News & Analysis as of

Risk Assessment Cybersecurity National Institute of Standards and Technology

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

Dunlap Bennett & Ludwig PLLC

CMMC 2.0: Level One: A Self-Assessment

As we promised a trilogy in our earlier 2024 CMMC Blog – “Get Ahead of Compliance: The Proposed Rule for the Cybersecurity Maturity Model Certification (CMMC 2.0) Is Out!” – we continue our series with a discussion of each...more

Woods Rogers

DoD Unveils Cybersecurity Strategy for Defense Industrial Base: What You Need to Know

Woods Rogers on

The United States Department of Defense (“DoD”) recently published its Defense Industrial Base Cybersecurity Strategy 2024. For context, the DIB is comprised of more than 100,000 domestic and foreign companies or...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Federal Regulators Unveil Revised Final Guidance for Healthcare Cybersecurity and HIPAA Compliance

On February 14, 2024, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST) published a new, final version of their guidance for...more

Oberheiden P.C.

Defense Department Looks to Update DFARS Cybersecurity Compliance Requirements

Oberheiden P.C. on

Over the holidays, the U.S. Department of Defense (DoD) issued proposed rules for updating its Cybersecurity Maturity Model Certification (CMMC) program from its existing Defense Acquisition Regulatory Supplement (DFARS)...more

Saul Ewing LLP

New Cybersecurity Guide Released

Saul Ewing LLP on

On February 16, 2024, the HHS Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST) published a final version of the cybersecurity resource guide (the “Guide”) with respect to the HIPAA...more

McCarter & English Blog: Government Contracts...

DoD’s Proposed CMMC Rule: Groundhog Day… or a Final Rule in the Works?

On December 26, 2023, the Department of Defense (“DoD”) belatedly gifted defense contractors and subcontractors a Proposed Rule on the Cybersecurity Maturity Model Certification (“CMMC”) Program. DoD also released eight CMMC...more

Morrison & Foerster LLP - Government...

An Overview Of The Defense Department’s Long-awaited Proposed Regulations For Its Cybersecurity Maturity Model Certification...

The U.S. Department of Defense released a special holiday treat for government contractors and subcontractors last week in the form of long-promised proposed regulations for its Cybersecurity Maturity Model Certification...more

Bradley Arant Boult Cummings LLP

Evolution of the Chinese Hacking Threat: Risks for Government and Industry

On May 24, 2023, Microsoft announced the detection of a direct threat to critical infrastructure organizations in Guam and elsewhere in the United States. The alert attributed observed malicious activity to a state-sponsored...more

Davies Ward Phillips & Vineberg LLP

Governance Insights: Get Smart on Artificial Intelligence (AI) and Corporate Governance: Key Considerations for Boards of...

It has been one year since OpenAI released ChatGPT, arguably catalyzing today’s new wave of interest in AI. This surge of interest is driving substantial investments in AI technologies and a heightened urgency to address the...more

Davis Wright Tremaine LLP

CISA Releases Revised Draft of Secure Software Development Self-Attestation Form

The Cybersecurity and Infrastructure Security Agency (CISA) has released a revised draft of its Secure Software Development Attestation Common Form ("Form"). The Form, once finalized, will obligate vendors providing software...more

Morrison & Foerster LLP

A New Frontier for SEC Cybersecurity Enforcement? The SEC Charges SolarWinds and its CISO with Securities Fraud

Earlier this week, the SEC accused SolarWinds Corporation (“SolarWinds” or the “Company”) and its Chief Information Security Officer (“CISO”) of committing scienter-based securities fraud, among other violations, for...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

Cozen O'Connor

Biden Administration’s Voluntary AI Safety Agreement

Cozen O'Connor on

The Biden administration announced that it brokered a voluntary agreement with several of the biggest technology and artificial intelligence (AI) companies. The agreement, available here, has the companies taking a number of...more

Clark Hill PLC

Right To Know - September 2023, Vol. 9

Clark Hill PLC on

Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more

BakerHostetler

NYDFS Issues Revised Proposed Second Amendment to Its Cybersecurity Regulation

BakerHostetler on

The New York State Department of Financial Services (NYDFS) recently published a revised proposed second amendment to its cybersecurity regulation, 23 NYCRR 500. ...more

Dunlap Bennett & Ludwig PLLC

The Role Of A Cybersecurity Law Firm In Safeguarding Digital Assets

In today’s digital landscape, organizations face numerous cybersecurity threats that can compromise their valuable digital assets, including their data, IT infrastructure, networks, software, and intellectual property (IP)....more

Dunlap Bennett & Ludwig PLLC

Risky Business And Cyber Attacks… Simple Steps To Limit Liability Of Cybersecurity Service Providers

The consequences of a cyber attack can be significant and wide-ranging for both an individual and a business – no matter how big or small. Cyber attacks can result in serious data breaches that lead to the theft or exposure...more

J.S. Held

What is an Information Security Framework and Why Do I Need One?

J.S. Held on

An information security framework, when done properly, will allow any security leader to more intelligently manage their organization's cyber risk. The framework consists of a number of documents that clearly define the...more

Perkins Coie

Sector-Based Cybersecurity Requirements for Critical Infrastructure, From Our Water Systems to the Skies

Perkins Coie on

Following the release of President Biden’s National Cybersecurity Strategy, Acting National Cyber Director Kemba Walden explained that the Biden Administration is “expecting more” from owners and operators in critical...more

Dunlap Bennett & Ludwig PLLC

Updating Government Contracting Documents for Cybersecurity

This article is the third and final installment in a series of articles about how lawyers can better serve their clients by involving themselves in cybersecurity planning at an early stage. Just like Return of the Jedi was...more

Dunlap Bennett & Ludwig PLLC

What the New Cybersecurity Regulations Actually Mean to Defense Contractors

This is not a blog post about the CMMC. The blogosphere is saturated with CMMC content, and the longer the program stretches into indefiniteness, the more content is delivered to an audience drowning it out....more

Dunlap Bennett & Ludwig PLLC

A Lawyer’s Guide to Understanding NIST 800-171 Assessments

Lawyers, who are not particularly known for their sense of humor, joke that the reason they attended law school was to avoid doing math. A variation of the joke involves having to understand information technology....more

BakerHostetler

‘Unboxing’ the New NIST Guidance: NIST Publishes Significant Update to Healthcare Cybersecurity Guide

BakerHostetler on

​​​​​​​Without question, healthcare providers and the companies that support them operate in an elevated cybersecurity risk environment. And when a cybersecurity incident occurs, the ensuing regulatory inquiries and/or...more

Foley & Lardner LLP

NIST Releases Draft Cybersecurity Resource Guide on Implementing the HIPAA Security Rule

Foley & Lardner LLP on

The National Institute of Standards and Technology (NIST) has released an initial draft of Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide (Resource...more

47 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide