News & Analysis as of

Information Technology Cybersecurity Policies and Procedures

Mitratech Holdings, Inc

IT/DR Plan Spring Cleaning: How to Replace Outdated Policies

Ready to ditch outdated guidelines and adopt a fresh take on your IT Disaster Recovery plans? Spring is the season of renewal, making it the perfect time to refresh not only physical spaces but also strategies and...more

Perkins Coie

Cybersecurity for Lawyers: Open-Source Software Supply Chain Attacks

Perkins Coie on

In this post in our series on basic cybersecurity concepts for lawyers, we address open-source software (OSS) supply chain risk. OSS is software developed using an “open-source” protocol, meaning that its code is fully...more

Mayer Brown

EU Cyber Legislation Puts Emphasis on Board Responsibility

Mayer Brown on

What is a Management Body? Under both DORA and NIS2, a management body can be a body with managerial and/or supervisory functions. The powers and structure of management bodies vary within the EU Member State, and managerial...more

Seyfarth Shaw LLP

Cyber Strategy: HHS Weighs in on Cybersecurity in the Healthcare Industry

Seyfarth Shaw LLP on

Seyfarth Synopsis: The health care sector faces escalating cybersecurity risks given its size, technological dependence and the sensitive nature of data used therein. According to the U.S. Department of Health and Human...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

Husch Blackwell LLP

Twelve Planning Tips to Avoid Complications with the SEC’s Cybersecurity Disclosure Rules: Part III

Husch Blackwell LLP on

Key Point: The decision making processes to determine whether a cybersecurity incident is material or not, should include documenting the factors behind each determination and should be practiced before an incident occurs. ...more

Paul Hastings LLP

The Board is Set: Preparing for the SEC’s Upcoming Cybersecurity Rules

Paul Hastings LLP on

It has been a full year since the initial comment period closed on the Securities and Exchange Commission’s (“SEC”) proposed rule on cybersecurity disclosure, governance, and risk management for public companies (the...more

Proskauer - The Capital Commitment

SEC Revisits Regulation S-P After Twenty Years of Innovation to Information Technology

On March 15, 2023, the U.S. Securities and Exchange Commission (“SEC”) released its proposal to amend Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Customer Information (the “Proposed...more

Mitratech Holdings, Inc

[Webinar] Are you Ready? Why Your Board & Stakeholders Are About to Ask You About Your IT Risk Technology - March 14th, 10:00 am...

The attention on IT Risk and Cybersecurity risk management policies is reaching new heights — again. It doesn’t matter if you’re a large enterprise like Uber or a small / midcap company; there’s one common thread as we start...more

Porter Hedges LLP

Cybersecurity Risk Management Practices for Small and Midsize Businesses

Porter Hedges LLP on

Cybersecurity is the goliath of tech-related concerns for companies of all sizes, not just large corporations. The Cybersecurity & Infrastructure Security Agency (“CISA”) encourages small and midsize businesses to focus on...more

Levenfeld Pearlstein, LLC

Federal Agency Issues ‘Shields Up’ Warning regarding Preparation for Disruptive Cyber Activity

The U.S. Cybersecurity & Infrastructure Agency (CISA) has issued a rare “shields up” warning regarding cybersecurity attacks, saying that every organization, of every size, should be prepared to respond to disruptive cyber...more

NAVEX

IT and Corporate Compliance: Bridging the Gap in the Era of Remote and Hybrid Work

NAVEX on

In many ways, the COVID-19 pandemic has served as a prime example of punctuated equilibrium. Shifts that have been slowly building for decades seemingly occurred overnight, giving us the contradictory sense that these changes...more

NAVEX

The Complicated Tango of Compliance & Cybersecurity

NAVEX on

A ransomware attack is no company’s idea of a good time, but I do sense one positive development emerging from the epidemic of attacks we’ve witnessed this year: Boards and senior management agree that they must move beyond a...more

Burr & Forman

Your Business Experienced a Ransomware Attack, and It Was Not Prepared – Now What?

Burr & Forman on

It is hard to find a news post without a story on a ransomware attack. The National Security Council has issued an open letter warning all businesses to be alert and prepared for ransomware attacks.  Various industry groups...more

NAVEX

4 Things to Know About Updated NIST 800-53 Standards

NAVEX on

[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more

PilieroMazza PLLC

[Webinar] CMMC Is Coming – Are You Ready? Specific Implications for Native American Contractors - September 15th, 3:00 pm - 4:00...

PilieroMazza PLLC on

The Department of Defense’s (DOD) Cybersecurity Maturity Model Certification (CMMC) requirements are coming, impacting DOD contractors big and small. This important new certification, if responded to proactively, will help...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

PilieroMazza PLLC

[Webinar] CMMC Is Coming: Are You Ready? - March 17th, 2:00 pm ET

PilieroMazza PLLC on

Now that DOD has released the final version of the Cybersecurity Maturity Model Certification (CMMC) guidelines, all contractors that work directly or indirectly on Department of Defense (DOD) contracts should be preparing to...more

Pillsbury Winthrop Shaw Pittman LLP

International Pressure Raises Cybersecurity Threats

Practical steps to address cybersecurity threats—what you should do when heightened tension in the Middle East or other events increase the threat of cybersecurity incidents. - When news events or business initiatives turn...more

Society of Corporate Compliance and Ethics...

Compliance Perspectives: Cybervigilance and Cyber-resiliency

Mark Lanterman, Chief Technology Officer of Computer Forensic Services lives technology at its most terrifying, helping organizations manage the risks of the IT we all use constantly. Recently he authored an article...more

Fisher Phillips

Don’t Take the Bait! “Spear Phishing” and “Whaling” Take Scams to the Next Level

Fisher Phillips on

For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more

Ballard Spahr LLP

Proposed House Bill Would Set National Data Security Standards for Financial Services Industry

Ballard Spahr LLP on

A new bill introduced by House Financial Services subcommittee Chairman Rep. Blaine Luetkemeyer would significantly change data security and breach notification standards for the financial services and insurance industries. ...more

Ballard Spahr LLP

Proposed House Bill Would Set National Data Security Standards for Financial Services Industry

Ballard Spahr LLP on

A new bill introduced by House Financial Services subcommittee Chairman Rep. Blaine Luetkemeyer would significantly change data security and breach notification standards for the financial services and insurance industries. ...more

Robinson+Cole Data Privacy + Security Insider

New York Department of Financial Services Cybersecurity Regulation 18-month Compliance Deadline Arrives

On September 4, 2018, the third stage of compliance deadlines under the New York Department of Financial Services’ (DFS) expansive cybersecurity regulation went into effect....more

Mitratech Holdings, Inc

Cybersecurity Precautions for Businesses

The need for cybersecurity continues to increase as technology advances. Over the past few years, a number of major corporations have fallen victim to hackers due to seemingly minor oversights and a failure to properly manage...more

28 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide