Riskology by Infortal: Episode 34 – The Hezbollah Pager Attack & Supply Chain Compliance
Compliance into the Weeds: Exploring Compliance Data Access and Testing Challenges
All Things Investigations: Anchored in Fraud: Mike DeBernardis and Shayda Vance on Austal USA’s Scandal
#WorkforceWednesday®: What the FTC Non-Compete Ban Block Means for Employers - Employment Law This Week®
Podcasting for Business - The Book: Metrics That Matter, Part 1 - Referrals, Sales Cycle, Promos, SEO and Product Creation
Innovation in Compliance: The Evolution of Compliance and Technology: An Interview with Stuart Breslow
The Magnificent 7 Rides Again: Elaine Capers on Artistic Inspirations from West Texas
Consumer Finance Monitor Podcast Episode: Why do Fintechs Want to Become Banks?
From Paper to Digital: The California DMV's Leap Into Blockchain Technology — The Crypto Exchange Podcast
Compliance Tip of the Day: Bank of America, Culture and Internal Controls
Corruption, Crime and Compliance: SEC Suffers Dismissal of Claims in Solarwinds Securities Fraud Case
Regulatory Ramblings: Episode 51 - The EU AI Act: Why it Matters for Asia and Beyond with Michael Borrelli (AI & Partners) and Anandaday Misshra (AMLEGALS)
The Woody Report: The Solar Winds Dismissal
Life With GDPR: AI Regulation in The EU
The Power of Genuine Networking for Entrepreneurs With OneSixOne Ventures with Pablo Casilimas and Justis Mendez
Innovation in Compliance: Unpacking Healthcare Compliance with Maria Villanueva
Corruption, Crime and Compliance: The Boeing Plea Agreement
Riskology by Infortal: Episode 30 – Boeing’s Future: Failure is Not an Option with Tom Fox and Christopher Mason
Daily Compliance News: August 12, 2024 – The Bribery Alleged Edition
2 Gurus Talk Compliance: Episode 34 – The Whistleblower Edition
The widespread and debilitating impacts of the recent faulty Crowdstrike® software update has caused businesses to evaluate processes and examine potential claims and defenses related to the deleterious commercial impacts of...more
The recent indictment of Maksim Silnikau, a Belarusian and Ukrainian national, is a clear reminder that cybercriminals are becoming more sophisticated and bold....more
As the Web3 and digital assets ecosystem continues to grow, hacks, scams and other threats remain a major cause for concern and a potential impediment to broader adoption. Data from various sources indicates that after a year...more
Cybercriminals continue to outpace the best efforts of regulators, law enforcement, and cybersecurity professionals. Recent reporting from the Federal Bureau of Investigation demonstrates that cybercriminals are increasingly...more
Pennsylvania-based Geisinger Health System said it experienced a breach impacting more than 1.27 million patients when a former employee of vendor Nuance Communications Inc., a Microsoft Corp. subsidiary, accessed patient...more
The healthcare industry remains a popular target for ransomware attacks. If you haven’t been impacted by a ransomware attack, it’s likely only a matter of time before someone you do business with or buy services from is...more
Ransomware continues to make headlines in the data security world, and with good reason. A report issued earlier this year by the Director of National Intelligence highlighted the continued surge in ransomware attacks in the...more
The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more
Modern warfare is no longer restricted to physical battlefields and professional military. Countries like North Korea and Russia have few qualms about using cyberspace to reach well beyond their physical borders to target...more
A spate of recent ransomware attacks illustrates the increasingly difficult calculations that businesses face following the theft or encryption of their data....more
Just over a year ago, the White House issued its long-awaited National Cybersecurity Strategy, with an emphasis on defending Critical Infrastructure, promoting public and private collaboration, and safeguarding...more
Cyberhackers—potentially frustrated by their limited ability to extort ransom from health care entities in attacks—have started extorting the patients themselves, threatening them with the release of information or...more
The recent ransomware attack against the Duvel Moortgat Brewery demonstrated the very real risk that cybersecurity incidents pose to the alcohol industry, reportedly halting operations for several days at four of Duvel...more
New York has released proposed cybersecurity regulations for hospitals. The regulations, which were published in The State Register on Dec. 6 and will undergo a 60-day public comment period ending on Feb. 5, are designed to...more
From large-scale hacks to new rules governing cyber practices, the cyber landscape continues to become more complex. The risk for breaches is higher than ever before. The numbers support this declaration. According to the...more
The Most Significant Developments in Cybersecurity and Cyber-Related Liability Risks - As we reflect upon 2023, it will unfortunately be remembered as a record-breaking year for ransomware and cybercrime....more
According to a New York Times story this weekend, the Security Exchange Commission’s lawsuit against SolarWinds is driving discussions in boardrooms and corporate security departments of large organizations about the handling...more
CYBERSECURITY - Hackers Steal $4.4M Crypto Using Data Linked to LastPass Breach - According to Bleeping Computer, crypto fraud researchers at ZachXBT, and MetaMask developer Taylor Monahan have reported that on October 25,...more
The Cybersecurity & Infrastructure Security Agency, FBI, and MS-ISAC recently released an urgent Joint Advisory on the Atlassian Confluence Vulnerability CVE-2023-22515. According to the Alert, “this critical vulnerability...more
Typically, we beat the drum of the need to prepare for a data incident—anything from a full-blown ransomware attack to an employee accidently sharing data with the wrong person—by having your Incident Response Plan developed...more
Ransomware attacks and cyber data theft are an unfortunate fact of life for businesses. Whether through attacks targeting individual companies or widespread campaigns carried out by exploiting vulnerabilities in third-party...more
The annual Cost of a Data Breach Report (Report) published by IBM is reliably full of helpful cybersecurity data. This year is no different. After reviewing the Report, we pulled out some interesting data points. Of course,...more
Publications and Advisories - July 31, 2023 – Dave Brown, Kate Hanniford, Kim Peretti, Julia Mediamolle, Cara Peterman, Sierra Shear, Kristen Bartolotta, and Kezia Osunsade published “Securities Law, Securities Litigation,...more
In today’s world of cyber threats, many companies have fallen victim to ransomware attacks. Corporate boards and senior executives face serious issues when their companies are attacked. The payment of ransom is not only...more