News & Analysis as of

Risk Management Data Security Supply Chain

DLA Piper

The UK Cybersecurity and Resilience Bill – A Different Approach to NIS2 or a British Sister Act?

DLA Piper on

Introduction It wouldn't be much of an exaggeration to say that NIS2 is the acronym on everyone's lips. When coupled with its European sister legislation DORA, we encounter a regulatory twosome that make GDPR feel like...more

Foley & Lardner LLP

Technology Trends in Manufacturing and Associated Legal Risk Management: Driving Technological Advancement with an Ecosystem View 

Foley & Lardner LLP on

The importance of building technology-driven manufacturing businesses with an ecosystem focus—i.e., a comprehensive view of the complex network of suppliers, partners, and customers in a market—emerged as a critical theme for...more

Baker Donelson

Top Privacy and Cybersecurity Issues to Track In 2024

Baker Donelson on

In recognition of International Privacy Day on January 28, we wanted to share some insights on the top privacy and cybersecurity issues for the new year. Data privacy and cybersecurity will continue to be one of the most...more

Bradley Arant Boult Cummings LLP

Executive Order Clarifies Focus and Five Factors for Future CFIUS Reviews

President Biden issued Executive Order (EO) 14083 on September 15, 2022, establishing five factors for reviews by the Committee on Foreign Investment in the U.S. (CFIUS), and areas of heightened scrutiny for transactions...more

Ankura

Outsourcing Services: An Increasingly Common Origin for Insider Threats in the Supply Chain

Ankura on

On May 10, 2022, a former Coca-Cola chemist was sentenced to 14 years in prison for selling trade secrets to a Chinese government-backed corporation. This example demonstrates the way the supply chain increasingly presents...more

Arnall Golden Gregory LLP

Contracting for Supply Chain Cybersecurity: Recent Report Provides Insight on Best Practices

Introduction - Enterprises are increasingly reliant on complex and interconnected ecosystems of technology solutions. Companies are reducing their dependence on the legacy monolithic highly customized solutions, instead...more

American Conference Institute (ACI)

[Event] 2nd National Forum on Team Telecom - April 25th, Washington, DC

Gain critical strategies for managing reviews in the new Team Telecom environment. The American Conference Institute’s 2nd National Team Telecom Conference will take place in Washington D.C. on April 25, 2022, one day...more

K2 Integrity

Cyber Predictions 2022

K2 Integrity on

Where We Stand - This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more

Sheppard Mullin Richter & Hampton LLP

Seeking HoNIST Opinions, Part II – NIST Invites Comments on Major Revision to Cyber Supply Chain Risk Management Practices and...

The National Institute of Standards and Technology (“NIST”) is seeking comments on its second draft of NIST SP 800-161 Rev. 1, “Cyber Supply Chain Risk Management Practices for Systems and Organizations,” published on October...more

Lighthouse

Cybersecurity Defense: Recommendations for Companies Impacted by the Biden Administration Executive Order

Lighthouse on

As summarized in the first installment of our two-part blog series, President Biden recently issued a sweeping Executive Order aimed at improving the nation’s cybersecurity defense. The Order is a reaction to increased...more

Society of Corporate Compliance and Ethics...

[Virtual Event] 2021 San Francisco Regional Compliance & Ethics Conference - May 14th, 8:25 am - 4:30 pm PDT

Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more

NAVEX

CMMC Is Coming: How Government Contractors Can Prepare

NAVEX on

People like to say that cybersecurity threats are constantly evolving. So perhaps it’s fitting that cybersecurity compliance is undergoing a significant evolution of its own this year, too. That evolution is the arrival of...more

BakerHostetler

Responding to Supply-Chain Risk—It's Not Just About Vendor Management

BakerHostetler on

Organizations around the globe began 2021 grappling with two significant supply-chain attacks. First, the SVR, Russia’s foreign intelligence service, planted malicious code in Orion, SolarWinds’ flagship network management...more

NAVEX

4 Things to Know About Updated NIST 800-53 Standards

NAVEX on

[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more

Epiq

What is a BitSight Rating and Why Should You Consider Using it to Manage Cyber Risk in Your Supply Chain

Epiq on

If you operate as a B2B organization (business to business), you are either part of the supply chain, manage a supply chain, or you fit into both categories - the latter being the most prevalent. Tools like BitSight provide...more

Ward and Smith, P.A.

New Year, New Technology Priorities

Ward and Smith, P.A. on

In February 2021, the National Institute of Standards and Technology ("NIST"), which is a subdivision of the Department of Commerce in the United States Government, announced its nine priorities for the coming year....more

Society of Corporate Compliance and Ethics...

[Virtual Event] 2021 Asia Regional Compliance & Ethics Conference - January 8th, 8:55 am - 2:00 pm SGT

Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more

Society of Corporate Compliance and Ethics...

[Virtual Event] 2020 Virtual Washington DC Regional Compliance & Ethics Conference - October 9th, 8:25 am - 4:30 pm EDT

Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more

Stinson - Government Contracting Matters

Wondering Why Government Contractors Need to Take Cybersecurity Seriously – Criminals and Foreign Adversaries Are Trying to Hack...

Our blogs and alerts have reported on the increasing legislative and regulatory requirements to promote the security of the U.S. supply chain, including its cybersecurity....more

PilieroMazza PLLC

[Event] Gaining a Competitive Advantage Through Cyber, Data, & Personnel Security - June 5th, Tysons, VA

PilieroMazza PLLC on

Cybersecurity and protection of sensitive data from external and insider threats are critical for federal contractors across all industries and in all market positions. Each significant data breach or cyber incident and...more

Holland & Knight LLP

White House's New National Cyber Strategy: Dramatic Changes for Government Contractors

Holland & Knight LLP on

• President Donald Trump recently unveiled a new National Cyber Strategy (Strategy) that centers on four pillars of priority. • The Strategy includes two main areas of impact to government contractors – "Strengthen Federal...more

Akin Gump Strauss Hauer & Feld LLP

Six Recent Government Supply Chain Risk and Cybersecurity Initiatives

• DoD and other government agencies will scrutinize contractors’ supply chain security plans and programs from proposal submission to contract closeout. • The 2019 NDAA as approved by Congress and DHS initiatives highlight...more

Robinson+Cole Data Privacy + Security Insider

NIST Releases Update to Cybersecurity Framework

The National Institute of Standards and Technology (NIST) has issued an update to its Framework for Improving Critical Infrastructure Cybersecurity, which includes information relating to managing supply chain risks,...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide