News & Analysis as of

Data Breach Internal Controls Cybersecurity

Fenwick & West LLP

The SEC is Cracking Down on Misleading Cybersecurity Disclosure

Fenwick & West LLP on

On October 22, 2024, the SEC charged two current reporting companies, Unisys Corp. and Check Point Software Technologies, and two former public companies, Mimecast Limited and Avaya Holdings Corp., with making materially...more

Thomas Fox - Compliance Evangelist

Navigating the New Frontier: SEC’s Enforcement Action on RR Donnelley and its Implications for Compliance

In the ever-evolving compliance landscape, the recent enforcement action by the Securities and Exchange Commission (SEC) against RR Donnelley is a significant case study. This incident underscores the importance of robust...more

The Volkov Law Group

SEC Expands Internal Controls Provision to Cover Cybersecurity Incidents and Reaches $2.1 Million Settlement with R.R. Donnelley &...

The Volkov Law Group on

In a significant expansion of internal controls enforcement, the SEC announced a $2.1 million settlement with R.R. Donnelley & Sons Co. (“RRD”) for its handling of a 2021 ransomware attack and resulting disclosure failures. ...more

Holland & Knight LLP

SEC Expands Scope of Internal Accounting Controls in Cybersecurity Breach Settlement

Holland & Knight LLP on

The SEC continues to expand its cybersecurity enforcement authority to include allegations that a company's failure to monitor its managed security service providers (MSSP) amounts to violations of federal securities laws....more

NAVEX

Navigating Business Risks: The IRM Journey

NAVEX on

Like navigating a ship through a stormy sea, managing business risk involves charting a set course, choosing the right people, and planning carefully – but it also involves reacting nimbly to avoid dangerous conditions or...more

Smith Anderson

Marriott Investor’s Security Fraud Claims Arising from Data Breach Rejected by Fourth Circuit

Smith Anderson on

The Fourth Circuit dismissed an investor’s lawsuit against a hotel chain that had been subject to a data breach, ruling that the company had not made false or misleading public statements about its protection of customer...more

Mitratech Holdings, Inc

[Event] Interact 2022 - August 14th - 17th, Nashville, TN

Exclusive roadmap reveals, immersive Q&A with top product & industry experts, live product demos, electrifying presentations, co-innovation opportunities, and so much more— all coming to you live from the heart of Nashville,...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

[Webinar] Privacy, Data and Cyber Security: The Current Legal Landscape - November 11th, 12:00 pm - 1:00 pm EST

Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more

Nossaman LLP

How to Prevent an OFAC Sanction When Responding to a Ransomware Attack

Nossaman LLP on

A ransomware attack is a major threat affecting all sectors of business, including healthcare. Organizations typically follow state and federal privacy laws as part of their ransomware prevention and response measures....more

BCLP

Supervision of Vendors When Outsourcing - The Buck Stops with FINRA Member Firms

BCLP on

Key Takeaways: ..On August 13, 2021, FINRA issued Regulatory Notice 21-29 (“RN 21-29”) to remind member firms that they must establish and maintain an adequate supervisory system, including written supervisory procedures...more

NAVEX

Strengthening US Cybersecurity: Impacts of the Executive Order

NAVEX on

An executive order was signed on May 12, directing the federal government to overhaul its approach to cybersecurity. Corporate compliance and risk management professionals should consider this order carefully — because, in...more

Society of Corporate Compliance and Ethics...

[Virtual Event] Technology and Compliance Conference - June 24th, 8:55 am - 3:30 pm CDT

How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more

Society of Corporate Compliance and Ethics...

[Virtual Event] 2021 Boston Regional Compliance & Ethics Conference - March 26th, 8:25 am - 4:30 pm EDT

Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more

Morgan Lewis

Spotting and Mitigating Enforcement Issues Concerning Cybersecurity-Related Controls and Disclosures

Morgan Lewis on

The growing frequency and public awareness of cyberincidents, evolution of technologies employed by intruders, and proliferation of personal data and infrastructure vulnerable to attack have all contributed to heightened...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

Society of Corporate Compliance and Ethics...

[Virtual Event] Higher Education Compliance Conference - June 1st - 3rd

Due to the COVID-19 pandemic, our Higher Education Compliance Conference will be held virtually. Attendees will enjoy Higher Education compliance sessions and industry updates in an interactive, online experience, plus have...more

Akin Gump Strauss Hauer & Feld LLP

Top 10 Topics for Directors in 2020: Cybersecurity

Cybersecurity and Privacy - Despite cries from corporations and privacy advocates across America for a unified federal privacy law, the nation’s toughest privacy law—the California Consumer Privacy Act (CCPA)—went into...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 19, Number 11. Privacy Briefs: November 2019

Report on Patient Privacy Volume 19, Number 11. (November 2019) ? The biggest threat to protected health information comes from carelessness within your organization, according to a brief from the Clearwater...more

The Volkov Law Group

Managing Third-Party Vendor Cybersecurity Risks (Part II of III)

The Volkov Law Group on

We all know that businesses rely on a large number of third-party vendors to support their business operations.  Many of these third parties require access to a company’s data and its internal information and technology...more

Epiq

SEC Remains Focused on Cybersecurity

Epiq on

After a long silence since guidance was last issued a year ago, there’s now widespread expectation that the Securities and Exchange Commission will get much more specific this year about new cybersecurity disclosures for...more

Foley Hoag LLP - Security, Privacy and the...

Is Your Company’s Board of Directors Cyber Savvy?

Every company should expect that at some point it will experience a data breach. Whether as a result of hackers, disgruntled employees, or careless acts such as losing an unencrypted phone or laptop, data breaches may subject...more

Akin Gump Strauss Hauer & Feld LLP

Podcast: Cybersecurity and the Boardroom

In this episode, the third of three building on Akin Gump’s annual Top 10 Topics for Directors report, partner Michelle Reed discusses the critical question of cybersecurity and the corporate world. Among the topics covered: ...more

Robinson+Cole Data Privacy + Security Insider

Employees and Partner Organizations Pose Threat to Companies

According to the 2019 Verizon Insider Threat Report, 20 percent of all cybersecurity incidents and 15 percent of data breaches in 2018 were caused by insiders—that is, employees or partner organizations....more

Parker Poe Adams & Bernstein LLP

Cyberfraud Victims May Have Violated SEC Internal Control Requirements: Adding Insult to Injury

Just when you thought the hazards of cyberfraud couldn’t get worse, the SEC recently issued a Report of Investigation (more on that later) stating that nine recent corporate victims of cyberfraud may have compounded their...more

Robinson+Cole Data Privacy + Security Insider

Test Your Employees with Internal Phishing Campaigns

Phishing campaigns continue to be one of the most successful ways for malicious intruders to access company information, including personal information of employees and customers. Phishing emails continue to get more and more...more

41 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide