News & Analysis as of

Third-Party Service Provider Third-Party Risk

Morgan Lewis - Tech & Sourcing

Contracting for Resilience and Optionality (Part 1)

Outsourcing strategies in 2026 are being shaped by persistent disruption. Geopolitical uncertainty, major service outages, talent disruption, and post COVID-19 consolidation initiatives are driving a renewed focus on...more

Mayer Brown

FCC Urges Communications Providers to Strengthen Ransomware Defenses

Mayer Brown on

On January 29, 2026, the Federal Communications Commission’s (“FCC” or the “Commission”) Public Safety and Homeland Security Bureau issued a Public Notice (DA 26-96) to highlight best practices that communications providers...more

WaterStreet Company

5 Considerations for Outsourcing Print & Mail Operations in P&C Insurance

WaterStreet Company on

Property and casualty insurers manage high volumes of regulated, document-driven communications, including policies, endorsements, billing statements, and legally required notices, that must be produced and delivered...more

The Volkov Law Group

Soothing the AI-Risk Hysteria: A Focused Approach to AI Risks (Part I of II)

The Volkov Law Group on

From my perspective, hopefully a reasonable one, there is a little too much AI-Risk Hype. Not to belittle the experts or ignore potential risk concerns but this is getting a little carried away....more

Skadden, Arps, Slate, Meagher & Flom LLP

Ransomware: What You Need to Know as Attacks, Regulation and Enforcement Increase

Ransomware attacks continue to evolve in sophistication, disrupting operations and commanding the urgent attention of regulators, law enforcement and government agencies....more

Troutman Pepper Locke

Legal AI in Practice: Firm Governance, Build vs. Buy Decisions, and Vendor Due Diligence — The Good Bot Podcast

Troutman Pepper Locke on

In this episode of The Good Bot, Brett Mason sits down with Leigh Zeiser, director of AI and automation at Troutman Pepper Locke, to unpack how the firm operationalizes AI responsibly. They discuss the firm's AI portfolio —...more

Mitratech Holdings, Inc

Third-Party Data Breaches: What You Need to Know

A third-party data breach occurs when malicious actors compromise a vendor, supplier, contractor, or other organization to gain access to sensitive information or systems of the victim’s customers, clients, or business...more

Ropes & Gray LLP

On the Seventh Day of Data… The Growing Pains of Regulation S-P in 2025

Ropes & Gray LLP on

Financial regulators including the Securities and Exchange Commission (“SEC”) continued to focus on data protection and cybersecurity issues throughout 2025....more

A&O Shearman

BCBS principles for the sound management of third-party risk

A&O Shearman on

The Basel Committee on Banking Supervision (BCBS) has published its principles for the sound management of third‑party risk, replacing the 2005 Joint Forum outsourcing paper and establishing a common baseline for banks and...more

Constangy, Brooks, Smith & Prophete, LLP

Warm up your defenses against cyber holiday risks

Each year, there is a holiday surge in cyberattacks employing a wide range of attack vectors. This heightened activity can make organizations more vulnerable to legal and regulatory scrutiny. This is a good time to check your...more

Jones Day

NY Department of Financial Services Signals Increased Scrutiny of Third-Party Technology Risk Management

Jones Day on

On October 21, 2025, the New York Department of Financial Services ("NYDFS") sent a letter to the executives and information security personnel at covered entities with new guidance for managing technology and data risks...more

Warner Norcross + Judd

A Word of Caution: Wiretap Lawsuits Continue to Plague Website Owners

Warner Norcross + Judd on

Over the last several years, plaintiffs’ attorneys and other individuals have used antiquated wiretapping laws, including California’s 1967 wiretapping act, to allege that businesses with websites utilizing third parties and...more

Strafford

[Webinar] Controlling Artificial Intelligence When You Are Not in Control: Practical Policies for Minimizing Vendor or Partner...

Strafford on

Companies and law firms need to control the risks posed by AI. But when your company purchases an AI tool from a vendor, or supports partners like Legal Aid organizations who may have integrated AI tools into their client...more

A&O Shearman

ESAs publish official list of designated critical CTPPs under DORA

A&O Shearman on

The European Supervisory Authorities, referred to as ESAs (comprising the European Banking Authority, European Insurance and Occupational Pensions Authority and the European Securities and Markets Authority) have published...more

Constangy, Brooks, Smith & Prophete, LLP

Minor Breaches, Major Trouble: Why minor cyber incidents can lead to major legal fallout

When cyberattacks strike global giants, it’s front-page news. But what about the smaller breaches -- the ones that don’t make headlines? Increasingly, they’re making waves in courtrooms and regulatory enforcement agencies. ...more

McGuireWoods LLP

NYDFS Issues Guidance on Third-Party Cybersecurity Risk Management: What Regulated Entities Need to Know

McGuireWoods LLP on

On October 21, 2025, the New York State Department of Financial Services (NYDFS) released comprehensive guidance for registrants regarding management of cybersecurity risks associated with third-party service providers...more

DLA Piper

DORA’s Critical ICT Provider List Published – A New Milestone for Digital Resilience

DLA Piper on

In a significant stride toward strengthening digital stability in Europe’s financial sector, the European Supervisory Authorities (EBA, EIOPA, and ESMA) have, today, published the list of critical ICT third‑party service...more

Guidepost Solutions LLC

How Organizations Can Strengthen Third-Party Vendor Oversight and Compliance

Guidepost Solutions LLC on

Organizations that rely on third-party vendors for critical operations face unique challenges in managing vendor risks. These external relationships are essential for operational success, but can also create vulnerabilities...more

McDermott Will & Schulte

NYDFS clarifies expectations for third-party cybersecurity risk management

On October 21, 2025, the New York State Department of Financial Services (NYDFS) issued an industry letter highlighting risks associated with third-party service providers – such as providers of cloud computing, file transfer...more

Whiteford

Client Alert: With Giving Tuesday Approaching, What Nonprofits Need to Know About GoFundMe’s Creation Of Over A Million...

Whiteford on

With Giving Tuesday quickly approaching on December 2, 2025, nonprofits are alarmed to discover that GoFundMe, an online for-profit fundraising platform, had created donation pages for approximately 1.4 million nonprofit...more

Goodwin

Beyond the Perimeter: Securing OAuth Tokens and API Access to Thwart Modern Cyber Attackers

Goodwin on

OAuth tokens streamline access but create new vulnerabilities that threat actors are exploiting. Learn how to secure token infrastructure through robust monitoring, governance, and vendor management....more

Fisher Phillips

NY Dept of Financial Services Issues Guidance to Covered Entities on Overseeing Third-Party Service Providers: 4 Areas of Focus

Fisher Phillips on

The New York Department of Financial Services (NYDFS) just sent a stark reminder to covered entities (which includes financial institutions, insurance companies, and any other businesses regulated by the NYDFS) that they are...more

KPMG Board Leadership Center (BLC)

2025 Audit Committee Survey Insights

Key challenges, concerns, and priorities impacting audit committee agendas. To gain a better understanding of the key challenges, concerns, and priorities impacting audit committee agendas, the KPMG Board Leadership Center...more

Jackson Lewis P.C.

When Big Doesn’t Mean Bulletproof: The Importance of Third-Party Service Provider Due Diligence

Jackson Lewis P.C. on

Leaders charged with safeguarding data privacy and cybersecurity often assume that size equates to security—that large, well-resourced organizations must have airtight defenses against cyberattacks and data breaches. It’s a...more

Ropes & Gray LLP

Insure Or Secure: Should All Businesses Have Cyber Insurance?

Ropes & Gray LLP on

Last week it came to light that the victims of two of the UK’s most high-profile recent data breaches — the Co-operative Group and Jaguar Land Rover — did not have cyber insurance in place. As a result, the companies will...more

80 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide