Podcast - The Role of Managed Service Providers with Stuart Itkin
Cybersecurity in Video Games & Esports
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Overview of Cybersecurity in Government Contracts
Cyber Threats
What to Do When a Phishing Attack Happens to You - The Consumer Finance Podcast
Hybrid Workforces and Compliance with Sheila Limmroth
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
Phishing: Cybersecurity’s Biggest Threat
Jenny Radcliffe on People Hacking
Debra Geroux and Scott Wrobel on Responding to Data Breaches
No Password Required: A Pen Tester at Rapid7 With a Passion for LEGO Bricks, Star Wars, and Sometimes LEGO Star Wars
#WorkforceWednesday: Extended Remote Work, Return-to-Work Manager Training, Case to Watch - Employment Law This Week®
JONES DAY PRESENTS®: AI: Security and Privacy Risks with Big Data
Zoom Security Best Practices
Cyber Insurance 101: What It Is And Why You Need It
Phishing and Vishing and Smishing (Oh my!): New Types of Scams Require Increased Vigilance
Life With GDPR: Episode 24- Phishing
Making Cents of Your Cash Management Agreements
One of our recent posts discussed the uptick in AI risks reported in SEC filings, as analyzed by Arize AI. There, we highlighted the importance of strong governance for mitigating some of these risks, but we didn’t address...more
Katten's Privacy, Data and Cybersecurity Quick Clicks is a monthly newsletter highlighting the latest news and legal developments involving privacy, data and cybersecurity issues across the globe....more
Russia-linked threat actor Fancy Bear is conducting a wave of phishing campaigns impersonating entities across Europe, Americas, and Asia, focusing on Ukraine-related targets....more
Elevate your resilience in the new year by understanding top GRC trends, patterns, and best practices across AI, TPRM, cyber risk, and more. As we step into 2024, technological advancements and an increasingly connected —...more
In this episode of "Regulatory Phishing," Government Contracts and Cybersecurity attorney Eric Crusius is joined by Stuart Itkin, a senior vice president and the chief marketing officer at NeoSystems. Their conversation...more
In this episode of “Lawyers With Game,” host Darius Gambino from Saul Ewing’s Video Gaming and Esports Practice chats with colleagues Sandy Bilus and Evan Foster from Saul Ewing’s Cybersecurity & Privacy group about data...more
Learning Objectives - The fundamental foundation of establishing a solid HIPAA compliance, privacy and cyber security awareness program - The importance of end user HIPAA compliance, privacy and cyber security training for...more
Please join Consumer Financial Services Partner Chris Willis and his colleagues Privacy + Cyber Associate Sadia Mirza and Privacy + Cyber Partner Kamran Salour as they discuss phishing. Kamran and Sadia break down what...more
Just when it seems that consumers have caught on to one particular online scam or phishing expedition – think of the ubiquitous Nigerian prince email scam that first began making the rounds in the 1990s – a new one comes...more
Phishing schemes encompass fraudulent emails, text messages, phone calls, or web sites designed to manipulate people into downloading malware, sharing sensitive information, or otherwise exposing themselves or their...more
Social Media connects people across the world by providing users with a means to share content. It has undoubtedly become a huge part of our daily routines. In 2021, Americans spent an average of two hours and thirty minutes...more
Despite general awareness regarding phishing (we have written about phishing in a prior post), it still remains one of the most common ways to accomplish cyberattacks. It should be no surprise that cybercriminals are...more
As technology evolves, companies are finding ways to become more nimble and conduct business more efficiently — over remote networks, email on handheld devices, the cloud, and on cellphones. Yet, as technology advances, so...more
The holiday season is around the corner. For most of us, it is a time of joy, cheer, excitement, and hopefully some relaxation. For cyber criminals, however, this is the busy season (same goes for Santa and his elves). ...more
As we live and work in an increasingly globalized and computerized world, data, privacy and security (DPS) issues will converge across regions. Asia, however, has some of its own unique challenges trending as we discuss...more
Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more
Report on Patient Privacy 22, no. 8 (August, 2022) - The Department of Justice (DOJ) seized around $500,000 in Bitcoin ransom paid by two health care organizations in Kansas and Colorado to North Korean ransomware actors...more
The current cyberrisk landscape comprises a range of evolving threats, from phishing schemes to third-party vendor vulnerabilities. Companies looking to secure valuable assets, including data, can better prevent and manage...more
CEP Magazine (June 2022) - Picture this: The workday starts out like most other days and inevitably involves electronic devices for many of us. Our expectation, realistic or not, is that technology will work at our command...more
House Subcommittee Debates Device Remanufacturing Definition, Sends User-Fees Bill to Next Stage "Proponents of the remanufacturing bill are looking to better distinguish between medical device remanufacturing, and...more
In the first of a three-part series, Buckingham Data Privacy and Cybersecurity Attorney David Myers talks with Andy Jones, CEO, Fortress Security Risk Management and Eric Smith, recently retired Special Agent In Charge of the...more
A recent Privacy Peril advised of the increasing cyber risk from nation state attacks, particularly as a result of the war in Ukraine. There is, of course, little we can do to thwart cyber assaults on vital nerve centers....more
In June 2014, the CEO of Omaha-based Scoular Company sent a series of emails to his company’s controller to let him know that the company was in negotiations to buy a Chinese company. The emails highlighted the sensitivity of...more
Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more
Exclusive roadmap reveals, immersive Q&A with top product & industry experts, live product demos, electrifying presentations, co-innovation opportunities, and so much more— all coming to you live from the heart of Nashville,...more