News & Analysis as of

Information Security Cybersecurity

Society of Corporate Compliance and Ethics...

Information Security and ISO 27001

ISO 27001 is the leading standard for information security management systems. As Mel Blackmore, CEO of UK-based Blackmores explains, it is a framework that applies and is of value regardless of an organization’s size, sector...more

HaystackID

[Webinar] From Breach to Insight: Incident Response & PII Recovery - May 29th, 12:00 pm EDT

HaystackID on

With escalating cyber risks and heightened regulatory scrutiny, every minute after a data breach is crucial. Sophisticated cybercriminals relentlessly target your organization’s most valuable asset: personally identifiable...more

Sheppard Mullin Richter & Hampton LLP

Utah Breach Notice Law Amended, Effective May 1

Utah, among other privacy laws it has enacted or modified recently, has also modified its breach notification law. This follows last year’s changes to the law, which among other things codified the state’s Cyber Center....more

McDermott Will & Emery

Preparing for Evolving Cybersecurity Threats

McDermott Will & Emery on

The recent ransomware attack against the Duvel Moortgat Brewery demonstrated the very real risk that cybersecurity incidents pose to the alcohol industry, reportedly halting operations for several days at four of Duvel...more

Mayer Brown

Key forthcoming EU legislation on Cybersecurity, Artificial Intelligence, Data and Digital Markets

Mayer Brown on

NETWORK AND INFORMATION SECURITY 2 DIRECTIVE (NIS2) - WHO WILL BE IN SCOPE? Operators of essential and important services across various sectors including energy, transport, banking, health, medical devices, chemicals...more

American Conference Institute (ACI)

[Event] 14th Advanced Forum on Global Encryption, Cloud & Export Controls - May 15th - 16th, San Francisco, CA

Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2024

Robinson & Cole LLP on

CYBERSECURITY - TechRadar's Cyber Predictions for 2024 are Spot On - Because technology develops so rapidly, and “trends” are fast and furious, it is always hard to predict what the big issues will be for the next...more

Ward and Smith, P.A.

Senior Savvy: Wise Owls Navigating Cyber Scams

Ward and Smith, P.A. on

As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages. Among the great tapestry of age groups, despite the wealth of experience and...more

Morrison & Foerster LLP

Top 5 SEC Developments (October 2023)

Morrison & Foerster LLP on

Each month, we publish a roundup of the most important SEC enforcement developments for busy in-house lawyers and compliance professionals. This month we examine: • Fraud and internal control failure charges against...more

Ankura

Navigating the Future: Trends Shaping Cyber Incident Response

Ankura on

In the last two decades, incident response has evolved significantly, adapting to the dynamic cyber threat landscape. As the internet became an integral part of daily life, cyber threats escalated in scope and scale. This...more

Skadden, Arps, Slate, Meagher & Flom LLP

What Does the SEC’s Complaint Against SolarWinds Mean for CISOs and Boards?

On October 30, 2023, the SEC filed a litigated complaint against SolarWinds, a software development company, and Timothy Brown, its chief information security officer (CISO). The SEC alleges that from October 2018, when...more

Schwabe, Williamson & Wyatt PC

New FAR Cybersecurity Requirements for Federal Contractors

This is an advisory update of key responsibilities for contractors under a proposed new Federal Acquisition Regulation (FAR) rule that standardizes cybersecurity requirements for a Federal Information System (FIS). The...more

Jenner & Block

Client Alert: The SEC Charges SolarWinds and Its CISO with Fraud: Key Takeaways

Jenner & Block on

This week, the SEC filed a high-profile litigation asserting fraud and internal controls charges against software company SolarWinds Corporation and its Chief Information Security Officer, Timothy G. Brown, in connection with...more

Lowenstein Sandler LLP

SEC’s 2024 Examination Priorities for Broker-Dealers

Lowenstein Sandler LLP on

On October 16, 2023, the U.S. Securities and Exchange Commission (“SEC”) Division of Examinations (the “Division”) released its annual Examination Priorities for fiscal year 2024 (the (“Report”), marking the first time the...more

Perkins Coie

Security Breach Notification Chart - September 2023

Perkins Coie on

Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes only and is intended as an aid in understanding each...more

Ankura

Keeping Pace: The Evolution of Incident Response

Ankura on

Incident response (IR) has undergone a drastic transformation in the past two decades, adapting to the relentless evolution of the cyber threat landscape. In the early 2000s, as the internet became more deeply ingrained in...more

Guidepost Solutions LLC

Lines of Authority: The Critical Need for Role Clarity in Information Security Compliance

Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more

The Volkov Law Group

Technical Elements of a Cybersecurity Compliance Program (IV of IV)

The Volkov Law Group on

The term cybersecurity is thrown about because it covers so many risks.  There is no common definition of cybersecurity and the technical elements included in the term.  From a technical standpoint, cybersecurity covers...more

White & Case LLP

China’s Standard Contract for the Outbound Cross-border Transfer of Personal Information is in Effect

White & Case LLP on

China's Cybersecurity Law ("CSL"), Personal Information Protection Law ("PIPL") and Data Security Law ("DSL") set a series of rules and requirements for the cross-border transfer of personal information located in China....more

Pietragallo Gordon Alfano Bosick & Raspanti,...

The Domination of Cybersecurity

Key takeaway: Despite the Supreme Court’s recent pronouncement of patent-eligible subject matter, cybersecurity innovation will remain an active area for intellectual property protection through the patent application and...more

NAVEX

[Webinar] Risk and Process Management Framework: Lessons Learned in Getting Started – Featuring Forrester - June 20th, 10:00 am PT

NAVEX on

Getting a successful risk management program off the ground can be daunting for even the most intrepid information security professionals. It doesn’t have to be rocket science. In this webinar, we’ll explore with guest...more

J.S. Held

What is an Information Security Framework and Why Do I Need One?

J.S. Held on

An information security framework, when done properly, will allow any security leader to more intelligently manage their organization's cyber risk. The framework consists of a number of documents that clearly define the...more

McDermott Will & Emery

[Webinar] PCI DSS 4.0: Third-Party Service Providers and Risk Management - June 7th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Join members of McDermott’s Global Privacy & Cybersecurity team and Alan Gutierrez-Arana of Mazars for the next installment in our PCI DSS 4.0 series. PCI DSS 4.0 brings major changes to payments with an increased focus on...more

Ankura

Why a Right-Sized MDR Solution May Be Better Than One-Size-Fits-All

Ankura on

When it comes to providing Managed Detection and Response (MDR) solutions for businesses, the idea of one size fits all is being replaced by the concept of right-sizing. A one-size-fits-all option is a preconfigured security...more

Robinson+Cole Data Privacy + Security Insider

Clop Claims Zero-Day Attacks Against 130 Organizations

Russia-linked ransomware gang Clop has claimed that it has attacked over 130 organizations since late January, using a zero-day vulnerability in the GoAnywhere MFT secure file transfer tool, and was successful in stealing...more

209 Results
 / 
View per page
Page: of 9

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide