News & Analysis as of

Chief Information Officers (CIO) Chief Information Security Officer (CISO)

Society of Corporate Compliance and Ethics...

[Webinar] Navigating the Changing Cybersecurity Landscape - September 12th, 12:00 pm - 1:30 pm CT

Learning Objectives: - Gain an understanding of recent changes to the cyber security landscape - Where to start: elevate your cyber security risk management - Educate on the future of cyber security in healthcare and...more

KPMG Board Leadership Center (BLC)

Board oversight of GenAI

Like few topics before it, generative artificial intelligence (GenAI) has dominated discussions in many C-suites over the last year. Boards are playing a crucial role in both encouraging management to accelerate the pace of...more

Health Care Compliance Association (HCCA)

[Webinar] Responsible Use of Health Data - May 7th, 12:00 pm CT

To create awareness about the voluntary Responsible Use of Health Data (RUHD) certification program launched recently by the Joint Commission for US Hospitals. The webinar is intended to provide additional details about...more

Constangy, Brooks, Smith & Prophete, LLP

SolarWinds case could establish SEC liability for CISOs

On October 30, 2023, the Securities and Exchange Commission filed a securities fraud claim in federal court in the Southern District of New York against SolarWinds Corporation as well as its Chief Information Security...more

American Conference Institute (ACI)

[Event] Police Tech Conference & Expo - April 30th - May 1st, Mississauga, Ontario, Canada

Hosted by CI, the Police Tech Conference & Expo returns for another exciting year with curated programming that will allow you to experience the captivating convergence of Canada’s senior law enforcement officers and the...more

Latham & Watkins LLP

SEC Adopts Cybersecurity Disclosure Rules

Latham & Watkins LLP on

The SEC, by a 3-2 vote, has adopted new rules requiring companies to provide: ..current disclosure on Form 8-K within four business days of determining that a material cybersecurity incident has occurred; and ...more

Guidepost Solutions LLC

Lines of Authority: The Critical Need for Role Clarity in Information Security Compliance

Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more

NAVEX

[Webinar] Risk and Process Management Framework: Lessons Learned in Getting Started – Featuring Forrester - June 20th, 10:00 am PT

NAVEX on

Getting a successful risk management program off the ground can be daunting for even the most intrepid information security professionals. It doesn’t have to be rocket science. In this webinar, we’ll explore with guest...more

Cozen O'Connor

Regulators and Cybersecurity Leaders Advise Businesses on How to Prepare For A Major Attack and the Consequences of Failure to Act

Cozen O'Connor on

On April 4, 2023, the office of Illinois Attorney General Kwame Raoul was joined by leaders in technology and law enforcement for a full-day symposium designed to inform CISOs, CTOs and CIOs on how best to protect their...more

Society of Corporate Compliance and Ethics...

Marti Arvin and Anthony Buenger on the CMMC Framework

America’s data is under attack. Solar Winds and other recent headline-grabbing stories have demonstrated that foreign adversaries are eager to hack into computer systems for a wide range of purposes. The US Department of...more

Stoel Rives - Global Privacy & Security Blog®

Working from Home? Here are 12 Steps to Reduce Data Privacy and Security Risk

As businesses institute widespread remote work policies and procedures to facilitate social distancing and “flatten the curve,” they should be mindful of increased data privacy and security risks. The risks can range from...more

White and Williams LLP

Ready or Not: NY SHIELD Act’s Data Security Requirements Go Into Effect March 21, 2020

White and Williams LLP on

As was previously written, last fall New York enacted the "Stop Hacks and Improve Electronic Data Security Act" (SHIELD ACT), which required businesses having private information of New York residents to implement a written...more

Stoel Rives - Global Privacy & Security Blog®

Soon, all ransomware attacks may be data breaches

As this recent article illustrates, many ransomware operators are now collecting information from victims before encrypting their data, and then threatening to release what they’ve collected – or actually releasing some of it...more

Bricker Graydon LLP

[Event] Ohio Insurance Cybersecurity Seminar - January 24th, Cincinnati, OH

Bricker Graydon LLP on

What GCs, CIOs, CSOs and CPOs need to know about Ohio's new requirements under S.B. 273 - Please join GBQ and Bricker & Eckler for our Ohio Insurance Cybersecurity Seminar on Ohio Senate Bill 273 (codified @ Ohio Rev....more

Locke Lord LLP

[Webinar] Business E-mail Compromise Scams - Practical Perspectives - January 12th, 10:30am EST

Locke Lord LLP on

An increasing number of businesses are targeted by very sophisticated email scams designed to convince company employees responsible for executing financial transactions to wire funds to overseas accounts controlled by...more

Dorsey & Whitney LLP

Cybersecurity Advice to CEOs and Boards “Take more responsibility”!

Dorsey & Whitney LLP on

The White House and its top security advisors are regularly advised about cyberintrusions and as a result the “time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security”...more

King & Spalding

Also In The News - Health Headlines - August 2015 #2

King & Spalding on

House Report Highlights Cybersecurity Concerns At The Department Of Health and Human Services – The U.S. House of Representatives Committee on Energy and Commerce released a report revealing that five operating divisions at...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide