Law Brief®: Rich Schoenstein and Annmarie Giblin Discuss Cyber Law
Cracking the Code: Getting the Most Out of Your Cyber Insurance Policy
Cybersecurity Threats Facing Food and Agribusiness Companies & the Preparation and Protection Safeguards to Help Mitigate Them
Cyber Insurance - An Essential Component to Your Business
London’s Nation-State Attack Exclusion: Game Changer For The Cyber Insurance Market or An Opportunity For Competition Within the Market?
The Significance of Operational Technology in Cyber Insurance Underwriting – Part 2
The Downstream Impact of Ransomware on Cyber Insurance Underwriting – Part 1
Coverage Considerations for Ransomware & Cyber Attacks
Cyber Insurance Changes in the Aftermath of Log4j
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
How Patching log4J Can Mitigate Regulatory and Insurance Issues
Wait, that’s covered? Insurability of Fines and Penalties Flowing From a Cybersecurity Breach
Takeaways From Recent Claims Against Mark Zuckerberg and Facebook – Mitigating the Heightened Risk of Privacy Suits Against Individual Directors and Officers
No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day
Ransomware and Cyber Insurance: The good, the bad, and why your insurance data is a target for hackers (with Jacob Ingerslev)
Debra Geroux and Scott Wrobel on Responding to Data Breaches
Cyber Insurance Coverage Market: A House of Cards or Temporary Plateau?
NGE On Demand: Insurance and Indemnity Issues for Family Offices with Angela Elbert
Nota Bene Episode 114: The New Global Business of Cyberattack, from Ransomware to a Now-Ubiquitous State of Breach with Kari Rollins
The Ransomware Attack Part 2 – How To Respond When The Enemy Overcomes The Gates
It’s obvious that strong cybersecurity governance should help to reduce a company’s risk of succumbing to a cybersecurity incident or being significantly impacted should one materialize. One major challenge: determining what...more
Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more
In today's digital world, organizations are increasingly vulnerable to a wide variety of cyber threats that can wreak havoc on their operations, jeopardize the security of confidential information, negatively impact...more
Editor's Note: The convergence of CYE's and Surfshark's analyses reveals a critical juncture in the fight against cyber threats. With the U.S. leading global data breaches and businesses facing significant insurance coverage...more
Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more
The number of cybersecurity incidents continues to increase, with the average cost of a data breach in 2022 reaching an all-time high of $4.35 million, up from $3.86 million in 2020. In addition to the increasing number of...more
Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more
Takeaway: As cybersecurity risk increases, large enterprises and government agencies are, increasingly, forcing smaller vendor companies to obtain cyber insurance to help manage the risk of a data breach. To prepare for an...more
1.0 CYBER MARKET UPDATE - 1.1 US Market Update - To call 2021 anything other than a sea change in the cyber insurance world would be an understatement. Indeed, nearly all cyber insurance renewals saw increases in...more
The digitization of various products, services, and business processes over recent years has been a boon for business. But, as our clients are well aware by now, it has brought attendant cybersecurity risks. The recent spate...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
We have all heard about the alarming and ever increasing number of security breaches and ransomware attacks facing businesses. With bad actors continuously evolving and presenting new risks, most companies now fortunately...more
Cyberattacks have become big business, from the standpoint of both the attackers and attorneys pursuing liability compensation from corporate attack victims. Threat actors range well beyond hacker cults of old, now including...more
There are showers, there are squalls, and there are storms. The growth in cybersecurity attacks in Australia, as in much of the world, is a storm and Australian companies need to batten down the hatches. In the period from 1...more
In the 2020 M-Trends report, it was noted that successful monetization of ransomware attacks and the availability of ransomware as a service have contributed to an increase in ransomware cases. In this session, Paul...more
The Federal Trade Commission recently issued a cyber guide that, while intended for small businesses, can be of help for all businesses. The purpose of the guide, which includes various modules, is to help smaller businesses...more
Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more
In its recent Cybersecurity Strategy, the U.S. Department of Homeland Security (DHS) defined “cyberspace” as “the independent network of information technology infrastructure, including the Internet, telecommunications...more
Your company’s computer system has been compromised by a hacker. From your initial investigation, you discover that the hacker has accessed proprietary company information and customer information including Social Security...more
In this month's edition of our Privacy & Cybersecurity Update, we examine California's new sweeping privacy law, two U.S. agencies' report on "botnet" threats and the European Parliament's call to suspend the Privacy Shield....more
Your heart raced when the caller on the phone identified himself as an FBI agent. But the conversation was matter-of-fact. About 2,500 sets of credit card information from your clients had been posted for sale on a...more
Orrick of counsel Emily Tabatabai, a founding member of our Cybersecurity & Data Privacy team, recently spoke with Law360 regarding cybersecurity and privacy predictions for 2018. Emily discussed the inherent privacy and...more