News & Analysis as of

Cyber Threats Best Practices Ransomware

Kennedys

[Webinar] Ransom-ready: Navigating recovery, remediation and legalities - June 4th, 11:00 am - 12:00 pm EST

Kennedys on

Kennedys and CYPFER are delighted to invite you to our 60 minute webinar on Tuesday, June 4, 2024. We will explore the practical and legal implications involved in navigating a ransomware event, and how decision-making in a...more

Kelley Drye & Warren LLP

[Webinar] 2022 WORKing Lunch Series: Protecting Your (Human) Resources: Fighting Business Email Compromise and Ransomware -...

HR employees are, willingly or not, the guardians of the company’s most sensitive collection of data—its employee’s personal information. Cybercriminals often perceive the human resources department as the perfect gateway...more

Epstein Becker & Green

Best Practices to Protect Against Increased Cyber Threats During the Holiday Season

Epstein Becker & Green on

Recent data thefts and systems intrusions, particularly with respect to ransomware, have assured that cybersecurity is top of mind for corporate executives and compliance officials. We at EBG have tried to keep you up to date...more

McDermott Will & Emery

[Webinar] Demystifying Cybersecurity: Practical Considerations For Businesses - December 8th, 12:00 pm - 1:00 pm CST

McDermott Will & Emery on

Ransomware! Phishing! Zero Trust! Endpoint detection! The buzzwords and fearmongering fly when it comes to cybersecurity, but there are practical business considerations that have to be accounted for when developing a...more

Carlton Fields

CF on Cyber: The Anatomy of a Ransomware Attack - Part 2

Carlton Fields on

In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks. Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer...more

Carlton Fields

CF on Cyber: The Anatomy of a Ransomware Attack - Part 1

Carlton Fields on

Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data...more

Oberheiden P.C.

Cybersecurity Compliance Programs for Law Firms

Oberheiden P.C. on

Law firms process sensitive information on a daily basis. Confidential client data is targeted by hackers and insiders for a variety of reasons including financial gain or retaliatory purposes. When a law firm has a security...more

Society of Corporate Compliance and Ethics...

[Virtual Event] 2021 Atlanta Regional Compliance & Ethics Conference - August 13th, 8:25 am - 4:30 pm EDT

Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more

Society of Corporate Compliance and Ethics...

[Virtual Event] 2021 Alaska Regional Compliance & Ethics Conference - February 26th, 8:25 am - 4:30 pm AKST

Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more

Fisher Phillips

Cybercriminals Target Healthcare Industry During The Pandemic

Fisher Phillips on

Several federal agencies have teamed up to warn healthcare employers of the increased threat they face as a result of malicious cybercriminals aiming to take advantage of the pandemic to wreak havoc on their operations. The...more

White & Case LLP

US Government Warns Healthcare Sector of Targeted Ransomware: Outlines Best Practices and Provides Technical Details of Attack

White & Case LLP on

On October 28, 2020, a coalition of US government entities consisting of the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services...more

McDermott Will & Emery

[Webinar] Ransomware Legal Implications and Proactive Solutions - June 24th, 2:00 pm EDT

McDermott Will & Emery on

In the 2020 M-Trends report, it was noted that successful monetization of ransomware attacks and the availability of ransomware as a service have contributed to an increase in ransomware cases. In this session, Paul...more

Blank Rome LLP

[Webinar] Primers for Pandemic Litigation Update - Critical Assets at Risk: Protecting Data Privacy and Trade Secrets during...

Blank Rome LLP on

With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more

Holland & Knight LLP

Impact of the New Health Industry Cybersecurity Practices: 2019 Outlook

Holland & Knight LLP on

• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more

Dorsey & Whitney LLP

Ransomware: To Pay or Not to Pay

Dorsey & Whitney LLP on

Ransomware poses one of information security’s biggest threats, right alongside infamous data breaches and high-profile Distributed Denial of Service (DDoS) attacks. Ransomware. It’s a data security buzzword that has...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide