News & Analysis as of

Risk Management Data Security Incident Response Plans

Baker Donelson

Data Breaches: The Not-So-Hidden Cost of Doing Business

Baker Donelson on

In this era of big data, smart devices, and constant connectivity, the clock's already ticking on your next data breach – it's just a matter of time. For companies of all sizes and across every industry, the stakes have never...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Alston & Bird

United States Cybersecurity and Infrastructure Security Agency Issues Joint International Guidance for Event Logging and Threat...

Alston & Bird on

On August 21, 2024, the United States Cybersecurity and Infrastructure Security agency, alongside government agencies in key global allies, including Australia, the UK, Canada, and Japan, released guidance on event logging...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Adopting Generative AI? Key Contract Considerations for Healthy Due Diligence

As generative AI continues to be a hot topic in board rooms and an unavoidable reality on the front lines of business, leaders must make informed decisions when choosing AI vendors. The integration of AI into your operations...more

BakerHostetler

[Podcast] 2024 DSIR Deeper Dive: Deeper Dive into the Data

BakerHostetler on

We’re back with a deeper dive into the 2024 Data Security Incident Response Report, which features insights and metrics from 1,150+ incidents in 2023. This episode dives deeper into the data, including network intrusions...more

Jackson Lewis P.C.

The Broadening Data Security Mandate: SEC Incident Response Plan and Data Breach Notification Requirements

Jackson Lewis P.C. on

Virtually all organizations have an obligation to safeguard their personal data against unauthorized access or use, and, in some instances, to notify affected individuals in the event such access or use occurs. Those...more

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

Alston & Bird

New York State Department of Health Revises Proposed Hospital Cybersecurity Regulations

Alston & Bird on

In May 2024, the New York State Department of Health (“NYSDOH”) issued revisions to proposed regulations on hospital cybersecurity that it first released in November 2023. The proposed revised regulations are subject to...more

Womble Bond Dickinson

Cybersecurity Crunch: Building Strong Data Security Programs with Limited Resources - Insights from Tech and Financial Services...

Womble Bond Dickinson on

In today’s digital age, cybersecurity has become a paramount concern for executives navigating the complexities of their corporate ecosystems. With resources often limited and the ever-present threat of cyberattacks,...more

Kennedys

[Webinar] Days of reckoning: How to prepare for, respond to, and recover from ransomware and other cyberattacks - June 27th, 2:00...

Kennedys on

Kennedys and Booz Allen Hamilton are delighted to invite you to our 3 hour webinar on Thursday, June 27, 2024. This half-day seminar features three presentations: Clear and present danger, In the war room, and The fallout....more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Baker Donelson

Top Privacy and Cybersecurity Issues to Track In 2024

Baker Donelson on

In recognition of International Privacy Day on January 28, we wanted to share some insights on the top privacy and cybersecurity issues for the new year. Data privacy and cybersecurity will continue to be one of the most...more

Health Care Compliance Association (HCCA)

Privacy Briefs: December 2023

Report on Patient Privacy 23, no. 12  (December, 2023) Northwell Health in New York and Cook County Health in Chicago each experienced impacts from a breach at Nevada-based transcription company Perry Johnson & Associates...more

Bradley Arant Boult Cummings LLP

Network Topology and Network Mapping: The NIST Cybersecurity Framework – Part 2

A previous installment discussed the centrality of network topology to an organization’s data security and outlined the legal framework and obligations incumbent upon many organizations in the U.S. The first installment can...more

Bradley Arant Boult Cummings LLP

Network Topology and Mapping: Cornerstones of Data Security – Part 1

Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more

Clark Hill PLC

October is Cybersecurity Awareness Month – Takeaways for the Entire Year

Clark Hill PLC on

This month is the 20th annual Cybersecurity Awareness Month, co-sponsored by the Cybersecurity and Infrastructure Agency and the National Cybersecurity Alliance. This year’s theme is “Secure Our World.” The takeaways from...more

Baker Donelson

Show Your Work: The SEC Cyber Rules and Documenting Materiality Analysis Under NIST FIPS 199

Baker Donelson on

The date July 26, 2023, marks the latest evolution of the cybersecurity regulation landscape as the Securities and Exchange Commission passed cybersecurity regulations for publicly traded companies. At the open meeting, SEC...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

HaystackID

[Webinar] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories - August 30th,...

HaystackID on

In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more

Clark Hill PLC

[Event] 2023 Cybersecurity and Data Privacy Laws Summit - April 25th, Chicago, IL

Clark Hill PLC on

Clark Hill is proud to invite you to its inaugural, in-person program, where legal, in-house and technical professionals will delve into the latest cyber and privacy topics and trends. Panelists will share insight into...more

Sheppard Mullin Richter & Hampton LLP

Ethics & Compliance: Let’s Talk About Cybersecurity

Over the past few months, the OIG shorts series focused on structuring and implementing a comprehensive and effective ethics and compliance program. Many times, this requires a mindset shift from a checking-the-box mentality...more

Foley Hoag LLP

The Cybersecurity and Infrastructure Security Agency Tells K-12 Institutions to Start Small, Build Up, and Collaborate to Fight...

Foley Hoag LLP on

With the adoption of new technology, including the quick and unexpected shift to virtual learning because of the COVID-19 pandemic, K-12 institutions are at an increased risk of cyberattacks and threats thereof. The rise in...more

Nelson Mullins Riley & Scarborough LLP

When It Comes to Cybersecurity: Be Prepared!

As has been the trend for some time now, organizations across all industries and sectors are increasingly at risk of being targeted by bad actors online. Now, the adage espoused by IT security professionals is to prepare for...more

Ankura

What is MDR and How Does it Fit Into Your Security Strategy?

Ankura on

The global cyber threat landscape is rapidly evolving. The number of attacks, threat vectors, and endpoints continues to grow exponentially alongside the average time to detect and respond to a security incident. Today,...more

Farella Braun + Martel LLP

Hot Topics: Risk Management for Cybersecurity

In EO Radio Show episode 12, "Hot Topics: Risk Management for Cybersecurity," Cynthia Rowland is delighted to bring you an interview with Tim Parisi, Incident Response Director at CrowdStrike. They discuss the significant...more

51 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide