News & Analysis as of

Insider Breach

Ankura

Proactive Defense: A Step-by-Step Guide To Assessing Your Organization's Cyber Risk

Ankura on

In the continuously evolving landscape of cyber threats, organizations must be proactive in identifying and mitigating potential risks to their digital assets and operations. A critical step in building cyber resilience is...more

StoneTurn

Mastering The High Stakes of Insider Risk Management

StoneTurn on

Navigating the dynamic landscape of insider risk management requires a nuanced understanding of organisational dynamics, culture and regulatory imperatives. The costs (both direct and indirect) of getting it wrong are high,...more

StoneTurn

Navigating the Shifting Risk Landscape: Insider Threats and Global Challenges

StoneTurn on

StoneTurn Partner Sarah Keeling and Senior Adviser Richard Mackintosh host a discussion on the evolving risk landscape, examining geopolitical shifts, emerging threats in the Middle East, and the impact of AI on security....more

Ankura

Emerging Middle Market Cyber-Attack Vectors: Are You at Risk?

Ankura on

The concept of “security by obscurity” is officially outdated. In recent years, cyber-attacks have become increasingly sophisticated, destructive, and indiscriminate. In today’s landscape, cyber threats can come from internal...more

Epstein Becker & Green

Employment Law This Week®: Protecting Your Trade Secrets from Insider Threats

Epstein Becker & Green on

Cyberattacks have emerged as a critical threat to trade secret security. This Employment Law This Week Deep Dive episode focuses on cybersecurity and protecting your trade secrets from attacks that occur from inside your...more

Skadden, Arps, Slate, Meagher & Flom LLP

Key Considerations to Protect Against Insider Threats in Cybersecurity

Most companies have strengthened their cybersecurity defenses against outside hackers, but many often neglect the equal threat posed by those within their network walls — employees who already have privileged access to...more

NAVEX

Real Answers to Common Questions on Cybersecurity

NAVEX on

Q: In my company, the IT directors see cybersecurity as an IT and software issue to be solved with software and hardware. How do I convince the team that employees need to also be trained on risky behavior – something that...more

Robinson+Cole Data Privacy + Security Insider

Experian sponsors Ponemon study on data breach

Experian Data Breach Resolution sponsored a recently released Ponemon Study entitled “Managing Insider Risk through Training & Culture.” The report is quite timely in light of all of the recent successful W-2 phishing...more

Foley & Lardner LLP

Most Frequently Hacked Industries Now Includes Manufacturing

Foley & Lardner LLP on

Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more

Cole Schotz

Affirmed: New York’s Application of the In Pari Delicto Doctrine Bars Faithless Servant Claim and Bankruptcy Insider Exception

Cole Schotz on

A recent decision of the United States District Court for the Southern District of New York (the “District Court”), affirming a decision of the United States Bankruptcy Court for the Southern District of New York (the...more

K2 Integrity

The Threat From Within

K2 Integrity on

Even as organizations hunker down for a long and expensive siege against attackers from cyberspace, a determined employee with the right kind of access can be as much of a threat, if not more. ...more

Manatt, Phelps & Phillips, LLP

Advertising Law - October 2015 #3

With EU Safe Harbor Invalidated, Companies Ask: What Now? - What happens now?: That is the question that businesses across the country are asking after the Court of Justice of the European Union (CJEU) threw out the...more

Greenberg Glusker LLP

Daily Fantasy Sports Industry Could Fall Apart After Scandal

Greenberg Glusker LLP on

Greenberg Glusker litigation partner Ricardo Cestero was quoted in a Law360 article, Daily Fantasy Sports Industry Could Fall Apart After Scandal, (subscription required), addressing a customer class action filed against the...more

Kelley Drye & Warren LLP

FTC Closing Letter Provides Good Data Security Reminder

Last week, the FTC sent a closing letter to Morgan Stanley Smith Barney LLC (“Morgan Stanley”) relating to the agency’s investigation over whether Morgan Stanley engaged in unfair or deceptive acts or practices by failing to...more

Dechert LLP

Private Equity Newsletter - Summer 2015 Edition: SEC Charges Corporate Insiders for Failing to Update Beneficial Ownership...

Dechert LLP on

Enforcement actions raise potential disclosure concerns for private equity sponsors exploring investments in public companies - Earlier this year, the U.S. Securities and Exchange Commission (“SEC”) announced charges...more

Sheppard Mullin Richter & Hampton LLP

Ransoming Sensitive Personal Information: Will OPM’s Data Breach Trigger Your Insider Threats?

Perhaps it’s the books I’ve been reading or the television shows I’ve been watching, but my mind can’t seem to stop linking the recent barrage of cybersecurity attacks with those ne’er-do-wells that plagued the Caribbean from...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide