News & Analysis as of

Security and Privacy Controls Risk Assessment

BakerHostetler

NYDFS Issues Revised Proposed Second Amendment to Its Cybersecurity Regulation

BakerHostetler on

The New York State Department of Financial Services (NYDFS) recently published a revised proposed second amendment to its cybersecurity regulation, 23 NYCRR 500. ...more

NAVEX

4 Things to Know About Updated NIST 800-53 Standards

NAVEX on

[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more

Eversheds Sutherland (US) LLP

Cybersecurity and coronavirus - Guarding against hackers in this heightened risk environment 

Many general counsels, as well as their privacy and cybersecurity teams, are understandably focused on their company’s coronavirus safety measures - and that is good news to the hackers. Hackers thrive amidst confusion and...more

Fenwick & West LLP

Clarity and Insight or Just Hyperventilation: Preparing for the CCPA in View of the Latest Proposed Draft Regulations

Fenwick & West LLP on

Revised Proposed Regulations. Just when you exhaled after the January 1, 2020, effective date of the California Consumer Privacy Act, on February 10, the California attorney general released modifications to the draft of the...more

White and Williams LLP

A Yelp From Posting on Yelp®

White and Williams LLP on

Are your employees instructed on the proper (and improper) use of social media? Does your organization have policies and provide training on the appropriate handling of sensitive information? A recent United States Department...more

Latham & Watkins LLP

FTC Hearings Discuss the State of Data Security in the 21st Century

Latham & Watkins LLP on

Ninth hearing on Competition and Consumer Protection in the 21st century highlights challenges of addressing persistent threats to data security. On December 11 and 12, the Federal Trade Commission (the FTC or the...more

BCLP

Organizing Data Privacy Within A Company (2018 Update)

BCLP on

Although organizations have dealt with privacy issues for years, only in the past decade have they begun to view the complexities of privacy as requiring formal organizational structure, dedicated employees, and/or dedicated...more

Hogan Lovells

China moves to implement security review of network products and services: but leaves foreign investor and manufacturer concerns...

Hogan Lovells on

On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures”) for public comment: the Draft Measures remain open for comments until...more

Tucker Arensberg, P.C.

OCR Announces HIPAA Security Settlement with Cancer Care Group, P.C.

Tucker Arensberg, P.C. on

In September, 2015, OCR and HHS issued a press release announcing a Resolution Agreement with the Cancer Care Group, P.C., which included entry into the agreement, the adoption of a robust compliance plan, and the payment of...more

Akin Gump Strauss Hauer & Feld LLP

SEC OCIE Sharpens Focus on Cybersecurity

If you read one thing... - On September 15th, the SEC OCIE announced in a Risk Alert it will launch a second round of cybersecurity examinations of registered broker-dealers and investment advisers, which will be more...more

WilmerHale

SEC Issues Cybersecurity Examination Risk Alert

WilmerHale on

On September 15, the Securities and Exchange Commission’s (SEC) Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert re-emphasizing the careful scrutiny it will give to the data security practices of...more

Bennett Jones LLP

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

Bennett Jones LLP on

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

Wilson Sonsini Goodrich & Rosati

The WSGR Data Advisor

In this issue: - Navigating Public Company Cybersecurity Obligations: Advising Boards and Disclosing to Investors - FTC Updates School-Related COPPA Guidance - Status Update on the EU Data Protection...more

Ballard Spahr LLP

FFIEC Tool Helps You Assess Cyber Risk

Ballard Spahr LLP on

The Federal Financial Institutions Examination Council (FFIEC) has released its long-awaited Cybersecurity Assessment Tool (Assessment) to help financial institutions identify the inherent risks faced by a company and...more

Sheppard Mullin Richter & Hampton LLP

ALERT: NIST Issues Final Guidance on Federal Contractor Cybersecurity Standards for Controlled Unclassified Information

On June 19, 2015, the National Institute of Standards and Technology (NIST) published the final version of guidance for federal agencies to ensure sensitive information remains confidential when stored outside of federal...more

Troutman Pepper

Is Your Financial Institution the Next Target of a Cyber-Attack?

Troutman Pepper on

In This Presentation: - Regulatory expectations for financial institutions - Risks for financial institutions - Planning to reduce risks - The Breach - Duties and responsibilities -...more

BakerHostetler

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

BakerHostetler on

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

BakerHostetler

Cybersecurity is a Real Risk, So Become “Compromise Ready”

BakerHostetler on

Many have heard that “it is not a matter of if a company will be attacked, but when.” Statements like this used to be met with skepticism – companies would say we do not have information hackers want, we outsource our...more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide