Law Brief®: Rich Schoenstein and Annmarie Giblin Discuss Cyber Law
Cracking the Code: Getting the Most Out of Your Cyber Insurance Policy
Cybersecurity Threats Facing Food and Agribusiness Companies & the Preparation and Protection Safeguards to Help Mitigate Them
Cyber Insurance - An Essential Component to Your Business
London’s Nation-State Attack Exclusion: Game Changer For The Cyber Insurance Market or An Opportunity For Competition Within the Market?
The Significance of Operational Technology in Cyber Insurance Underwriting – Part 2
The Downstream Impact of Ransomware on Cyber Insurance Underwriting – Part 1
Coverage Considerations for Ransomware & Cyber Attacks
Cyber Insurance Changes in the Aftermath of Log4j
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
How Patching log4J Can Mitigate Regulatory and Insurance Issues
Wait, that’s covered? Insurability of Fines and Penalties Flowing From a Cybersecurity Breach
Takeaways From Recent Claims Against Mark Zuckerberg and Facebook – Mitigating the Heightened Risk of Privacy Suits Against Individual Directors and Officers
No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day
Ransomware and Cyber Insurance: The good, the bad, and why your insurance data is a target for hackers (with Jacob Ingerslev)
Debra Geroux and Scott Wrobel on Responding to Data Breaches
Cyber Insurance Coverage Market: A House of Cards or Temporary Plateau?
NGE On Demand: Insurance and Indemnity Issues for Family Offices with Angela Elbert
Nota Bene Episode 114: The New Global Business of Cyberattack, from Ransomware to a Now-Ubiquitous State of Breach with Kari Rollins
The Ransomware Attack Part 2 – How To Respond When The Enemy Overcomes The Gates
In today’s digital age, cybersecurity has become a paramount concern for executives navigating the complexities of their corporate ecosystems. With resources often limited and the ever-present threat of cyberattacks,...more
We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more
Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more
With the threat of cyber-attacks making the news, it is a good time for all non-profit organizations to review their policies and procedures with respect to data privacy. Many non-profit organizations are particularly...more
Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more
A major software vulnerability (known as Log4j or Logshell) continues to have a major impact on many industries, causing insurance carriers and regulators to take notice. In the latest episode of Lowenstein Sandler’s...more
Report on Patient Privacy 21, no. 11 (November, 2021) - Attorney Brad Hammer doesn’t always don a suit and tie, or what he calls his “lawyer’s uniform.” A privacy and security expert and founder of the Vakaris Group based...more
In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago? The history of network and cyber security seems to be a...more
Cyber attacks are now commonplace. Ransomware attacks, in particular, have skyrocketed in frequency and size. High-profile data breaches have cost businesses in the United States millions of dollars in losses and incalculable...more
The rapid expansion of data security and privacy laws and regulations — both in the United States and internationally — harbors the potential for substantial liability, with the consequence that cyber compliance has become an...more
We are all facing new challenges in this pandemic, including the shift to and growth of remote-work. Meanwhile, we also have to contend with the increased volume of attempted cyberattacks. Despite the distraction of the...more
New and comprehensive privacy and cyber regulations continue to proliferate across the globe. These are not your father’s data breach notification laws. The scope of information included within these mandates has expanded...more
Many general counsels, as well as their privacy and cybersecurity teams, are understandably focused on their company’s coronavirus safety measures - and that is good news to the hackers. Hackers thrive amidst confusion and...more
Cybersecurity and Privacy - Despite cries from corporations and privacy advocates across America for a unified federal privacy law, the nation’s toughest privacy law—the California Consumer Privacy Act (CCPA)—went into...more
It has been several years since data breaches first emerged as the lead news story. Despite increasing security and technology advancements, companies are still grappling with how to stay ahead of hackers and, when they...more
With the expansion of privacy legislation—from the General Data Protection Regulation (GDPR) in Europe to the coming California Consumer Privacy Act (CCPA) in the United States—cyber liability insurance is taking on increased...more
While much attention has been paid to the maximum level of administrative fines under the General Data Protection Regulation (GDPR) — up to 4 percent of total worldwide annual turnover — the regulation also provides for...more
In November, Tyler wrote about insurance issues raised by both the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act, which goes into effect on January 1, 2020. California’s...more
The Federal Trade Commission recently issued a cyber guide that, while intended for small businesses, can be of help for all businesses. The purpose of the guide, which includes various modules, is to help smaller businesses...more
Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more
In its recent Cybersecurity Strategy, the U.S. Department of Homeland Security (DHS) defined “cyberspace” as “the independent network of information technology infrastructure, including the Internet, telecommunications...more
2017 has reminded us that data security threats continue to evolve and that the stakes for companies can be very high if their data security programs fail to evolve as well. Before the recent announcement of Equifax’s...more