News & Analysis as of

Incident Response Plans

Foley & Lardner LLP

Cybersecurity in the Age of Industry 4.0 - Part 2

Foley & Lardner LLP on

This is the second article in our two-part series on Cybersecurity in the Age of Industry 4.0, focusing on the legal implications and potential liabilities manufacturers face from cyberattacks, as well as practical...more

Health Care Compliance Association (HCCA)

Privacy Briefs: September 202

The HHS Centers for Medicare & Medicaid Services (CMS) and Wisconsin Physicians Service Insurance Corporation (WPS) are notifying 946,801 people whose protected health information or other personally identifiable information...more

Burr & Forman

What To Do Before Adopting Generative AI in Your Business

Burr & Forman on

Your business may want to jump on the Generative AI (GAI) bandwagon and discover how your company may become more productive, competitive, reduce costs, and make the most of new technology. There are many intriguing and...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Health Care Compliance Association (HCCA)

[Webinar] The Compliance Officer's Challenge: Riding the Technological Wave in Healthcare - September 17th, 12:00 pm CT

Learning Objectives: - It's crucial to be aware of the areas where technology and AI are present in healthcare, and equally important not to overlook your EHR. A comprehensive understanding is key - Acquiring knowledge...more

Association of Certified E-Discovery...

[Webinar] Digital Forensics in your Incident Response Plan - September 26th, 10:00 am PDT

Organizations face increasingly sophisticated threats that can compromise data and disrupt business operations. This presentation will explore the role that digital forensics plays in an effective incident response plan using...more

BCLP

Navigating a Security Incident - Communication “Dos” and “Don’ts”

BCLP on

Communication during a data breach is challenging in the best of circumstances, and control of information, especially early in a breach response, is critical. Below are some DOs and DON’Ts for communicating during a data...more

Rumberger | Kirk

Incident Response: Today’s Actions Impact Tomorrow’s Lawsuit

Rumberger | Kirk on

Success in defending against a personal injury lawsuit starts with the business’s response to the injury-inducing event. Personal injury lawsuits often turn on evidence that is created at the scene of the alleged injury. A...more

Troutman Pepper

SEC Cybersecurity Incidents Disclosures: Materiality, Decryptors, and Ransom Payments - Dear Mary – Incidents + Investigations...

Troutman Pepper on

I work for a public company that recently experienced a ransomware attack. Fortunately, we were able to restore our business operations quickly by obtaining a decryption key from the threat actor. Given that we managed to get...more

Epiq

Cyber Incidents on the Rise: Tips for Effective Data Breach Notification

Epiq on

Cyber incidents have been growing at an exponential rate in recent years. A recent report from the Identity Theft Resource Center found that there were over one billion data breach victims in Q2 of 2024, which is around five...more

BCLP

Navigating a Security Incident - Best Practices for Engaging Service Providers - September 2024

BCLP on

With the recent wave of ransomware and other security incidents, it is now more important than ever for impacted organizations to have a thorough understanding of each element of a proper data breach response. That includes...more

J.S. Held

Strategies to Avoid Cyber Insurance Claim Challenges: Part I

J.S. Held on

Cyber risk is now a normal part of our personal and professional lives. When companies suffer a cyber incident, they often look to their insurance policy for coverage to help mitigate the financial exposure. Additional...more

Davis Wright Tremaine LLP

California Legislature Sends Bills Regulating AI to the Governor

Last week, the California Legislature passed several bills that, if signed by the governor, will regulate how organizations develop, train, and use artificial intelligence (AI) models, systems, and applications. Of these...more

Carlton Fields

No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist

Carlton Fields on

Dr. Thomas Hyslip teaches at the master’s in cybercrime program at the University of South Florida, where he blends criminology, digital forensics, and incident response coursework. A retired U.S. Army colonel, Dr. Hyslip's...more

Alston & Bird

United States Cybersecurity and Infrastructure Security Agency Issues Joint International Guidance for Event Logging and Threat...

Alston & Bird on

On August 21, 2024, the United States Cybersecurity and Infrastructure Security agency, alongside government agencies in key global allies, including Australia, the UK, Canada, and Japan, released guidance on event logging...more

Warner Norcross + Judd

Managing Cybersecurity Risk for Family Offices and Businesses

Warner Norcross + Judd on

Whether caused by family member thoughtlessness, employee error or the acts of a skilled data thief, everyone is likely to be the victim of an information breach at some point. A cyberattack on a family office or family...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Adopting Generative AI? Key Contract Considerations for Healthy Due Diligence

As generative AI continues to be a hot topic in board rooms and an unavoidable reality on the front lines of business, leaders must make informed decisions when choosing AI vendors. The integration of AI into your operations...more

Robinson+Cole Data Privacy + Security Insider

Now Is the Time to Schedule a Tabletop Exercise on AI

We have previously suggested that conducting cybersecurity tabletop exercises are an important part of testing your incident response program and response to different scenarios....more

Fisher Phillips

Recent Snowflake Data Breach Exposes Dangers of Third-Party Data Platforms: Your 5-Step Plan After Suffering a Data Breach

Fisher Phillips on

When a prominent cloud storage company recently suffered a critical data breach that quickly developed into one of the largest data breaches of all time, it served as a wake-up call to companies to ensure that their data...more

Jackson Lewis P.C.

Can Your AI Model Collapse?

Jackson Lewis P.C. on

A recent Forbes article summarizes a potentially problematic aspect of AI which highlights the importance of governance and the quality of data when training AI models. It is called “model collapse.” It turns out that over...more

Ankura

Preparing for the Colorado AI Law

Ankura on

Colorado became the first U.S. state to pass a law protecting consumers from harm when using artificial intelligence (AI). Senate Bill 24-205 on Consumer Protections for Artificial Intelligence was passed on May 17, 2024. The...more

Ward and Smith, P.A.

The Aftermath: Recovering From a Hurricane

Ward and Smith, P.A. on

These powerful storms are unpredictable, and despite our best efforts to prepare, they often leave a trail of destruction in their wake. When the winds finally die down and the floodwaters recede, they often leave behind a...more

Epiq

The Most Effective Ways to Prepare your Organization for a Cyber Incident

Epiq on

Cyber incidents have surged in recent years, with attacks more than doubling since 2020 and the number of victims totaling in the hundreds of millions in 2023 alone. These incidents can cost organizations millions or even...more

Troutman Pepper

Ensuring Proper Legal Involvement in the Incident Response Process - Dear Mary – Incidents + Investigations Cybersecurity Advice...

Troutman Pepper on

“Dear Mary” is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related — data breaches, forensic investigations, how to...more

Thomas Fox - Compliance Evangelist

Internal Control Lessons from Star Trek: The Doomsday Machine

Last month, I wrote a blog post on the tone at the top, exemplified in the Star Trek, the Original Series episode, Devil in the Dark. Based on the response, some passionate Star Trek fans are out there. I decided to write a...more

792 Results
 / 
View per page
Page: of 32

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide