News & Analysis as of

Risk Mitigation Cybersecurity

Pros and Cons of Hiring a Security Rating Agency

by Patrick Law Group, LLC on

One can hardly check out any news outlet today without reading or hearing about a security breach. Experts frequently advocate performing internal assessments to identify security weaknesses. Commentators tout the...more

Senate Passes MAIN STREET Cybersecurity Act Of 2017

by King & Spalding on

On September 28, 2017, the US Senate passed the Making Available Information Now to Strengthen Trust and Resilience and Enhance Enterprise Technology Cybersecurity Act of 2017 (the “Act”). The purpose of the Act is to require...more

Equifax and SEC Breaches Show You Can’t Hide from Hackers

by Wilson Elser on

Cited as one of the largest incidents of its kind in history, the recent Equifax data breach underscores that every business and individual is vulnerable to theft of sensitive information by unscrupulous hackers. In less than...more

Cyberattacks Are the New Norm - How to respond and get insurance recovery for government investigations.

Takeaways - Companies that suffer cyberattacks can expect not sympathy but scrutiny from legal authorities. - D&O insurance can cover not only litigation but also investigation costs. - Strategic negotiation of...more

Give Your Customers the Gift of Security

by Perkins Coie on

2017 has reminded us that data security threats continue to evolve and that the stakes for companies can be very high if their data security programs fail to evolve as well. Before the recent announcement of Equifax’s...more

Insurance Broker Series: Stephen Leveroni, ABD Insurance and Financial Services

Farella’s Insurance Recovery Group lawyers regularly collaborate with and learn from different players and functions within the insurance industry. To provide more value to our readers, we have reached out to a series of...more

FTC Issues ‘Stick with Security’ Guidance Emphasizing Data Security Best Practices

The Acting Director of the FTC’s Bureau of Consumer Protection, Thomas B. Pahl, recently commenced a ‘Stick with Security’ series of blog posts that analyze the data security principles championed by the FTC in its Start with...more

Cyber Insurance: Get What You Pay For              

by Fisher Phillips on

Due to the increasing number of successful and attempted cyber-attacks and increased government scrutiny surrounding protection of confidential information, companies cannot ignore the various risks associated with potential...more

Privacy & Cybersecurity Update - July 2017

In this month's edition of our Privacy & Cybersecurity Update, we examine new privacy laws in Germany, an FTC settlement with an alleged consumer loan company over unfair and deceptive practices, the dismissal of a data...more

No Rules, Just Be Right? The ABA's New Technology Ethics Opinion

by JD Supra Perspectives on

On the heels of the recent Petya ransomware attack, which infected DLA Piper's IT systems, a superb analysis by Peter Norman of the ABA's Formal Opinion 17-477R on lawyers' ethical responsibilities when using information...more

Cybersecurity: When Social Engineering Fraud is Not Covered Under Your Insurance Policy

by Bennett Jones LLP on

We live in an age of escalating cybersecurity threats. Many intrusion threats are social engineering attacks, which seek to gain entry to an organization's computer systems via its personnel and not a hack to the computer...more

Preparing For and Responding to the Petya Ransomware Attack

While still reeling from last month’s WannaCry attack, organizations worldwide were hit with another global ransomware attack this week, June 27, 2017. The infection began inside the Ukraine but has quickly spread across four...more

Yet another Target settlement highlights data breach costs

by Thompson Coburn LLP on

In what appears to be the closing act of the saga that is the Target data breach, on May 23 the retailer announced it had reached a settlement agreement with a coalition of 47 states’ attorneys general. Pursuant to the...more

HHS Releases Health Care Industry Cybersecurity Task Force Report

Last week, the Department of Health and Human Services (HHS) issued its “Report on Improving Cybersecurity in the Health Care Industry,” which is the culmination of a year-long effort on behalf of the Cybersecurity Task...more

Privacy & Cybersecurity Update - May 2017

In this edition of our Privacy and Cybersecurity Update, we take a look at the Trump administration's executive order outlining its cybersecurity plans, Acting FTC Chairwoman Maureen Ohlhausen's comments on the possible...more

OIG reports on CFPB’s public website security controls

by Ballard Spahr LLP on

The Office of Inspector General for the Fed and CFPB has completed a report setting forth its findings from an audit in which it evaluated “selected security controls for protecting the [CFPB’s] consumerfinance.gov website...more

OCIE Publishes Risk Alert In Response to WannaCry Ransomware

by Dechert LLP on

The Office of Compliance Inspections and Examinations (OCIE) of the U.S. Securities and Exchange Commission (SEC) issued a National Exam Program Risk Alert (Risk Alert) on May 17, 2017 in response to “WannaCry,” the ongoing...more

When “WannaCry” Strikes: Preparing for and Responding to the Largest Ransomware Attack in History

As many around the world were preparing for the Mother’s Day weekend, the WannaCry ransomware attack hit over 70,000 organizations in nearly 100 countries in just one day, Friday, May 12th. After the weekend, the attack had...more

Compliance’s Role in Preventing the Next “WannaCry” Cyberattack

by NAVEX Global on

The global chaos unleashed by the WannaCry ransomware virus reinforces that cyberattacks are not just the problem of IT departments. Compliance must play an integral part of any organization’s cross-functional cybersecurity...more

Global Ransomware Attack: Preparation is Key

by Foley & Lardner LLP on

Businesses have been scrambling since Friday evening when news spread that a ransomware attack named WannaCry is compromising organizations at an alarming rate. In less than 48 hours, it has compromised more than 130,000...more

Tips to Help a Business Avoid Data Breach Litigation

by Revision Legal on

Little else is as stressful for a company than handling the aftermath of a data breach. Not only does the company have the obligation of making notifications to clients about the data breach, but it may also be confronted by...more

[Webinar] Be Compromise Ready: Go Back to the Basics - May 9th, 12:00pm EDT

by BakerHostetler on

Cyber threats are here to stay. No company, large or small, is immune. But there are basic measures you can take to prepare for the legal and business risks associated with an attack....more

Data Breach Response: Orchestrating Legal and Technical Resources to Contain and Mitigate

Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly....more

Cybersecurity: Yes, They Will Hack Your Car

by Foley & Lardner LLP on

Auto manufacturers are increasingly equipping vehicles with rapidly advancing technologies, raising concerns regarding how the public will be affected by these changes. Manufacturers are beginning to implement automated...more

Proposed Federal Cybersecurity Regulations for Financial Institutions Face an Uncertain Future

Last year’s proposed comprehensive framework for cybersecurity rules for large financial institutions is suddenly facing an uncertain future. With the comment period having closed as of February 2017, the framework was facing...more

112 Results
|
View per page
Page: of 5
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.