News & Analysis as of

Information Sharing Cyber Attacks Cyber Threats

Wiley Rein LLP

GAO Calls for Better Info-Sharing by ONCD and CISA After Cyberattacks; May be Inconsistent with New Mandates

Wiley Rein LLP on

Information sharing has seemed like the “holy grail” of federal cyber policy: sought after but elusive, especially to those who think it will solve their problems. At a time of increased regulation and looming mandates for...more

Seyfarth Shaw LLP

“Essential Critical Workforce” Guidance for the Real Estate Industry, Specifically for Commercial Landlords Amid the COVID-19...

Seyfarth Shaw LLP on

Seyfarth Synopsis: As the COVID-19 pandemic continues to spread and affect our lives and businesses across the U.S., we are continually following the latest updates and providing insight. ...more

Robinson+Cole Data Privacy + Security Insider

Frequency and Cost of Insider Threats Continue to Increase

The Ponemon Institute recently issued its 2020 Cost of insider Threats Global Report, which finds that the frequency and cost of insider threats is continued to increase. Sponsored by ObserveIT and IBM, the 2020 report is the...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2020 #2

Robinson & Cole LLP on

Department of Homeland Security Warns of Cyber-Attacks by Iran - The Department of Homeland Security (DHS) issued a grave warning to U.S. businesses and critical infrastructure operators on January 6, 2020, alerting the...more

Bradley Arant Boult Cummings LLP

Grid Electrification: Addressing Cybersecurity Threats and Mitigating Risk in the Renewable Energy Era - ABA Forum

Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more

Foley Hoag LLP

Cybersecurity 2017: The Year in Preview

Foley Hoag LLP on

Introduction - Cybersecurity was a prominent factor in 2016 in all aspects of government, business and personal affairs. Russian and other foreign national hacking has the potential to spark a new form of cold...more

Carlton Fields

Collaboration Key to Combatting Cyber Threats: Federal Government Issues Final Guidance Clarifying Liability Protection for...

Carlton Fields on

On June 15, the Department of Homeland Security (DHS) and the Department of Justice (DOJ) jointly issued final guidance on how the private sector and government will communicate cyber threat data and defensive measures under...more

BakerHostetler

What Companies Need to Know About Cyber Threat Information Sharing Under CISA

BakerHostetler on

Cyber threat information sharing has the potential to provide numerous benefits for organizations (both public and private) faced with cyberattacks, which are increasing in frequency and sophistication. Cyber threat...more

Snell & Wilmer

What’s In The Cybersecurity Act of 2015?

Snell & Wilmer on

The Cybersecurity Act of 2015 became law on December 18, 2015. It’s the biggest piece of cybersecurity legislation passed by Congress in recent years. It authorizes and protects certain information-sharing for cybersecurity...more

King & Spalding

Senate Passes Legislation To Ease Sharing Of Cybersecurity Threat Information

King & Spalding on

On October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (“CISA”), which addresses how companies can share cyber threat information with the federal government. The legislation aims to...more

Robinson+Cole Data Privacy + Security Insider

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

King & Spalding

House Passes Cybersecurity Legislation; Focus Is Now On Senate

King & Spalding on

On October 6, 2015, the U.S. House of Representatives passed the Department of Homeland Security Cybersecurity Strategy Act of 2015 (the “Cybersecurity Strategy Act”), which, if enacted, would require the Department of...more

Bradley Arant Boult Cummings LLP

Data Breach Response Planning: Laying the Right Foundation

Part of Bradley Arant’s Privacy and Information Security Team’s seven-part Data Breach Toolkit Webinar Series, the “Data Breach Response Planning: Laying the Right Foundation” webinar, led by Paige Boshell and Amy Leopard,...more

King & Spalding

California’s Governor Strengthens Cybersecurity Preparedness With Executive Order

King & Spalding on

On August 31, 2015, California Governor Edmund G. Brown Jr. signed Executive Order B-34-15. The Order directs the Governor’s Office of Emergency Services to establish the California Cybersecurity Integration Center...more

Foley & Lardner LLP

We’re All About Sharing Cyber Information: The National Cybersecurity and Communications Integration Center

Foley & Lardner LLP on

Amidst the maelstrom of unceasing cyber attacks and intrusions, the National Cybersecurity and Communications Integration Center (NCCIC or Center) assumes a front-and-center role as the government command and communication...more

King & Spalding

Senate Could Take Up Cybersecurity Bill Before August Recess

King & Spalding on

While the U.S. House of Representatives has already adjourned for the month-long August recess, the U.S. Senate remains in session and could take up a measure to address cybersecurity information-sharing as one of its last...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide