News & Analysis as of

Risk Assessment Risk Management Critical Infrastructure Sectors

Latham & Watkins LLP

President Trump Issues Executive Order Calling on State and Local Governments to Support National Resilience

Latham & Watkins LLP on

The order prioritizes extensive policy reviews, the introduction of a National Resilience Strategy and National Risk Register, and increased reliance on state and local governments to strengthen national infrastructure....more

Schwabe, Williamson & Wyatt PC

Coast Guard Tightens Up Cybersecurity Regulations

The maritime industry has become a prime target for hackers. In the last few years, it has seen a steep increase in the number of shipping-related cyberattacks. The recent surge marks a new and pressing challenge for ports...more

Ropes & Gray LLP

A Very Merry NISTmas: 2024 Updates to the Cybersecurity and AI Framework

Ropes & Gray LLP on

The National Institute of Standards and Technology (NIST) has been a leading voice in cybersecurity standards since 2013, when President Obama’s Executive Order on Improving Critical Infrastructure Cybersecurity tasked NIST,...more

Alston & Bird

Department of Homeland Security Releases Recommended Framework for AI in Critical Infrastructure

Alston & Bird on

On November 14, 2024, the Department of Homeland Security (“DHS”) announced a set of voluntary recommendations called the “Roles and Responsibilities Framework for Artificial Intelligence in Critical Infrastructure”...more

Foley Hoag LLP

Actualités en matière de lutte contre la corruption en France et en Europe

Foley Hoag LLP on

Deux études particulièrement intéressantes ont récemment été publiées par l’Agence Française Anticorruption (l’AFA) et la Commission européenne dans le domaine de la lutte contre la corruption. La première étude publié...more

Mayer Brown

Trends in US Cybersecurity Regulation

Mayer Brown on

As cybersecurity rules proliferate, companies must navigate a maze of new, and often overlapping, proactive and reactive cybersecurity requirements and guidance. This Legal Update surveys new cybersecurity rules and...more

DLA Piper

The UK Cybersecurity and Resilience Bill – A Different Approach to NIS2 or a British Sister Act?

DLA Piper on

Introduction It wouldn't be much of an exaggeration to say that NIS2 is the acronym on everyone's lips. When coupled with its European sister legislation DORA, we encounter a regulatory twosome that make GDPR feel like...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Critical Infrastructure Protection/EPA Urgently Needs a Strategy to Address Cybersecurity Risks to Water/Wastewater Systems: GAO...

Critical Infrastructure Protection/EPA Urgently Needs a Strategy to Address Cybersecurity Risks to Water/Wastewater Systems: GAO Issued Report - The United States Government Accountability Office (“GAO”) released on August...more

Cozen O'Connor

The EU AI Act: Part Two – High-Risk AI Systems

Cozen O'Connor on

This is part two of our examination of the European Union’s new artificial intelligence law, the (“EU AI Act”). In part one, we introduced the scope of the EU AI Act and discussed what types of AI systems are outright...more

Akin Gump Strauss Hauer & Feld LLP

EU Ratifies Pioneering Artificial Intelligence Legislation

On May 21, 2024, the European Union finalized the adoption of the groundbreaking EU Artificial Intelligence Act, a comprehensive and sector-agnostic legislation that extends globally. This 420-page Act aims to regulate the...more

Health Care Compliance Association (HCCA)

Privacy Briefs: January 2024

New York has released proposed cybersecurity regulations for hospitals. The regulations, which were published in The State Register on Dec. 6 and will undergo a 60-day public comment period ending on Feb. 5, are designed to...more

Bradley Arant Boult Cummings LLP

Evolution of the Chinese Hacking Threat: Risks for Government and Industry

On May 24, 2023, Microsoft announced the detection of a direct threat to critical infrastructure organizations in Guam and elsewhere in the United States. The alert attributed observed malicious activity to a state-sponsored...more

Akin Gump Strauss Hauer & Feld LLP

Newsom on GenAI: Executive Order Mandates Ethical Innovation in View of Risk

The development of artificial intelligence (AI) and particularly Generative Artificial Intelligence (GenAI) has exploded in recent years, prompting government officials including the Biden administration to call for studies...more

Perkins Coie

Sector-Based Cybersecurity Requirements for Critical Infrastructure, From Our Water Systems to the Skies

Perkins Coie on

Following the release of President Biden’s National Cybersecurity Strategy, Acting National Cyber Director Kemba Walden explained that the Biden Administration is “expecting more” from owners and operators in critical...more

Opportune LLP

Cyberattack Shuts Major US Fuel Pipeline: Why Colonial Pipeline & Why Now?

Opportune LLP on

Find out why the cyberattack on Colonial Pipeline will have broad implications on how the energy industry defends and responds to future incidents....more

Robinson+Cole Data Privacy + Security Insider

Industrial Control Systems at Risk from Targeted Snake Malware

Researchers at Sentinel One and Dragos have detected malicious code, called EKANS or Snake, that has been designed specifically to target industrial control systems (ICS), including those of oil refineries, manufacturing...more

Hogan Lovells

U.S. Commerce Department issues proposed rule to implement executive order on telecom supply chain

Hogan Lovells on

On 26 November 2019 the U.S. Department of Commerce issued a long-awaited proposed rule (or draft regulations) to implement Executive Order 13873, "Securing the Information and Communications Technology and Services Supply...more

Hogan Lovells

DOJ Continues False Claims Act Enforcement in Transportation Industry

Hogan Lovells on

Two recent False Claims Act (FCA) settlements between the Department of Justice (DOJ) and transportation companies point to the continuation of a recent trend by the DOJ to use the FCA as a significant enforcement tool...more

Opportune LLP

Power Plants: Cybersecurity Threats and Risks (Part 1)

Opportune LLP on

This is the first installment of a two-part series exploring how critical infrastructure like power plants are proactive in implementing protective measures to safeguard against future cyber attacks, but challenges remain....more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide