News & Analysis as of

Policies and Procedures Risk Management Information Technology

Society of Corporate Compliance and Ethics...

[Webinar] Creating an AI Governance Program (It's Go-Time) - April 24th, 12:00 pm CT

Pressure for companies to use AI to gain a competitive advantage (or at least not fall behind versus competitors) is steadily rising, and in 2024, CEOs will push their Legal, Compliance, Privacy, and IT Teams to deploy AI...more

Husch Blackwell LLP

Twelve Planning Tips to Avoid Complications with the SEC’s Cybersecurity Disclosure Rules: Part III

Husch Blackwell LLP on

Key Point: The decision making processes to determine whether a cybersecurity incident is material or not, should include documenting the factors behind each determination and should be practiced before an incident occurs. ...more

Dunlap Bennett & Ludwig PLLC

The Role Of A Cybersecurity Law Firm In Safeguarding Digital Assets

In today’s digital landscape, organizations face numerous cybersecurity threats that can compromise their valuable digital assets, including their data, IT infrastructure, networks, software, and intellectual property (IP)....more

Paul Hastings LLP

The Board is Set: Preparing for the SEC’s Upcoming Cybersecurity Rules

Paul Hastings LLP on

It has been a full year since the initial comment period closed on the Securities and Exchange Commission’s (“SEC”) proposed rule on cybersecurity disclosure, governance, and risk management for public companies (the...more

Mitratech Holdings, Inc

[Webinar] Are you Ready? Why Your Board & Stakeholders Are About to Ask You About Your IT Risk Technology - March 14th, 10:00 am...

The attention on IT Risk and Cybersecurity risk management policies is reaching new heights — again. It doesn’t matter if you’re a large enterprise like Uber or a small / midcap company; there’s one common thread as we start...more

Porter Hedges LLP

Cybersecurity Risk Management Practices for Small and Midsize Businesses

Porter Hedges LLP on

Cybersecurity is the goliath of tech-related concerns for companies of all sizes, not just large corporations. The Cybersecurity & Infrastructure Security Agency (“CISA”) encourages small and midsize businesses to focus on...more

Snell & Wilmer

Adjusting to Construction in the Smart Home Technology Age

Snell & Wilmer on

Over the years, smart home technology has improved, expanded, and become more reasonably priced. As a result, homeowners are increasingly including it in their construction plans. While the conveniences of smart home...more

NAVEX

IT and Corporate Compliance: Bridging the Gap in the Era of Remote and Hybrid Work

NAVEX on

In many ways, the COVID-19 pandemic has served as a prime example of punctuated equilibrium. Shifts that have been slowly building for decades seemingly occurred overnight, giving us the contradictory sense that these changes...more

NAVEX

The Complicated Tango of Compliance & Cybersecurity

NAVEX on

A ransomware attack is no company’s idea of a good time, but I do sense one positive development emerging from the epidemic of attacks we’ve witnessed this year: Boards and senior management agree that they must move beyond a...more

NAVEX

Shadow Policies: Increasing Legal Exposure & Liability

NAVEX on

Are you scared of shadows? You should be, as they can cause serious legal, operational, compliance, risk, brand/reputation, and integrity liability. For the past several years organizations have been battling shadow IT....more

NAVEX

4 Things to Know About Updated NIST 800-53 Standards

NAVEX on

[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more

NAVEX

What is Integrated Risk Management?

NAVEX on

It’s a business maxim: Where business goes, risks follow. And in recent years, business has found itself in places that might not have been part of the original plan: Digital processes, global business, outsourcing to third...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

Hogan Lovells

EU: 5 tips to protect your trade secrets during the COVID-19 emergency

Hogan Lovells on

While COVID-19 dramatically spreads across Europe, all companies are being forced to implement new large scale remote working arrangements. During these times of crisis, it’s easy for proprietary and confidential information...more

Society of Corporate Compliance and Ethics...

Compliance Perspectives: Compliance and Technology

Heidi Rudolph, Managing Director at Morae Global, has spent a great deal of time considering technology’s role, risks and rewards for compliance teams. She contributed an article...more

Society of Corporate Compliance and Ethics...

Compliance Perspectives: Cybervigilance and Cyber-resiliency

Mark Lanterman, Chief Technology Officer of Computer Forensic Services lives technology at its most terrifying, helping organizations manage the risks of the IT we all use constantly. Recently he authored an article...more

Mitratech Holdings, Inc

Data Governance And Data Management: What’s The Difference?

Mitratech Holdings, Inc on

A lot of attention is now being paid to the topic of data governance, and what it means versus data management. Within the last few years, data governance has leapt from an esoteric term bandied about only by IT...more

Fisher Phillips

Don’t Take the Bait! “Spear Phishing” and “Whaling” Take Scams to the Next Level

Fisher Phillips on

For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more

Ballard Spahr LLP

Proposed House Bill Would Set National Data Security Standards for Financial Services Industry

Ballard Spahr LLP on

A new bill introduced by House Financial Services subcommittee Chairman Rep. Blaine Luetkemeyer would significantly change data security and breach notification standards for the financial services and insurance industries. ...more

Ballard Spahr LLP

Proposed House Bill Would Set National Data Security Standards for Financial Services Industry

Ballard Spahr LLP on

A new bill introduced by House Financial Services subcommittee Chairman Rep. Blaine Luetkemeyer would significantly change data security and breach notification standards for the financial services and insurance industries. ...more

Robinson+Cole Data Privacy + Security Insider

New York Department of Financial Services Cybersecurity Regulation 18-month Compliance Deadline Arrives

On September 4, 2018, the third stage of compliance deadlines under the New York Department of Financial Services’ (DFS) expansive cybersecurity regulation went into effect....more

Mitratech Holdings, Inc

Cybersecurity Precautions for Businesses

The need for cybersecurity continues to increase as technology advances. Over the past few years, a number of major corporations have fallen victim to hackers due to seemingly minor oversights and a failure to properly manage...more

White and Williams LLP

Washington Suburb Targeted by Cybercrime and Ransomware Attacks – Cyber News

A recent report from The Seattle Times provides details on a series of social engineering and ransomware attacks successfully perpetrated on a Seattle suburb during the second half of 2017. The incidents of cyber scams...more

Patterson Belknap Webb & Tyler LLP

DFS Filing “Reminder” as Deadline Looms

For the several thousand financial institutions and insurance companies covered by New York’s landmark data security regulation, the first certification of compliance must be filed with the State’s Department of Financial...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide