News & Analysis as of

Cybersecurity Today's Popular Updates Third-Party Risk

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Baker Donelson

Best Practices for Protecting Operations from Vendor's Cyber Incidents

Baker Donelson on

In the aftermath of a vendor's hack that crippled an industry, ensure your business is up to date on best practices for mitigating the risks of third-party cyber incidents. Many businesses struggle to adequately consider the...more

Clark Hill PLC

[Webinar] Navigating Risk After the Change Healthcare Cyberattack: Strategies for Effective Healthcare Third Party Risk Management...

Clark Hill PLC on

In an increasingly interconnected healthcare landscape, third party relationships play a critical role in operations, but they also introduce significant risk. To address this challenge, our webinar delves into the...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - July 15th - 18th, Charlotte, NC

Ideal for professionals with some compliance knowledge and experience, HCCA’s Healthcare Privacy Compliance Academy offers practitioners a deeper understanding of effective compliance management in a healthcare setting. The...more

The Volkov Law Group

Third-Party Risk Management: A Critical Task for Cybersecurity and Breach Prevention

The Volkov Law Group on

We are all familiar with the mantra on the importance of managing third-party risk to prevent anti-corruption, sanctions, money laundering and associated risks.  Over the last ten years, however, we have observed a new and...more

McDermott Will & Emery

[Webinar] PCI DSS 4.0: Third-Party Service Providers and Risk Management - June 7th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Join members of McDermott’s Global Privacy & Cybersecurity team and Alan Gutierrez-Arana of Mazars for the next installment in our PCI DSS 4.0 series. PCI DSS 4.0 brings major changes to payments with an increased focus on...more

Davis Wright Tremaine LLP

REMINDER: Compliance Deadline for FTC's GLBA Safeguards Rule Is Around the Corner

A reminder to non-bank financial institutions subject to the Gramm-Leach-Bliley Act (GLBA): the deadline to comply with the Federal Trade Commission's (FTC) revised Standards for Safeguarding Customer Information, commonly...more

Mitratech Holdings, Inc

[Webinar] Expert Perspectives: Implementing DORA, Mastering the Challenges and Opportunities - May 17th, 9:00 am ET

DORA is set to transform how European based Financial Institutions enhance the operational resilience of their critical business processes. With an implementation date of 17th January 2025 the evolving nature of the...more

Mitratech Holdings, Inc

Cyber Resilience: From Third-Party to Cyber Risk Management

Mitratech Holdings, Inc on

It is safe to say that Board members, CEOs and other key decision-makers everywhere, recognize the significance of cyber risk management and the heavy investment that initiatives in this field represent. Cyber risks in the...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - March 6th - 9th, Phoenix, AZ

Designed for professionals with some compliance knowledge and experience, HCCA’s Healthcare Privacy Compliance Academy is ideal for practitioners who want a deeper understanding of effective compliance management in a...more

Venable LLP

Evaluating the Cybersecurity Risk of Your Mailing and Publishing Partners

Venable LLP on

Cybersecurity is a growing concern for all nonprofit organizations, especially those that store, process, and transmit sensitive data. While it is common to think of the cyber issue as relevant to digital communications and...more

NAVEX

Risk’s Digital Transformation – When IT & Third-Party Risk Reached Main Street

NAVEX on

It wasn’t long ago that the phrase digital transformation conjured the image of a large-enterprise corporate luminary delivering a keynote about the technological metamorphosis of their industry. Digitalization of legacy...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - December 5th - 8th, Anaheim, CA

Each Academy provides three-and-a-half days of classroom-style training covering the latest laws, regulations, and developments to help you effectively manage your organization’s compliance program. They are ideal for...more

Eversheds Sutherland (US) LLP

Federal Banking Regulators Shine Light Again on Third-Party Risk Management

Federal banking regulators have again demonstrated their focus on bank oversight and management of risk from third party relationships through a series of guidance and proposed guidance published in the third quarter of 2021....more

Lighthouse

Cybersecurity Defense: Recommendations for Companies Impacted by the Biden Administration Executive Order

Lighthouse on

As summarized in the first installment of our two-part blog series, President Biden recently issued a sweeping Executive Order aimed at improving the nation’s cybersecurity defense. The Order is a reaction to increased...more

Ankura

[Webinar] Vendor Risk Management in the Modern Economy - July 28th, 1:00 pm - 2:00 pm EST

Ankura on

Organizations are becoming increasingly reliant on external parties to manage parts of their business, including their critical and sensitive data. While the specialized expertise and economies of scale that third parties and...more

Society of Corporate Compliance and Ethics...

[Virtual Event] Technology and Compliance Conference - June 24th, 8:55 am - 3:30 pm CDT

How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more

NAVEX

Third-Party Risk Management: 5 Reasons to Monitor Cybersecurity Risk in Real Time

NAVEX on

In today’s business landscape, it is nearly impossible to work alone. You have to collaborate with clients, vendors, suppliers, specialists, and plenty of other partners all considered third parties to your organization. As a...more

Robinson+Cole Data Privacy + Security Insider

Ubiquiti Notifies Customers of Breach

Ubiquiti, a manufacturer of products used for networks such as routers, webcams and mesh networks, announced this week that an unauthorized access to its systems hosted by a third-party cloud provider may have compromised...more

The Volkov Law Group

Episode 108 -- The Capital One Data Breach and Vendor Cybersecurity Risks

The Volkov Law Group on

Capital One suffered a serious data breach as a result of the actions of one individual who downloaded nearly 30 GB of 100 million Capital One Financial Corporation credit applications from an Amazon cloud data server. The...more

Robinson+Cole Data Privacy + Security Insider

Delta Sues Vendor for Causing Data Breach

In an unusual move, Delta Airlines (Delta) sued one of its vendors last week for the data breach it experienced in 2017. It’s an unusual move for several reasons. First, in our experience when a vendor causes a data breach,...more

Dechert LLP

OCIE Publishes Risk Alert regarding Safeguarding of Customer Information Stored on Cloud and Other Network Storage Solutions

Dechert LLP on

The U.S. Securities and Exchange Commission’s Office of Compliance Inspections and Examinations issued a National Exam Program Risk Alert on May 23, 2019, which identifies security risks and best practices associated with the...more

Thomas Fox - Compliance Evangelist

FARs, Flow Downs and Supply Chain Compliance

I recently had the chance to visit with Travis Miller, General Counsel (GC), and I discuss how the regulatory requirements of the Federal Acquisitions Regulations (FARs) impact access to markets and supply chain compliance....more

Williams Mullen

Due Diligence of Corporate Data Assets In M&A Transactions: Data Protection/Privacy

Williams Mullen on

As data are quickly becoming significant corporate assets, lawyers need to help companies both maximize the value of their data and protect the business against any associated risks. This is particularly true in M&A...more

K2 Integrity

Enterprise-wide risk assessments have never been more important

K2 Integrity on

In “Enterprise-Wide Risk Assessments Have Never Been More Important” (Thomson Reuters Regulatory Intelligence, 17 Jan. 2019), authors Tom Bock, head of K2 Intelligence’s Regulatory Compliance practice, and Darren Matthews,...more

Bradley Arant Boult Cummings LLP

Potential Bank Customer Data Exposed through Fiserv Platform Flaw

Security researchers and cybersecurity experts recently discovered a weakness in Fiserv’s web platform, which may have exposed the personal and financial details of customers across hundreds of internet banking sites. The...more

42 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide