News & Analysis as of

Cyber Threats Information Security

McDermott Will & Emery

Preparing for Evolving Cybersecurity Threats

McDermott Will & Emery on

The recent ransomware attack against the Duvel Moortgat Brewery demonstrated the very real risk that cybersecurity incidents pose to the alcohol industry, reportedly halting operations for several days at four of Duvel...more

Ankura

Navigating the Future: Trends Shaping Cyber Incident Response

Ankura on

In the last two decades, incident response has evolved significantly, adapting to the dynamic cyber threat landscape. As the internet became an integral part of daily life, cyber threats escalated in scope and scale. This...more

Ankura

Keeping Pace: The Evolution of Incident Response

Ankura on

Incident response (IR) has undergone a drastic transformation in the past two decades, adapting to the relentless evolution of the cyber threat landscape. In the early 2000s, as the internet became more deeply ingrained in...more

Carlton Fields

No Password Required: The Philosopher CISO of Tallahassee Who Lives to Help Other People

Carlton Fields on

Thomas Vaughn is the current Chief Information Security Officer (CISO) of the City of Tallahassee and the former CISO of Florida. A kindhearted introvert who began his cybersecurity career in the Army and then the U.S. Coast...more

Reveal

Healthcare Organizations Must Deal with their Shadow Information Problem

Reveal on

A myopic focus on protecting EMR (Electronic Medical Records) systems has left healthcare organizations open to shadow information risk. In a world where hackers and ransomware criminals are regularly compromising healthcare...more

Goodwin

SEC Makes Cybersecurity Top Priority; Sanctions Firms for Cybersecurity Failures

Goodwin on

There is little doubt that the U.S. Securities and Exchange Commission is making cybersecurity a top priority. SEC Chair Gary Gensler told a Senate committee on Tuesday, September 14, 2021 that the agency is developing a...more

Vinson & Elkins LLP

[Webinar] Navigating Privacy Rules in a Virtual World - June 17th, 10:00 am - 11:00 am PT

Vinson & Elkins LLP on

The transformation to a work from home/work from anywhere model has become the new normal and even after the pandemic ends, many expect that model to continue. This accelerated transition has forced companies to embrace...more

McDermott Will & Emery

[Webinar] Cybersecurity & Ransomware: How To React? - June 8th, 9:30 am CEST

McDermott Will & Emery on

Faced with the resurgence of cyberattacks in our newfound era of dependence on teleworking, our team is primed to guide you through the fraught aftermath of a cyber attack: Our team will discuss: - how to come back to the...more

Society of Corporate Compliance and Ethics...

[Virtual Event] Technology and Compliance Conference - June 24th, 8:55 am - 3:30 pm CDT

How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more

Association of Certified E-Discovery...

Keep Calm and Carry On: 5 Data Security Do’s and Don’ts for Everyone

Cyber criminals see opportunity in the pandemic. Some exploit security vulnerabilities in remote working. Others prey on people’s fears by crafting phishing emails and malware-infected websites purportedly about the...more

A&O Shearman

COVID-19: Compliance and Legal Considerations for Asset Managers

A&O Shearman on

As the world responds to COVID-19, we have identified a number of compliance and legal considerations for asset managers. We summarize a select list of these in our note below....more

Carlton Fields

Canna We Talk Cannabis? Cybersecurity Risks Bring Growing Pains to Cannabis Businesses

Carlton Fields on

In this episode, Carlton Fields attorneys Kevin McCoy and Joe Swanson discuss the circumstances involved in a recent data breach involving the cannabis industry. We explore cybersecurity and data privacy issues that all...more

Robinson+Cole Data Privacy + Security Insider

Cyber Criminals Using Coronavirus Concern to Assist with Intrusions

Concern over the spreading coronavirus from China is legitimate and real. The World Health Organization (WHO) has declared the coronavirus a global health emergency, and the United States and other countries are limiting...more

K2 Integrity

Cybersecurity Awareness Month may be over – but threats are year round

K2 Integrity on

Cybersecurity Awareness Month may have ended on October 31, but cyber criminals are active 365 days a year, and they’re online looking for vulnerabilities around the clock. Every day, we also spend time online: navigating the...more

Perkins Coie

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

Perkins Coie on

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

Ballard Spahr LLP

CFPB Information Security Remains a Challenge

Ballard Spahr LLP on

The Office of the Inspector General (OIG) has released the “2015 list of major management challenges” faced by the CFPB that the OIG believes will hamper the CFPB’s ability to accomplish the CFPB’s strategic objectives. Like...more

Morgan Lewis

National Futures Association Proposes Cybersecurity Guidance for NFA Member Firms

Morgan Lewis on

NFA links NFA’s supervisory requirements with its proposed requirements mandating that NFA Members have information systems security programs. The National Futures Association (NFA) has proposed cybersecurity...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide