News & Analysis as of

Risk Mitigation Data Protection Ransomware

Robinson+Cole Data Privacy + Security Insider

HC3 Issues Threat Reports on Qilin + MoveIt

The Health Sector Cybersecurity Coordination Center (HC3) provides timely updates to the health care sector on cybersecurity threats and mitigation. In the last several weeks, HC3 has issued two alerts worth paying close...more

Kennedys

[Webinar] Days of reckoning: How to prepare for, respond to, and recover from ransomware and other cyberattacks - June 27th, 2:00...

Kennedys on

Kennedys and Booz Allen Hamilton are delighted to invite you to our 3 hour webinar on Thursday, June 27, 2024. This half-day seminar features three presentations: Clear and present danger, In the war room, and The fallout....more

Kennedys

[Webinar] Ransom-ready: Navigating recovery, remediation and legalities - June 4th, 11:00 am - 12:00 pm EST

Kennedys on

Kennedys and CYPFER are delighted to invite you to our 60 minute webinar on Tuesday, June 4, 2024. We will explore the practical and legal implications involved in navigating a ransomware event, and how decision-making in a...more

Robinson+Cole Data Privacy + Security Insider

New Threat: Scattered Spider International Coalition of Hackers

Cyber adversaries in China and Russia continue to be a formidable threat to U.S. based companies. In the past, scams might be detected because a word was misspelled or the context didn’t make sense. Now, with the help of...more

Manatt, Phelps & Phillips, LLP

[Webinar] Protecting Hospitals From Cyberattacks: New York’s Trailblazing Cybersecurity Requirements - January 30th, 1:00 pm -...

Hospitals, health systems and providers are targets of cyberattacks at an alarming rate, putting patient data, electronic infrastructure and, most importantly, patient lives at risk. The Department of Health and Human...more

WilmerHale

Building Ransomware Resilience - A Proactive Strategy for Businesses and Regulators

WilmerHale on

The rise of ransomware attacks has prompted the international community to explore a range of approaches to deter these attacks, including the use of sanctions, the further development and instantiation of norms governing...more

Manatt, Phelps & Phillips, LLP

[Webinar] Health Care Cybersecurity: Risks, Challenges and the Path Forward - March 8th, 2:00 pm - 3:00 pm ET

Hospitals, health systems and providers are targets of cyberattacks, putting valuable patient data and, more importantly, patient lives at risk. The Department of Health and Human Services’ Office of Civil Rights reported an...more

Polsinelli

Cybersecurity To-Dos in 2023

Polsinelli on

Introduction - The cybersecurity threat landscape continues to evolve and present new challenges pertaining to the protection of electronically stored information. Innovative “hacking” tactics constantly emerge and...more

BakerHostetler

DSIR Deeper Dive into the Data: Ransomware Front and Center

BakerHostetler on

There is no question that ransomware is here to stay. Thirty-seven percent of the matters we handled last year involved ransomware, compared to 27 percent of matters in 2020. ...more

Planet Depos, LLC

Protecting your Law Firm against Ransomware Attacks

Planet Depos, LLC on

Have you heard of ransomware? It is a term often in the news. Ransomware is a type of malware. For those who have heard of it but don’t know what exactly it is, malware is a type of software that is designed to disrupt,...more

Goodwin

Nonprofit Organizations and Data Security Incidents — How to Manage and Respond

Goodwin on

As the number of data breaches, security incidents, and ransomware attacks continue to rise, preparation has become even more important — and make no mistake, these attacks are happening to all types of organizations. These...more

Opportune LLP

Defense In-Depth: Cybersecurity For Energy

Opportune LLP on

Glenn Hartfiel, Principal, and Geoff Yut, Consultant, at Opportune LLP discuss why recent geopolitical events are heightening the need for the implementation of improved cybersecurity measures in the energy industry, why...more

NAVEX

Strengthening American Cybersecurity Act of 2022

NAVEX on

On March 1st, the United States Senate passed a historic cybersecurity bill with bipartisan and unanimous support. This bill impacts operators of federal infrastructure and federal civilian agencies. The Strengthening...more

Reveal

[Webinar] Preparing for data breaches: mitigate risk & avoid fines - March 31st, 10:00 am - 11:00 am CET

Reveal on

A data breach can be the result of a cyber/ransomware attack or an honest mistake. Either way, the potential impact of compromised data is huge. This impact can be financial (in the form of fines) and reputational (by...more

Fisher Phillips

Top 5 Data Security and Privacy Trends Revealed by Feds – and 5 Proactive Steps Employers Can Take Today

Fisher Phillips on

The United States Cybersecurity & Infrastructure Security Agency (CISA) recently issued a Joint Advisory providing an overview of 2021 ransomware trends, noting several key developments that employers should take note of. The...more

Robinson+Cole Data Privacy + Security Insider

Colorado Attorney General Issues Data Security Best Practices Guidance Document

The office of the Colorado Attorney General, Phil Weiser, recently issued a data security best practices guidance document as part of his office’s role in “implementing and enforcing data security and data privacy laws.” In...more

Bond Schoeneck & King PLLC

Mitigating Risk & Impact of Ransomware Attacks in Healthcare Sector

How do you get ahead of a ransomware attack in the healthcare delivery environment? By acting, now. A quick way to organize? Look at the 405(d) group’s work, including its recently released ransomware infographic....more

Lowenstein Sandler LLP

The Flaw in Log4j and How It Can Impact Your Business

Lowenstein Sandler LLP on

A major vulnerability (known as Log4j or Logshell) within Java-based applications is impacting millions of applications around the world. This issue affects most industries and is very dangerous if applications are not...more

American Conference Institute (ACI)

[Event] U.S. Export & Reexport Compliance For Canadian Operations - January 26th - 27th, Toronto, ON, Canada

The Canadian Institute’s 11th Annual Forum on U.S. Export & Re-Export Compliance for Canadian Operations will take place in Toronto on January 25–27! IN-PERSON and LIVESTREAM options available. Over the last decade, this...more

Health Care Compliance Association (HCCA)

Compliance Refresher: Get Cozy With IT Folks, Review Insurance, Fine-Tune Policies, Training

Report on Patient Privacy 21, no. 11 (November, 2021) - Attorney Brad Hammer doesn’t always don a suit and tie, or what he calls his “lawyer’s uniform.” A privacy and security expert and founder of the Vakaris Group based...more

Robinson+Cole Data Privacy + Security Insider

CISA/FBI/NSA Issue Two Joint Cybersecurity Alerts for Critical Infrastructure

The Cybersecurity & Infrastructure Security Agency, the Federal Bureau of Investigation, and the National Security Agency recently issued two joint alerts to critical infrastructure entities—one addressing BlackMatter...more

Womble Bond Dickinson

Hacking Is Changing: Should Our Data Security Change?

Womble Bond Dickinson on

In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago? The history of network and cyber security seems to be a...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2021 #3

Robinson & Cole LLP on

CYBERSECURITY - FBI, CISA + NSA Issue Conti Ransomware Advisory - On September 22, 2021, the Federal Bureau of Investigations (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security...more

Reveal

Healthcare Organizations Must Deal with their Shadow Information Problem

Reveal on

A myopic focus on protecting EMR (Electronic Medical Records) systems has left healthcare organizations open to shadow information risk. In a world where hackers and ransomware criminals are regularly compromising healthcare...more

Womble Bond Dickinson

Operational Technology: New Target For Network Security Obligations

Womble Bond Dickinson on

The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more

51 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide