News & Analysis as of

Information Technology Risk Assessment Risk Management

McCarter & English Blog: Government Contracts...

OMB Issues Guidance to Agencies on Responsible Artificial Intelligence Acquisitions

Contractors interested in offering federal agencies artificial intelligence (AI) can now glean insight into how agencies are expected to conduct AI acquisitions. On September 24, 2024, the Office of Management and Budget...more

Arnall Golden Gregory LLP

Preparing for the Digital Operational Resilience Act (“DORA”): Key Steps for Payments and Fintech Clients

The Digital Operational Resilience Act (“DORA”), an EU regulation designed to bolster the resilience of financial entities against Information and Communications Technology (“ICT”) risks, entered into force on January 16,...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part IV - Data Deletion Dilemma: A Unified Approach to Defensible Data Disposal - September 26th,...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Warner Norcross + Judd

Managing Cybersecurity Risk for Family Offices and Businesses

Warner Norcross + Judd on

Whether caused by family member thoughtlessness, employee error or the acts of a skilled data thief, everyone is likely to be the victim of an information breach at some point. A cyberattack on a family office or family...more

Orrick, Herrington & Sutcliffe LLP

RegFi Episode 42: Beyond the Breach: The CISO’s Role as a Strategic Risk Manager

RegFi co-hosts Jerry Buckley and Sherry Safchuk welcome Orrick partner Aravind Swaminathan for a conversation exploring the critical and evolving role of the Chief Information Security Officer in today’s corporate landscape.....more

StoneTurn

Building a High Trust Organisation

StoneTurn on

In a high trust organisation each member can be relied upon to demonstrate behaviours which foster transparency, good decision making and delivery of the shared vision without a large controlling overhead. It’s rare in...more

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

Jackson Lewis P.C.

Importance of Protecting Employee Information as Privacy and Cybersecurity Laws Proliferate

Jackson Lewis P.C. on

Most human resources professionals are concerned about the privacy and security of the vast amounts of personal information they manage. This article discusses steps to consider taking against the challenges. Deluge of...more

Dunlap Bennett & Ludwig PLLC

The Complexity Of Digital Privacy Law—Insights And Implications

The digital age has ushered in a host of transformative opportunities for businesses, from enhanced customer engagement through data analytics to streamlined operations via digital platforms. However, this digital...more

Foley Hoag LLP - Global Business and Human...

A Human Rights Impact Assessment of Microsoft's Enterprise Cloud and AI Technologies Licensed to U.S. Law Enforcement Agencies

Microsoft is one of the world’s leading technology companies. Its products and technologies are in offices, classrooms, and homes. Additionally, governments use them to help conduct vital public services. Microsoft is also...more

Dunlap Bennett & Ludwig PLLC

The Role Of A Cybersecurity Law Firm In Safeguarding Digital Assets

In today’s digital landscape, organizations face numerous cybersecurity threats that can compromise their valuable digital assets, including their data, IT infrastructure, networks, software, and intellectual property (IP)....more

NAVEX

Artificial Intelligence – The Next Frontier of GRC Management

NAVEX on

It’s safe to say that there could be a whole series dedicated to Artificial Intelligence (AI) and the various use cases and ramifications of such groundbreaking technology. While there are ethical considerations, security...more

J.S. Held

Cyber Hygiene in 2023: Part 1 – Getting Buy-In from Users

J.S. Held on

As we progress through 2023, both new and old cyber challenges remain, but opportunities for improvement are present. For the upcoming year, assume the following: 1. Past challenges have not been overcome, and we still...more

Burr & Forman

Cybersecurity Checklist for Vendor Management – Vendor Security

Burr & Forman on

By now, you have heard many news stories about debilitating cyberattacks that started with the compromise of a vendor's systems and ultimately wreaked havoc on that vendor's customers. As a result, many businesses are seeking...more

Porter Hedges LLP

Cybersecurity Risk Management Practices for Small and Midsize Businesses

Porter Hedges LLP on

Cybersecurity is the goliath of tech-related concerns for companies of all sizes, not just large corporations. The Cybersecurity & Infrastructure Security Agency (“CISA”) encourages small and midsize businesses to focus on...more

NAVEX

Your Questions, Answered: Assessing and Maturing Third-Party and IT Risk Management Programs

NAVEX on

Recently, NAVEX hosted a webinar featuring Carol Williams, CEO and principal consultant at Strategic Decision Solutions where she discussed best practices on how to assess and mature third-party and IT risk management...more

NAVEX

3 IRM Trends & Predictions for 2022

NAVEX on

Integrated Risk Management (IRM) and Governance, Risk Management and Compliance (GRC) are critical areas for business security and success. But all too often these programs aren’t thoroughly tested – or worse, aren’t...more

NAVEX

The Complicated Tango of Compliance & Cybersecurity

NAVEX on

A ransomware attack is no company’s idea of a good time, but I do sense one positive development emerging from the epidemic of attacks we’ve witnessed this year: Boards and senior management agree that they must move beyond a...more

Goodwin

FDIC Seeks Comment on Supervisory Approach to Examinations During Pandemic

Goodwin on

In This Issue. The Federal Deposit Insurance Corporation (FDIC) is seeking information and comment regarding the FDIC’s supervisory approach to examinations during the pandemic; the FDIC’s tech lab, FIDTECH, announced a “tech...more

Society of Corporate Compliance and Ethics...

[Event] 20th Annual Compliance & Ethics Institute - September 19th - 22nd, Las Vegas, NV

SCCE’s Compliance & Ethics Institute is the primary educational and networking event for compliance and ethics professionals worldwide. Leading industry professionals cover real‑world compliance issues, emerging trends, and...more

NAVEX

4 Things to Know About Updated NIST 800-53 Standards

NAVEX on

[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more

Vinson & Elkins LLP

The Pandemic Lessons: The Future Of ESG And How It Will Define Business Success

Vinson & Elkins LLP on

The rapidly increasing importance of a company’s environmental, social and governance (ESG) performance to its business value, has been a critical trend leading into 2020. This trend was accelerated by the COVID-19 pandemic,...more

Poyner Spruill LLP

New York Fires First Salvo Under Cybersecurity Law

Poyner Spruill LLP on

The New York Department of Financial Services (NYDFS) has launched its first enforcement action under New York’s Cybersecurity law for financial services, so-called Part 500. Part 500 requires NYDFS licensed institutions to...more

NAVEX

What is Integrated Risk Management?

NAVEX on

It’s a business maxim: Where business goes, risks follow. And in recent years, business has found itself in places that might not have been part of the original plan: Digital processes, global business, outsourcing to third...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

41 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide