News & Analysis as of

Hackers Cyber Incident Reporting Risk Management

NAVEX

DORA: Exploring Finance Compliance Requirements

NAVEX on

Numbers never lie. The second most targeted industry in terms of hacking and breaches is Finance, which was the victim somewhere in the realm of 2,306 to 2,792 cyberattacks in 2023 (depending on the source). With each data...more

Health Care Compliance Association (HCCA)

Hackers Increasingly Leveraging Threats to Patients to Pressure Health Organizations to Pay Ransom

Cyberhackers—potentially frustrated by their limited ability to extort ransom from health care entities in attacks—have started extorting the patients themselves, threatening them with the release of information or...more

Epiq

Move it or Lose it – With Cyber Breach Response, Time is of the Essence

Epiq on

There are so many factors that go into breach response. Determining the size of the breach, time limitations, legal requirements, notification needs, urgency for containment, and interrupted business operations are just a...more

Latham & Watkins LLP

Cyber Security Incidents als Herausforderung für die Rechtsabteilung - wichtigste Punkte, die Unternehmensjuristen über die...

Latham & Watkins LLP on

Hackerangriffe, Datendiebstahl, Ransomware, Datenpannen und sonstige Cybersecurity Incidents werden immer mehr zu einem zentralen Unternehmensrisiko. Dabei wird oft übersehen, dass dieses Thema nicht nur in technischer,...more

StoneTurn

Shifting Cyber Landscape – Crisis Awareness as a Means to Prevent and Prepare

StoneTurn on

Crises and uncertainty are inevitable forces in modern business, particularly in cyber and digital. General counsels and legal risk executives are well suited to lead preparedness and resiliency for future crises, uniting key...more

Bradley Arant Boult Cummings LLP

Cybersecurity Basics Are Key to Combating Ransomware

The onslaught of ransomware attacks by cybercriminals increases unabated every year, affecting everyone from mom and pop shops on Main Street to corporate lions of Wall Street. Hackers infiltrate an organization's computer...more

Fisher Phillips

Don’t Take the Bait! “Spear Phishing” and “Whaling” Take Scams to the Next Level

Fisher Phillips on

For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more

Robinson+Cole Data Privacy + Security Insider

Test Your Incident Response Team (a/k/a Tabletop Exercises)

I have been conducting a lot of tabletop exercises lately, so it seems timely to mention the concept now for those who many not know what they are or how to get one scheduled for your organization....more

Pillsbury Winthrop Shaw Pittman LLP

Government Contractors Brace For Continuing Changes in Cybersecurity Regulations

The federal government has responded to recent data breaches by making cybersecurity a top priority, and it continues to consider and implement a number of regulations that affect government contractors. Over the past...more

King & Spalding

Unprecedented Hacking and Trading Scheme Highlights Key Cybersecurity Lessons

King & Spalding on

On Aug. 11, 2015, federal prosecutors in the District of New Jersey and the Eastern District of New York unsealed indictments against nine individuals in the U.S. and Ukraine who were allegedly involved in a five-year,...more

Broker-Dealer Compliance + Regulation

Cybersecurity, Round 2: OCIE Announces Areas of Focus for Cybersecurity Examinations

On September 15, 2015, OCIE issued a risk alert relating to its new cybersecurity examination initiative. This is the second round of these examinations, and the alert provides a detailed look at OCIE’s current areas of...more

Morgan Lewis

SEC and DOJ Hacking Prosecutions Highlight SEC’s Increased Interest in Cybersecurity Risks

Morgan Lewis on

Companies are reminded of the need for strong internal controls. The US Securities and Exchange Commission (SEC) and the Department of Justice (DOJ) recently filed civil and criminal actions in the largest hacking and...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide