On October 30, 2023, President Joe Biden issued an Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (Order) that addresses the responsible use of artificial intelligence (AI)...more
In the latest installment of Lowenstein Sandler's Cybersecurity Awareness Series, Ken Fishkin speaks with Kathleen A. McGee, partner in Lowenstein’s The Tech Group and White Collar Criminal Defense practice group; Kate...more
In response to major cyber-related attacks caused by software security flaws, such as the SolarWinds breach, the Biden administration is gearing up to crack down on software providers that distribute products with security...more
In its efforts to address cybersecurity risks, the U.S. Securities and Exchange Commission (“SEC”) continues to propose rules on cybersecurity. Most recently, on March 15, 2023, the SEC announced its proposal of three...more
This week on “Regulatory Matters,” partner Doreen M. Edelman, chair of Lowenstein’s Global Trade & National Security group, interviews partner Kathleen A. McGee on her practice’s dual focus on White Collar Criminal Defense...more
On this episode of Regulatory Matters, Elizabeth Roper, Chief of the Cybercrime and Identity Theft Bureau at the Manhattan District Attorney's Office, talks with Kathleen A. McGee about her career in what is still a...more
Requirements under the proposed rules would include the disclosure of:
•Material cybersecurity incidents within four business days of the determination that a material cybersecurity incident has occurred in a Form 8-K-...more
3/22/2022
/ Corporate Governance ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Disclosure Requirements ,
Policies and Procedures ,
Popular ,
Proposed Rules ,
Regulation S-K ,
Risk Management ,
Securities and Exchange Commission (SEC)
A major vulnerability (known as Log4j or Logshell) within Java-based applications is impacting millions of applications around the world. This issue affects most industries and is very dangerous if applications are not...more
In this first session in our Cybersecurity Awareness Series, discover how to implement the “ounce of prevention, pound of cure” approach–specifically, what your organization can do to create a cybersecurity plan and...more
Not every cybersecurity threat is ransomware. Phishing is cybersecurity’s biggest threat. It’s one of the most common ways hackers can “get into” your organization, and it can result in much more than identity theft. In the...more
In the second session in our Cybersecurity Awareness Series, learn the ins and outs of preparing your organization’s staff for a potentially damaging situation–whether created by accident or by a malicious outsider–by running...more
The recent Colonial Pipeline ransomware event provides a strong incentive for organizations to evaluate their resiliency to cyberattacks. With ransomware being the No. 1 concern for many Security Officers surveyed in a recent...more
Yesterday, the Federal Trade Commission (FTC) published data security guidance on their business blog that should be taken seriously by any corporate board. The article, “Corporate Boards: Don’t Underestimate Your Role in...more
We are now seeing a potential trend where states are incentivizing companies through the creation of safe harbors to improve their cybersecurity posture, instead of penalizing them after a breach of personal information. Utah...more
At a time when the U.S. healthcare system is already overwhelmed by the COVID-19 pandemic, hospitals and healthcare companies have been hit with an unprecedented number of ransomware attacks. A joint cybersecurity advisory...more
A putative consumer class action filed in California state court on Friday the 18th against Petco Animal Supplies Stores Inc. (Petco) and its wholly owned subsidiary PupBox Inc. (PupBox) alleges that between February and...more
As reported by Bloomberg and other news outlets, a major cyber security intrusion attributed to Russian state hackers, known by the nicknames APT29 or Cozy Bear, has sent cybersecurity experts into emergency mode as they work...more