News & Analysis as of

Today's Popular Updates Data Security Vendors

A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous... more +
A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous thirty days. less -
Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

HaystackID

[Webcast Transcript] You’ve Got to Move It: Data Protection and Privacy with Cross-Border Transfers

HaystackID on

...This session, led by industry-acknowledged experts in areas ranging from data protection and privacy to data transfer and legal discovery, provided a professional forum for the explanation of the best approaches,...more

McDermott Will & Emery

[Webinar] Privacy and Cybersecurity Contracting: What’s the “Deal”? - June 29th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more

Esquire Deposition Solutions, LLC

SOC Reports Provide Critical Insights on Vendor Data Security Practices

I’ve written several times during the past year about the importance of information security for legal professionals. Mitigating the threat of unauthorized access to client confidential information is one of the most...more

Association of Certified E-Discovery...

[Webinar] Cybersecurity Basics for Legal Practitioners - April 19th, 1:00 pm - 2:00 pm EDT

Join us for a webinar on basic cyber information regarding data protection, data privacy, cybersecurity requirements PII and Sensitive PII, cybersecurity requirements for Third Party vendors, Cyber insurance in the age of...more

Ankura

[Webinar] Vendor Risk Management in the Modern Economy - July 28th, 1:00 pm - 2:00 pm EST

Ankura on

Organizations are becoming increasingly reliant on external parties to manage parts of their business, including their critical and sensitive data. While the specialized expertise and economies of scale that third parties and...more

NAVEX

4 Things to Know About Updated NIST 800-53 Standards

NAVEX on

[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more

NAVEX

Third-Party Risk Management: 5 Reasons to Monitor Cybersecurity Risk in Real Time

NAVEX on

In today’s business landscape, it is nearly impossible to work alone. You have to collaborate with clients, vendors, suppliers, specialists, and plenty of other partners all considered third parties to your organization. As a...more

Hogan Lovells

SEC Releases Cybersecurity and Resiliency Observations: A Potentially Useful Guide for Businesses

Hogan Lovells on

In today’s connected world, businesses face constant pressure to improve their cybersecurity practices and to confirm that they are meeting industry standards. To continue helping businesses achieve those goals, the SEC...more

Bracewell LLP

SEC Examiners Release Cyber Observations: What You Need To Know

Bracewell LLP on

On January 27, 2020, the SEC’s Office of Compliance Inspections and Examinations (OCIE) announced its most recent Cybersecurity and Resiliency Observations. This report highlights specific practices that have been, and can be...more

The Volkov Law Group

Lessons Learned from the Capital One Data Breach (Part I of III)

The Volkov Law Group on

Not to say, I told you so, but around the same time that the Capital One data breach occurred, I was reminding clients that nearly half of  all significant data breaches or cyber-incidents occur because of internal actors. ...more

Kilpatrick

Cloud Storage and Use of Vendors for Records Management Flagged by OCIE in Alert

Kilpatrick on

Regulations regarding privacy, cybersecurity and the use of technology seem to be in constant flux. Compliance consultants and vendors do their best to stay on top of them, but ultimately neither are regulated by the SEC,...more

Faegre Drinker Biddle & Reath LLP

U.S. Securities and Exchange Commission Issues Risk Alert Regarding Safeguarding Customer Records and Information Stored on...

On May 23, 2019, the United States Securities and Exchange Commission (“SEC”)’s Office of Compliance Inspections and Examinations (“OCIE”) issued a Risk Alert entitled “Safeguarding Customer Records and Information in Network...more

Sheppard Mullin Richter & Hampton LLP

“Internet of Things” Guidance to be Added to Cybersecurity Requirements for Agencies and Federal Contractors

In 2019, cybersecurity has become top-of-mind for most federal government contractors and agencies that share sensitive information. In addition to updated Department of Defense guidance and procedures for evaluating...more

Akin Gump Strauss Hauer & Feld LLP

SEC Warns Registered Firms about Client Privacy and Data Security

• The SEC released a Risk Alert summarizing key areas in which it continues to see compliance deficiencies related to Regulation S-P, the primary SEC rule regarding privacy notices and safeguard policies of investment...more

Burns & Levinson LLP

Interesting Cybersecurity Development in the Insurance and Vendor Risk Arena

Burns & Levinson LLP on

Often one of the benefits of working with a capable cyber risk broker or insurer is that the covered business has access to supplemental services ranging from security assessments to budget-priced post-incident legal support....more

Sheppard Mullin Richter & Hampton LLP

SEC To Focus on Cybersecurity in 2019

For the fourth year running, the Securities and Exchange Commission’s Office continues to list cybersecurity as one of the top enforcement priorities for 2019. As it relates to cybersecurity, the SEC will be focusing on...more

Jackson Lewis P.C.

Should Companies Terminate Third Party Vendors That Cause A Data Breach?

Jackson Lewis P.C. on

According to reports, bank customers in Australia (yes, data breach notification requirements exist down under) have been affected by “an industry-wide” data breach experienced by a third-party service provider to the banks –...more

Foley Hoag LLP - Security, Privacy and the...

Privacy and Data Security Strategies for Start-Up Companies

Start-up companies know that, when potential investors kick the tires, they will look carefully at the company’s business model and IP portfolio. These days, investors are also likely to look at whether the company is in...more

Bradley Arant Boult Cummings LLP

Grid Electrification: Addressing Cybersecurity Threats and Mitigating Risk in the Renewable Energy Era - ABA Forum

Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more

NAVEX

Vendor Risk & Data Security: Why Is This So Hard?

NAVEX on

Studies about vendor risk related to data security always fascinate me, because conceptually those risks are so similar to the vendor risk challenges corporate compliance officers face with anti-corruption — and yet, the...more

Foley & Lardner LLP

Strategies for Protecting Against Vendor Payment Fraud

Foley & Lardner LLP on

Cybercrime is an ever-increasing threat from which manufacturers are not immune. Although reliable statistics are not available, one particular type of scheme that seems to be on the rise is vendor payment fraud. In cases of...more

Fisher Phillips

Vulnerable Vendors: Automakers’ Data Breach Highlights Importance of Vendor Cybersecurity

Fisher Phillips on

This summer, several automakers, including Tesla, Toyota, General Motors, Ford, and Volkswagen learned that their closely held trade secrets were readily available on the internet. The source? An unprotected back-up server....more

BCLP

Third Party Vendor Management Programs

BCLP on

Third-party service providers present difficult and unique privacy and cybersecurity challenges. Vendor management is important throughout the life of a relationship with your service provider. ...more

Fenwick & West LLP

California’s New Landmark Data Privacy Regulation and What Companies Need to Do to Comply

Fenwick & West LLP on

What You Need to Know Now - • The new law takes effect January 1, 2020, but there’s a lot to do so you need to start work now. • The new law expands the definition of personal information and gives California consumers...more

32 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide