Latest Publications

Share:

Cybersecurity = National Security: How the Investment Management Community Should Prepare for SEC’s Proposed Rules [Video]

In the latest installment of Lowenstein Sandler's Cybersecurity Awareness Series, Ken Fishkin speaks with Kathleen A. McGee, partner in Lowenstein’s The Tech Group and White Collar Criminal Defense practice group; Kate...more

Biden Administration Aims to Shift Liability for Cyberattacks to Software Developers

In response to major cyber-related attacks caused by software security flaws, such as the SolarWinds breach, the Biden administration is gearing up to crack down on software providers that distribute products with security...more

Cyber Breaches in M&A Transactions [Video]

Marita A. Makinen, Chair of the firm’s Mergers & Acquisitions practice and co-Chair of the Transactions & Advisory Group, and Ken Fishkin, CISSP, CIPP/US, CIPM, CIPT, Manager of Information Security at Lowenstein Sandler,...more

Understanding the Additional Risks When Making a Ransomware Payment [Video]

Ken Fishkin talks to Doreen M. Edelman and Christian C. Contardo of the firm’s Global Trade & National Security practice, about ransomware and the risks of making payments when data is held for ransom, such as exposure to...more

Cyber Insurance Changes in the Aftermath of Log4j [Video]

In this episode of Lowenstein’s Cybersecurity Awareness series, Ken Fishkin, Lowenstein’s Manager of Information Security, speaks with Lynda A. Bennett, Chair of the firm’s Insurance Recovery Group, about the impact of...more

How Patching log4J Can Mitigate Regulatory and Insurance Issues [Video]

A major software vulnerability (known as Log4j or Logshell) continues to have a major impact on many industries, causing insurance carriers and regulators to take notice. In the latest episode of Lowenstein Sandler’s...more

The Flaw in Log4j and How It Can Impact Your Business [Video]

A major vulnerability (known as Log4j or Logshell) within Java-based applications is impacting millions of applications around the world. This issue affects most industries and is very dangerous if applications are not...more

How to Protect your Organization From a Cybersecurity Attack [Video]

In this first session in our Cybersecurity Awareness Series, discover how to implement the “ounce of prevention, pound of cure” approach–specifically, what your organization can do to create a cybersecurity plan and...more

Phishing: Cybersecurity’s Biggest Threat [Video]

Not every cybersecurity threat is ransomware. Phishing is cybersecurity’s biggest threat. It’s one of the most common ways hackers can “get into” your organization, and it can result in much more than identity theft. In the...more

How to Prepare for a Cybersecurity Breach [Video]

In the second session in our Cybersecurity Awareness Series, learn the ins and outs of preparing your organization’s staff for a potentially damaging situation–whether created by accident or by a malicious outsider–by running...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide