Considering the rapid development and deployment of artificial intelligence (AI) in a wide array of applications and business sectors, it can be a daunting task for a company’s General Counsel (GC) to keep pace in identifying...more
2/19/2025
/ Artificial Intelligence ,
Compliance ,
Corporate Counsel ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Machine Learning ,
Privacy Laws ,
Regulatory Requirements ,
Risk Assessment ,
Risk Management ,
Third-Party
In the latest installment of Lowenstein Sandler's Cybersecurity Awareness Series, Ken Fishkin speaks with Kathleen A. McGee, partner in Lowenstein’s The Tech Group and White Collar Criminal Defense practice group; Kate...more
In response to major cyber-related attacks caused by software security flaws, such as the SolarWinds breach, the Biden administration is gearing up to crack down on software providers that distribute products with security...more
Marita A. Makinen, Chair of the firm’s Mergers & Acquisitions practice and co-Chair of the Transactions & Advisory Group, and Ken Fishkin, CISSP, CIPP/US, CIPM, CIPT, Manager of Information Security at Lowenstein Sandler,...more
Ken Fishkin talks to Doreen M. Edelman and Christian C. Contardo of the firm’s Global Trade & National Security practice, about ransomware and the risks of making payments when data is held for ransom, such as exposure to...more
In this episode of Lowenstein’s Cybersecurity Awareness series, Ken Fishkin, Lowenstein’s Manager of Information Security, speaks with Lynda A. Bennett, Chair of the firm’s Insurance Recovery Group, about the impact of...more
A major vulnerability (known as Log4j or Logshell) within Java-based applications is impacting millions of applications around the world. This issue affects most industries and is very dangerous if applications are not...more
In this first session in our Cybersecurity Awareness Series, discover how to implement the “ounce of prevention, pound of cure” approach–specifically, what your organization can do to create a cybersecurity plan and...more
Not every cybersecurity threat is ransomware. Phishing is cybersecurity’s biggest threat. It’s one of the most common ways hackers can “get into” your organization, and it can result in much more than identity theft. In the...more
In the second session in our Cybersecurity Awareness Series, learn the ins and outs of preparing your organization’s staff for a potentially damaging situation–whether created by accident or by a malicious outsider–by running...more