News & Analysis as of

Data Security Cybersecurity Risk Management

DLA Piper

EU: NIS2 Member State Implementation Deadline Has Arrived

DLA Piper on

The Network and Information Systems Directive II (“NIS2“), requires that Member States transpose measures into national law by today (17 October 2024). NIS2 is part of the EU’s Cybersecurity Strategy and repeals and replaces...more

BakerHostetler

[Podcast] Technology from the Top: AI, Data and the Future of Business with Today’s CIOs – Sharay Erskine

BakerHostetler on

Partner Janine Anthony Bowen sits down one-on-one with current Chief Information Officers in the new series, “Technology from the Top: AI, Data and the Future of Business with Today’s CIOs” to discuss how they are adjusting...more

Baker Donelson

Data Breaches: The Not-So-Hidden Cost of Doing Business

Baker Donelson on

In this era of big data, smart devices, and constant connectivity, the clock's already ticking on your next data breach – it's just a matter of time. For companies of all sizes and across every industry, the stakes have never...more

Skadden, Arps, Slate, Meagher & Flom LLP

Navigating the New Cybersecurity Landscape: Key Implications of the EU’s NIS 2 Directive

The deadline for EU countries to transpose the expanded cybersecurity directive, NIS 2, into national law is 17 October 2024, but the implementation status varies significantly from country to country. Some of the member...more

Clark Hill PLC

October is Cybersecurity Awareness Month – It’s a Good Time to Update Your Training Program

Clark Hill PLC on

This month is the 21st annual Cybersecurity Awareness Month, cosponsored by the Cybersecurity and Infrastructure Agency (CISA) and the National Cybersecurity Alliance. This year’s theme is “Secure Our World,” continuing what...more

DLA Piper

Australia’s Cyber Security Strategy in Action – Three New Draft Laws Published

DLA Piper on

It has been a busy month for cyber and privacy regulation in Australia. On the heels of the proposed amendments to the Privacy Act 1988 released just under a month ago, three further draft Bills relating to cyber security...more

Dunlap Bennett & Ludwig PLLC

Harnessing AI In Cybersecurity: Balancing Innovation And Risk

Businesses are under increasing pressure to strengthen their cybersecurity defenses as cyber threats become more sophisticated and frequent. Traditional security measures are struggling to keep up with the rising risks of...more

Alston & Bird

AI vs. AI: Recent Developments in the Cyber Landscape

Alston & Bird on

The ubiquity of artificial intelligence (AI) has heightened companies’ exposure to cyberattacks of increasingly greater sophistication. Our Privacy, Cyber & Data Strategy Team explores how businesses can enhance their...more

DLA Piper

The UK Cybersecurity and Resilience Bill – A Different Approach to NIS2 or a British Sister Act?

DLA Piper on

Introduction It wouldn't be much of an exaggeration to say that NIS2 is the acronym on everyone's lips. When coupled with its European sister legislation DORA, we encounter a regulatory twosome that make GDPR feel like...more

Baker Donelson

Happy Hack-tober! Don't be Scared: How to Protect Your Business from RaaS Threats

Baker Donelson on

October is here, and as we prepare for pumpkin spice lattes, fall sweaters, and scary decorations, there's one thing your business can't afford to ignore this month: cybersecurity. Welcome to Hack-tober, or as it's officially...more

Jackson Lewis P.C.

Key Takeaways for Healthcare Providers Following HHS OCR’s Most Recent Ransomware Investigation

Jackson Lewis P.C. on

Announcing its fourth ransomware cybersecurity investigation and settlement, the Office for Civil Rights (OCR) also observed there has been a 264% increase in large ransomware breaches since 2018....more

Perkins Coie

Cybersecurity for Lawyers: The NIST Cybersecurity Framework as a Tool and Reference

Perkins Coie on

In this post in our series on basic cybersecurity concepts for lawyers (see here and here for prior posts), we delve into the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) 2.0, which is a...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #413 – NIST Releases Recommendation for Consumer Routers

The National Institute of Standards and Technology (NIST) has issued helpful recommendations for consumers to consider when securing home routers. The publication, issued on September 10, 2024, emphasizes how important it is...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Alston & Bird

United States Cybersecurity and Infrastructure Security Agency Issues Joint International Guidance for Event Logging and Threat...

Alston & Bird on

On August 21, 2024, the United States Cybersecurity and Infrastructure Security agency, alongside government agencies in key global allies, including Australia, the UK, Canada, and Japan, released guidance on event logging...more

Society of Corporate Compliance and Ethics...

[Webinar] Navigating the Changing Cybersecurity Landscape - September 12th, 12:00 pm - 1:30 pm CT

Learning Objectives: - Gain an understanding of recent changes to the cyber security landscape - Where to start: elevate your cyber security risk management - Educate on the future of cyber security in healthcare and...more

Foley & Lardner LLP

National Public Data Hack Exposes Millions: Essential Steps to Safeguard Your Identity and Combat Fraud

Foley & Lardner LLP on

The recent massive data breach at National Public Data (NPD), a background check company, has potentially compromised the personal information of millions, if not billions, of individuals, including their Social Security...more

Woodruff Sawyer

Running to Stand Still: Practical Cybersecurity Governance Considerations for Boards and Management Teams

Woodruff Sawyer on

It’s obvious that strong cybersecurity governance should help to reduce a company’s risk of succumbing to a cybersecurity incident or being significantly impacted should one materialize. One major challenge: determining what...more

Mayer Brown

New EU Cyber Rules: Implementation of NIS2 in the EU Member States

Mayer Brown on

The Network and Information Security 2 Directive (EU) 2022/2555 ("NIS2") entered into force on 16 January 2023. NIS2 sets cyber rules for organizations whose services are considered essential or important for maintaining...more

Faegre Drinker Biddle & Reath LLP

Artificial Intelligence Briefing: White House Announces the Completion of Agency Actions Required by the AI Executive Order

A week before the EU’s AI Act comes into force on August 1, the White House announced that U.S. agencies have completed all actions required by President Biden’s AI Executive Order to date. Meanwhile, the Republican Party...more

Robinson+Cole Data Privacy + Security Insider

CrowdStrike Customers Targeted by Threat Actors Using Fake Help Websites

If you are a customer of CrowdStrike, you are working on recovering from the outage that occurred on July 19, 2024. As if that isn’t enough disruption, CrowdStrike is warning customers that threat actors are taking advantage...more

Mayer Brown

Cybersecurity Regulations on the March - Part 2

Mayer Brown on

Mayer Brown Partners Ana Bruder, Justin Herring, and Oliver Yaros focus on cybersecurity risks and regulations in the EU and UK. They explore third-party risks, ransomware incidents, and the impact of AI, while examining how...more

BakerHostetler

[Podcast] 2024 DSIR Deeper Dive: Deeper Dive into the Data

BakerHostetler on

We’re back with a deeper dive into the 2024 Data Security Incident Response Report, which features insights and metrics from 1,150+ incidents in 2023. This episode dives deeper into the data, including network intrusions...more

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #405 – Compromised Passwords Continue to Provide Easy Opportunities for Threat Actors

Verizon’s 2024 Data Breach Report, a must-read publication, was published on May 1, 2024. The report indicates that “Over the past 10 years, the use of stolen credentials has appeared in almost one-third (31%) of all...more

494 Results
 / 
View per page
Page: of 20

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide