News & Analysis as of

Information Governance Data Security Incident Response Plans

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

BakerHostetler

Deeper Dive into the Data - May 2024

BakerHostetler on

Every spring, BakerHostetler collects, analyzes, and compares key metrics on the incident response matters we handled in the prior year. The output – our Data Security Incident Response (DSIR) Report – highlights key findings...more

HaystackID

[Webcast Transcript] Notable Trends in US Privacy Law

HaystackID on

Editor’s Note: On January 17, 2024, HaystackID hosted a cogent webcast, “Notable Trends in US Privacy Law,” featuring HaystackID privacy and compliance expert Chris Wall, and an esteemed panel of privacy and compliance...more

HaystackID

[Webinar] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories - August 30th,...

HaystackID on

In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more

HaystackID

[Webinar] Proper Hygiene Matters: Three Cybersecurity, Privacy, and Data Protection Challenges and Solutions - March 15th, 12:00...

HaystackID on

From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more

Polsinelli

It’s Here – The New National Cybersecurity Strategy

Polsinelli on

Today, after months of rumors regarding its release and contents, the White House issued its National Cybersecurity Strategy “to secure the full benefits of a safe and secure digital ecosystem.” The full strategy is 39 pages...more

Association of Certified E-Discovery...

[Webinar] Information Governance and Cyber Security Breach Review: Best Practices - August 10th, 1:00 pm - 2:00 pm EDT

The best practice approach to effectively handling a data security incident starts with a proactive response plan. But when the inevitable occurs, will your plan stand up to the test? Join our panel of experts as they discuss...more

Hinshaw & Culbertson LLP

[Webinar] Cyber and Privacy Law for School Districts: An Overview of the Legal Issues and Risks - February 17th, 10:00 am CT

From remote classrooms to student devices—and everything in between—school districts have been thrown into the deep end with no life jacket when it comes to managing cybersecurity. Join us for a discussion of the unique...more

Hogan Lovells

SEC Releases Cybersecurity and Resiliency Observations: A Potentially Useful Guide for Businesses

Hogan Lovells on

In today’s connected world, businesses face constant pressure to improve their cybersecurity practices and to confirm that they are meeting industry standards. To continue helping businesses achieve those goals, the SEC...more

Bracewell LLP

SEC Examiners Release Cyber Observations: What You Need To Know

Bracewell LLP on

On January 27, 2020, the SEC’s Office of Compliance Inspections and Examinations (OCIE) announced its most recent Cybersecurity and Resiliency Observations. This report highlights specific practices that have been, and can be...more

Faegre Drinker Biddle & Reath LLP

Emerging Cyber-Security Threats for 2020: The Rise of Disruptionware and High-Impact Ransomware Attacks

Disruptionware is defined by the Institute for Critical Infrastructure Technology (ICIT) as a new and “emerging category of malware designed to suspend operations within a victim organization through the compromise of the...more

A&O Shearman

Privacy and Cybersecurity Checklist When Designing a Family Office

A&O Shearman on

As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide