaches, protecting sensitive client information is paramount for legal professionals. With cyber threats becoming more sophisticated, relying...more

Womble Bond Dickinson

Cybersecurity Crunch: Building Strong Data Security Programs with Limited Resources - Insights from Tech and Financial Services...

Womble Bond Dickinson on

In today’s digital age, cybersecurity has become a paramount concern for executives navigating the complexities of their corporate ecosystems. With resources often limited and the ever-present threat of cyberattacks,...more

Kennedys

[Webinar] Days of reckoning: How to prepare for, respond to, and recover from ransomware and other cyberattacks - June 27th, 2:00...

Kennedys on

Kennedys and Booz Allen Hamilton are delighted to invite you to our 3 hour webinar on Thursday, June 27, 2024. This half-day seminar features three presentations: Clear and present danger, In the war room, and The fallout....more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Mitratech Holdings, Inc

Choosing the Right Software for Background Searches: Key Features to Consider

Background checks are essential in hiring, but many HR leaders skip them to save time. This approach causes headaches, so many employers turn to background search software. But with so many options available, how do you...more

Kennedys

[Webinar] Ransom-ready: Navigating recovery, remediation and legalities - June 4th, 11:00 am - 12:00 pm EST

Kennedys on

Kennedys and CYPFER are delighted to invite you to our 60 minute webinar on Tuesday, June 4, 2024. We will explore the practical and legal implications involved in navigating a ransomware event, and how decision-making in a...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - May 2024 #4

Robinson & Cole LLP on

CYBERSECURITY - CISA Issues Advisory on Black Basta Ransomware - On May 10, 2024, CISA, along with the FBI, HHS, and MS-ISAC, issued a joint Cybersecurity Advisory relating to Black Basta ransomware affiliates “that...more

Robinson+Cole Data Privacy + Security Insider

Generative AI Poses Unique Risks to Data Security, NIST Warns

Generative artificial intelligence (AI) has opened a new front in the battle to keep confidential information secure. The National Institute of Standards and Technology (NIST) recently released a draft report highlighting the...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues Advisory on Black Basta Ransomware

On May 10, 2024, CISA, along with the FBI, HHS, and MS-ISAC, issued a joint Cybersecurity Advisory relating to Black Basta ransomware affiliates “that have targeted over 500 private industry and critical infrastructure...more

EDRM - Electronic Discovery Reference Model

[Webinar] Building the Case: Get Buy-In to Minimize Data Across Your Organization - June 6th, 1:00 pm - 2:00 pm ET

In today's data-driven world, effectively managing data not only ensures compliance with numerous privacy laws but also enhances operational efficiency and reduces risk. "Building the Case: Get Buy-In to Minimize Data Across...more

U.S. Legal Support

[Webinar] Master Class: Navigating the Legal Landscape with Generative AI - May 30th, 10:00 am PST

U.S. Legal Support on

Since its debut in late 2022, ChatGPT has been hailed as a revolutionary technology with transformative potential, especially within the legal sector. Fast forward to today, and GPT, Claude, and other Large Language Models...more

Rumberger | Kirk

Understanding How Generative AI Can Affect Your Business' Data Privacy And Ownership Is Crucial

Rumberger | Kirk on

“In assessing a generative AI product, it is critical to understand issues of data ownership and privacy. This cumbersome task is necessary to learn how the AI platform will use data, if the data shared is entering an open or...more

328 Results
 / 
View per page
Page: of 14

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide