News & Analysis as of

Information Security Data Security

K2 Integrity

World Password Day: Increasing Security in Two Steps

K2 Integrity on

May 1 is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. It’s a time for...more

Orrick, Herrington & Sutcliffe LLP

OCC provides an update on its security breach given institutional risk

On April 14, the OCC released a letter providing more details on the recent security breach involving its email systems. The breach — identified as a major incident under the Federal Information Security Modernization Act...more

Blake, Cassels & Graydon LLP

New Information Security Incident Framework for Quebec Financial Institutions

On April 23, 2025, Quebec’s Regulation respecting the management and reporting of information security incidents by certain financial institutions and by credit assessment agents (Regulation) will come into force. Issued by...more

Sheppard Mullin Richter & Hampton LLP

Insurance Cybersecurity Certifications: An (Updated) State Roundup

Over half of US states require annual compliance certifications from insurance providers. While the filing time frames for this year draw to a close, companies may want to keep them in mind not only for next year, but as a...more

Orrick, Herrington & Sutcliffe LLP

OCC announces major information security incident

On April 8, the OCC announced it had notified Congress of a major information security incident, as required by the Federal Information Security Modernization Act. The incident involved unauthorized access to emails and their...more

Fox Rothschild LLP

Hawaii Issues Guidance to State Agencies on AI

Fox Rothschild LLP on

Hawaii’s State Data Office recently issued a series of guidance documents for its state agencies on how to handle artificial intelligence. This includes guidance on data protection, data retention and use of Generative AI....more

Orrick, Herrington & Sutcliffe LLP

OIG releases 2024 audit of the Fed’s information security program

On October 31, OIG for the Fed and the CFPB released its 2024 Audit of the Board’s Information Security Program. The audit found that the Board’s information security program continues to operate at a level-4 (managed and...more

Orrick, Herrington & Sutcliffe LLP

NIS2: Where do European Countries Stand on Implementing Cybersecurity Strategies?

Country Status Legislation* Commentary Austria Available here Austria has submitted the “Network and Information Security Act” for Parliament’s consideration. It is anticipated that the “Network and Information Security Act”...more

K2 Integrity

Cybersecurity Awareness Month: Doubling Your Account Security With Multi-Factor Authentication - Update

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online...more

Sheppard Mullin Richter & Hampton LLP

Ring, Ring, it’s the FCC Calling- TracFone to Pay $16M to Settle FCC Investigation

TracFone, the pre-paid phone company, recently settled with the FCC over allegations that the company failed to protect customer information during three different data incidents. According to the FCC, in each of the...more

HaystackID

[Webinar] From Breach to Insight: Incident Response & PII Recovery - May 29th, 12:00 pm EDT

HaystackID on

With escalating cyber risks and heightened regulatory scrutiny, every minute after a data breach is crucial. Sophisticated cybercriminals relentlessly target your organization’s most valuable asset: personally identifiable...more

Sheppard Mullin Richter & Hampton LLP

Utah Breach Notice Law Amended, Effective May 1

Utah, among other privacy laws it has enacted or modified recently, has also modified its breach notification law. This follows last year’s changes to the law, which among other things codified the state’s Cyber Center....more

American Conference Institute (ACI)

[Event] 14th Advanced Forum on Global Encryption, Cloud & Export Controls - May 15th - 16th, San Francisco, CA

Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more

Ward and Smith, P.A.

Senior Savvy: Wise Owls Navigating Cyber Scams

Ward and Smith, P.A. on

As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages. Among the great tapestry of age groups, despite the wealth of experience and...more

Skadden, Arps, Slate, Meagher & Flom LLP

What Does the SEC’s Complaint Against SolarWinds Mean for CISOs and Boards?

On October 30, 2023, the SEC filed a litigated complaint against SolarWinds, a software development company, and Timothy Brown, its chief information security officer (CISO). The SEC alleges that from October 2018, when...more

Perkins Coie

Security Breach Notification Chart - September 2023

Perkins Coie on

Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes only and is intended as an aid in understanding each...more

Bennett Jones LLP

New Practice Directions Consider Artificial Intelligence in Court Submissions

Bennett Jones LLP on

The use of artificial intelligence (AI) in the preparation of materials filed with the courts has been the subject of recent practice directions, with certain Canadian courts requiring that any reliance on AI by a litigant...more

Guidepost Solutions LLC

Lines of Authority: The Critical Need for Role Clarity in Information Security Compliance

Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more

White & Case LLP

China’s Standard Contract for the Outbound Cross-border Transfer of Personal Information is in Effect

White & Case LLP on

China's Cybersecurity Law ("CSL"), Personal Information Protection Law ("PIPL") and Data Security Law ("DSL") set a series of rules and requirements for the cross-border transfer of personal information located in China....more

Society of Corporate Compliance and Ethics...

[Event] 22nd Annual Compliance & Ethics Institute - October 2nd - 5th, Chicago, IL

SCCE’s Compliance & Ethics Institute (CEI) is our flagship educational and networking event for compliance and ethics professionals across the globe. Leading industry professionals cover real‑world compliance issues, emerging...more

McDermott Will & Emery

[Webinar] PCI DSS 4.0: Third-Party Service Providers and Risk Management - June 7th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Join members of McDermott’s Global Privacy & Cybersecurity team and Alan Gutierrez-Arana of Mazars for the next installment in our PCI DSS 4.0 series. PCI DSS 4.0 brings major changes to payments with an increased focus on...more

Kelley Drye & Warren LLP

The FTC is Not the Only One Tracking Your Use of Health Information

The FTC has made news recently with its recent enforcement activity regarding companies’ alleged disclosures of consumer health data, as detailed in our recent post FTC to Advertisers: We’re tracking Your Use of Health...more

Ankura

Why a Right-Sized MDR Solution May Be Better Than One-Size-Fits-All

Ankura on

When it comes to providing Managed Detection and Response (MDR) solutions for businesses, the idea of one size fits all is being replaced by the concept of right-sizing. A one-size-fits-all option is a preconfigured security...more

Pillsbury Winthrop Shaw Pittman LLP

Cross-Border Data Transfer Mechanisms and Requirements in China

In recent years, alongside the rapid development of the digital economy and the concomitant increase in data generation, collection, processing and monitoring in the People’s Republic of China (PRC or China), the Chinese...more

Society of Corporate Compliance and Ethics...

[Webinar] Security Compliance at Scale - December 13th, 12:00 pm - 1:30 pm CT

Learning Objectives: - Learn the technical dos and don’ts in implementing security compliance frameworks such as SOC 2, ISO 27001 and HIPAA - Discussion about why security compliance is so critical for organizations...more

148 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide