News & Analysis as of

Hackers Incident Response Plans Data Breach

Robinson+Cole Data Privacy + Security Insider

CISA Issues Alert on Potential Legacy Oracle Cloud Compromise

BleepingComputer has confirmed the rumor that Oracle has suffered a compromise affecting its legacy environment, including the compromise of old customer credentials (originally denied by Oracle). Oracle notified some...more

Fisher Phillips

How Schools Should Respond to the PowerSchool Cyberattack

Fisher Phillips on

The country’s largest provider of cloud-based education software for K-12 schools announced on January 7 that it fell victim to a massive data breach – which may lead to questions about the implications for your school....more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

NAVEX

The True Cost of Cybersecurity Failure – When Technology (and People) Fail

NAVEX on

Picture this: your company's systems are frozen, your data is held hostage and panicked customers flood your phone lines. A simple mistake, an unpatched vulnerability – even when your team was doing all the right things. It...more

Ward and Smith, P.A.

Wire-Fraud, Data Breach, and Phishing: A Live Action Role Play for In House Counsel

Ward and Smith, P.A. on

At the recent In-House Counsel Seminar, three Ward and Smith attorneys presented a realistic role play response to an incidence of wire fraud, addressing red flags associated with fraudulent communications, corporate incident...more

Epiq

Looking at Data Breach and Class Action Exposure Through a Single Lens

Epiq on

There has been a spike in data breach class actions this year. According to a study by Law.com Radar, the monthly average of data breach class actions was 44.5 from January through August. This figure is more than double of...more

Jackson Lewis P.C.

Corporate Boards Mulling Effects of SEC Cyber Enforcement and CISO Exposure, and Possibly Hacker Complaints to SEC

Jackson Lewis P.C. on

According to a New York Times story this weekend, the Security Exchange Commission’s lawsuit against SolarWinds is driving discussions in boardrooms and corporate security departments of large organizations about the handling...more

Ballard Spahr LLP

Digital Planning Podcast Episode: When Cyber Attacks Hit Home

Ballard Spahr LLP on

Cyber security impacts everyone who has a computer, tablet, mobile device, or on-line presence. With cyber-attacks occurring every day, we are all potential targets who should constantly be monitoring our cyber behaviors. In...more

Epiq

Move it or Lose it – With Cyber Breach Response, Time is of the Essence

Epiq on

There are so many factors that go into breach response. Determining the size of the breach, time limitations, legal requirements, notification needs, urgency for containment, and interrupted business operations are just a...more

Jackson Lewis P.C.

Insights From The IBM 2023 Cost of a Data Breach Report

Jackson Lewis P.C. on

The annual Cost of a Data Breach Report (Report) published by IBM is reliably full of helpful cybersecurity data. This year is no different. After reviewing the Report, we pulled out some interesting data points. Of course,...more

Roetzel & Andress

Cybersecurity: What Healthcare Providers Need to Know

Roetzel & Andress on

On this episode of the #HealthLawHotSpot, host Ericka Adler is joined by fellow Roetzel shareholder Hillard Sterling for an in-depth discussion on cybersecurity issues that health care providers are facing. Ericka and Hillard...more

Ankura

Questions You Should Ask When Selecting a Managed Detection and Response (MDR) Provider

Ankura on

According to the 2022 Cost of a Data Breach Report by IBM Security and the Ponemon Institute, the cost of a data breach grew to an average of 4.35M in U.S. dollars in 2022 – reaching an all-time high. In addition, 83% of...more

Jackson Lewis P.C.

Stolen Databases Obtained In Transaction Leads to $400K Settlement with PA and OH Attorneys General

Jackson Lewis P.C. on

This post deals with another data breach, yes, hackers were able to compromise the organization’s systems and exfiltrate personal information relating to over 45,000 Pennsylvania and Ohio residents. However, there are several...more

Nelson Mullins Riley & Scarborough LLP

When It Comes to Cybersecurity: Be Prepared!

As has been the trend for some time now, organizations across all industries and sectors are increasingly at risk of being targeted by bad actors online. Now, the adage espoused by IT security professionals is to prepare for...more

BakerHostetler

2022 DSIR Deeper Dive: NFTs

BakerHostetler on

The Data Security Incident Response Report features insights and metrics from 1,270+ incidents that members of the firm’s DADM Practice Group helped clients manage in 2021. This episode takes us deeper into the top...more

Health Care Compliance Association (HCCA)

Hacked, Shut Down, But Still Seeing Patients: U. of Vermont Medical Center Shares Strategies

Report on Patient Privacy 22, no. 6 (June, 2022) - Sometimes numbers tell the most compelling story. So, here are some associated with a cyberattack the University of Vermont Medical (UVM) Center suffered in October 2020...more

Hogan Lovells

Building a resilient tech strategy: Cyber attacks

Hogan Lovells on

Being an innovative business comes with its challenges and legal risks. In recent years, there has been a major increase in cyber attacks, and this is a real risk for every business. Aside from the cyber attack itself,...more

Goldberg Segalla

Death by a Thousand Paper Cuts: The Scourge That Is Business Email Compromise

Goldberg Segalla on

In June 2014, the CEO of Omaha-based Scoular Company sent a series of emails to his company’s controller to let him know that the company was in negotiations to buy a Chinese company. The emails highlighted the sensitivity of...more

Opportune LLP

Defense In-Depth: Cybersecurity For Energy

Opportune LLP on

Glenn Hartfiel, Principal, and Geoff Yut, Consultant, at Opportune LLP discuss why recent geopolitical events are heightening the need for the implementation of improved cybersecurity measures in the energy industry, why...more

Jackson Lewis P.C.

Construction Industry: Data Security Considerations

Jackson Lewis P.C. on

No industry is immune to privacy and cybersecurity risks, and the construction industry is no exception. Those in the construction industry can protect against a potential cyberattack by understanding the risks and...more

Fisher Phillips

Shields Up: 10 Proactive Steps Employers Can Take to Prevent Russian Cybersecurity Attacks

Fisher Phillips on

Tensions have been heightening in the Russia-Ukraine crisis given the Russian military invasion that took place late last night – and while this conflict seems to be thousands of miles away, its effects on your business could...more

Robinson+Cole Data Privacy + Security Insider

Don’t Wait for the Perfect Time for a Tabletop Exercise

Threat actors don’t wait for a convenient time to attack your company. They attack when it suits them, and when they can find any small opening. Being prepared for different types of attacks helps companies prepare for the...more

NAVEX

Building a Better Response for Ransomware

NAVEX on

You almost can’t blame cyber criminals for their relentless barrage of ransomware attacks against the corporate world. From their perspective, it’s easy money. Corporations face a much more frustrating calculus. You can...more

Wyrick Robbins Yates & Ponton LLP

Worried about Ransomware? Ten Steps to Help Legal Counsel Understand and Mitigate the Risk

Executive teams in the U.S. live in fear of a successful ransomware attack, and who can blame them? Attacks are both prevalent and evolving. Many attackers have shifted from encrypting data and locking up systems to also (or...more

80 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide