Law Brief®: Rich Schoenstein and Annmarie Giblin Discuss Cyber Law
Cracking the Code: Getting the Most Out of Your Cyber Insurance Policy
Cybersecurity Threats Facing Food and Agribusiness Companies & the Preparation and Protection Safeguards to Help Mitigate Them
Cyber Insurance - An Essential Component to Your Business
London’s Nation-State Attack Exclusion: Game Changer For The Cyber Insurance Market or An Opportunity For Competition Within the Market?
The Significance of Operational Technology in Cyber Insurance Underwriting – Part 2
The Downstream Impact of Ransomware on Cyber Insurance Underwriting – Part 1
Coverage Considerations for Ransomware & Cyber Attacks
Cyber Insurance Changes in the Aftermath of Log4j
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
How Patching log4J Can Mitigate Regulatory and Insurance Issues
Wait, that’s covered? Insurability of Fines and Penalties Flowing From a Cybersecurity Breach
Takeaways From Recent Claims Against Mark Zuckerberg and Facebook – Mitigating the Heightened Risk of Privacy Suits Against Individual Directors and Officers
No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day
Ransomware and Cyber Insurance: The good, the bad, and why your insurance data is a target for hackers (with Jacob Ingerslev)
Debra Geroux and Scott Wrobel on Responding to Data Breaches
Cyber Insurance Coverage Market: A House of Cards or Temporary Plateau?
NGE On Demand: Insurance and Indemnity Issues for Family Offices with Angela Elbert
Nota Bene Episode 114: The New Global Business of Cyberattack, from Ransomware to a Now-Ubiquitous State of Breach with Kari Rollins
The Ransomware Attack Part 2 – How To Respond When The Enemy Overcomes The Gates
This is the second article in our two-part series on Cybersecurity in the Age of Industry 4.0, focusing on the legal implications and potential liabilities manufacturers face from cyberattacks, as well as practical...more
Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more
Most human resources professionals are concerned about the privacy and security of the vast amounts of personal information they manage. This article discusses steps to consider taking against the challenges. Deluge of...more
In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more
In March 2023, the Office of the National Cyber Director released the public version of the National Cybersecurity Strategy, which provides strategic guidance for how the U.S. should protect internet users from cyberattacks...more
Cybersecurity attacks, such as malware, phishing emails, and password attacks, are a growing threat to patients and medical practices. Cyber attacks can significantly disrupt patient care, including by exposing confidential...more
No industry is immune to privacy and cybersecurity risks, and the construction industry is no exception. Those in the construction industry can protect against a potential cyberattack by understanding the risks and...more
We are all facing new challenges in this pandemic, including the shift to and growth of remote-work. Meanwhile, we also have to contend with the increased volume of attempted cyberattacks. Despite the distraction of the...more
The New Jersey State Bar Association recently met to discuss, among other things, our favorite topic: Cybersecurity. (Perhaps our esteemed Privacy, e-Communication and Data Security Practice Group chair was there….) We wanted...more
Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more
Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more
A timely new resource for business executives, technology professionals, and lawyers alike is the newly-published Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers from the New York...more