As applications and use cases for digital assets and their blockchain infrastructure grow and become more sophisticated, investments and valuations for businesses in these areas have grown as well. The growing number of...more
5/23/2024
/ Blockchain ,
Corporate Sales Transactions ,
Cryptocurrency ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Security ,
Digital Assets ,
Information Technology ,
Intellectual Property Protection ,
Investment ,
Risk Management
On March 27, 2024, the Cybersecurity & Infrastructure Security Agency (CISA) within the US Department of Homeland Security released a much-anticipated notice of proposed rulemaking (NPRM) to implement the Cyber Incident...more
4/1/2024
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) ,
Cybersecurity ,
Data Breach ,
Data Preservation ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
NPRM ,
Proposed Rules ,
Ransomware ,
Regulatory Agenda
On January 17, 2024, the New York State Department of Financial Services (“NYSDFS”) released a proposed circular letter addressing the use of external consumer data and information sources (“ECDIS”) and artificial...more
1/26/2024
/ Artificial Intelligence ,
Comment Period ,
Consumer Information ,
Data Management ,
Discrimination ,
Disparate Impact ,
Fairness Standard ,
Information Governance ,
Information Management ,
Information Technology ,
Insurance Regulations ,
Machine Learning ,
NYDFS ,
Popular ,
Proposed Regulation ,
Regulatory Agenda ,
Risk Management ,
Underwriting
Engaging third-party providers for technology transactions involves a certain level of cybersecurity risk. In fact, most companies have been through a third-party incident. In this episode, partners Justin Herring and Adam...more