News & Analysis as of

Third-Party Cyber Attacks

Vinson & Elkins LLP

Who’s to Blame: Texas Federal Court Finds Contractual Counterparty Not Liable for Third-Party Wire Transfer Fraud

Vinson & Elkins LLP on

The facts are an oft-told business email compromise horror story: a hacker interjects themselves into an email discussion of a business deal, changes the wire instructions to their own account, and disappears with the...more

Akin Gump Strauss Hauer & Feld LLP

FTC’s Proposed Settlement with Blackbaud Requires Data Deletion and Data Governance

On February 1, 2024, the Federal Trade Commission (FTC) announced that it had reached a proposed settlement with that would require Blackbaud Inc. (“Blackbaud”) to delete personal data it does not need to retain and upgrade...more

Jackson Lewis P.C.

Cyber Safety Review Board Issues Compelling Report about Lapsus$, MFA Vulnerabilities, and Helpful Recommendations

Jackson Lewis P.C. on

The Cyber Safety Review Board (Board) issued a report entitled, Review of the Attacks Associates with Lapsus$ and Related Threat Groups (Report), released by the Department of Homeland Security on August 10, 2023. The Report...more

Jackson Lewis P.C.

The RIPTA Data Breach May Provide Valuable Lessons About Data Collection and Retention

Jackson Lewis P.C. on

Efforts to secure systems and data from a cyberattack often focus on measures such as multifactor authentication (MFA), endpoint monitoring solutions, antivirus protections, and role-based access management controls, and for...more

Lowenstein Sandler LLP

Recent Decision Highlights Considerations For Asserting Privilege In The Wake Of A Cyberattack

Lowenstein Sandler LLP on

“Malicious cyberattacks have unfortunately become a routine part of our modern digital world.” Wengui v. Clark Hill, PLC, Civil Action No. 19-3195, slip op. at 1 (D.D.C. Jan 12. 2021). When a data breach occurs, in-house...more

Lowenstein Sandler LLP

Rising Supply Chain Risk Requires Proactive Management

Lowenstein Sandler LLP on

As the roughly 18,000 organizations, government agencies and educational institutions continue to recover from last year’s SolarWinds nation-state attack, one of the biggest takeaways from this event is that organizations...more

White and Williams LLP

Another Court Holds a Third-Party Cyber Forensics Report as NOT Privileged

White and Williams LLP on

On January 12, 2021, the United States District Court for the District of Columbia joined the growing list of courts that have held that reports generated by third-party forensics firms in response to a cyberattack are not...more

Vinson & Elkins LLP

Individual Criminal Liability For Failure To Disclose Data Breach Establishes A New Level Of Risk For Companies And Executives

Vinson & Elkins LLP on

General Counsel and in-house legal departments have long struggled with articulating the risk of and determining the appropriate response to breaches of the company network and the potential exposure of confidential...more

BakerHostetler

Steps to Develop a Mature Third-Party Risk Management Program With High-Risk Third Parties (Part 3)

BakerHostetler on

This blog is the third in a series exploring how organizations can prevent or mitigate the severity of a third-party data breach or cyber exploit by implementing a variety of cybersecurity risk management controls, such as...more

Seyfarth Shaw LLP

FTC Touts Refined Approach to Data Security Enforcement

Seyfarth Shaw LLP on

Synopsis: On January 6, 2020, Andrew Smith, director of the Federal Trade Commission’s Bureau of Consumer Protection, outlined in a blog post the agency’s new approach to data security orders. The agency implemented this...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - October 2018

In this month's edition of our Privacy & Cybersecurity Update, we examine the European Data Protection Board's published opinions on data protection impact assessments, an Ohio court's ruling that bitcoin is covered insured...more

Steptoe & Johnson PLLC

First Look - Summer 2018: Insurance Newsletter

Steptoe & Johnson PLLC on

Your company’s computer system has been compromised by a hacker. From your initial investigation, you discover that the hacker has accessed proprietary company information and customer information including Social Security...more

Alston & Bird

SEC Provides Additional Information On Cybersecurity Examinations

Alston & Bird on

On September 15, 2015, the Security and Exchange Commission’s Office of Compliance Inspections and Examinations (“OCIE”) issued a Risk Alert to provide additional information on the areas of focus for its second round of...more

Foley Hoag LLP

OCIE’s 2015 Cybersecurity Examination Initiative

Foley Hoag LLP on

Second Round of Cybersecurity Examinations to Begin - On September 15, 2015, the Office of Compliance Inspections and Examinations (OCIE) of the Securities and Exchange Commission (SEC) issued a Risk Alert announcing a...more

Foley & Lardner LLP

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

Foley & Lardner LLP on

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

Morgan Lewis

SEC and DOJ Hacking Prosecutions Highlight SEC’s Increased Interest in Cybersecurity Risks

Morgan Lewis on

Companies are reminded of the need for strong internal controls. The US Securities and Exchange Commission (SEC) and the Department of Justice (DOJ) recently filed civil and criminal actions in the largest hacking and...more

Mintz - Privacy & Cybersecurity Viewpoints

Privacy Monday – July 2015

Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!) 1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - April 2015

In This Issue: - DOJ Issues Cyber Preparation and Response Guidance - RadioShack’s Plan to Auction Customer Data Highlights Issues Over Treatment of Such Data as an Asset - Google v. Vidal-Hall and...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide