News & Analysis as of

Security Risk Assessments Data Security

Benesch

China Officially Promulgates New Cross-Border Data Transfer Requirements

Benesch on

The newly promulgated measures increase the threshold of data triggering security assessments and contract requirements while leaving room for Chinese authorities to heavily restrict cross-border data transfers. In...more

Dorsey & Whitney LLP

Navigating Data Breach Notification and Prevention in Hong Kong: A New Comprehensive Guide in Hong Kong

Dorsey & Whitney LLP on

In June 2023, the Privacy Commissioner for Personal Data in Hong Kong (the “Commissioner”) released a new guidance note on data breach handling and notifications (the “Guidance Note”). The purpose of this note is to assist...more

BakerHostetler

2023 DSIR Report Deeper Dive into the Data

BakerHostetler on

We’re back with a deeper dive into the 2023 Data Security and Incident Response Report, which features insights and metrics from 1,160+ incidents in 2022. This episode dives deeper into the data, including ransomware and...more

Latham & Watkins LLP

Hong Kong Issues Guidance on Data Breach Handling and Notifications

Latham & Watkins LLP on

The guidance encourages organisations to formulate a data breach response plan, and outlines recommendations for handling an increasing number of data breach incidents. On 30 June 2023, the Office of the Privacy...more

Nextpoint, Inc.

Modern eDiscovery Solutions: The Case for the Cloud in 2023

Nextpoint, Inc. on

While the cloud has become commonplace in our everyday lives, many legal teams are still missing out on the benefits of cloud-based ediscovery software. As of 2021, there is a 50/50 split between ediscovery solutions...more

Morgan Lewis

SEC Proposes Cybersecurity Incident Reporting and Broker-Dealer Cyber Risk Management Requirements

Morgan Lewis on

The US Securities and Exchange Commission (SEC) issued a notice of proposed rulemaking (the Proposal) on March 15 that would require SEC-regulated investment advisers, investment companies, and broker dealers to provide...more

HaystackID

[Webinar] Today’s Privacy Reality: AI, Assessments, Breach and DSARs - February 15th, 12:00 pm - 1:00 pm EST

HaystackID on

Today’s Privacy Reality: AI, Assessments, Breach and DSARs is a webcast that will bring together a panel of experts to discuss the impact of artificial intelligence (AI) on privacy and cybersecurity. The panel will address...more

MoFo Tech

AI Trends For 2023 - AI Diagnostic Tools And Cybersecurity Risk

MoFo Tech on

Cybersecurity is a key risk factor for emerging applications of artificial intelligence to medical devices. Products failing to address security risks may leave themselves vulnerable to cyberattacks. Bad actors target...more

Benesch

As China Cross-Border Data Transfer Security Assessment Requirement Comes Into Effect, New Guidelines Posted for Security...

Benesch on

The new guidelines provide insight into how businesses can submit applications to the CAC in order to obtain approval via the CAC security assessment cross-border data transfer requirement. As of September 2022, all...more

Linda Liu & Partners

China’s Security Assessment Measures for Outbound Data Transfers and Understanding on the Application Guidelines

Linda Liu & Partners on

The much-anticipated Security Assessment Measures for Outbound Data Transfers (hereinafter referred to as "the Measures") of China has already come into effect on September 1, 2022, and on the eve of the effective date, the...more

Mitratech Holdings, Inc

[Webinar] How to Manage Cybersecurity Maturity in Your Supply Chain - October 5th, 10:00 am EST

Join Mitratech & Escrypt in this electrifying new webinar on strengthening cybersecurity maturity. As local and global automotive cybersecurity regulations, standards, and guidelines increase in complexity, organizations are...more

BakerHostetler

2022 DSIR Deeper Dive: Vendor Incidents

BakerHostetler on

Vendor-caused incidents continued to surge in 2021. Nearly 20 percent of the total incidents we handled last year were caused by vendors, with more than half requiring notification....more

Moore & Van Allen PLLC

SEC Announces Exam Priorities for 2022

On March 30, 2022, the U.S. Securities and Exchange Commission’s (“SEC”) Division of Examinations released its exam priorities for fiscal year 2022 (the “2022 Priorities”). As in years past, these exam priorities naturally...more

Guidepost Solutions LLC

Guidepost in Motion - Cybersecurity Frameworks and Metrics Part 2

Ken Mendelson welcomes back Andy Cottrell, the founder and CEO of cybersecurity consulting firm Truvantis to talk more about cybersecurity frameworks. They discuss the difference between a cyber audit and cyber assessment and...more

NAVEX

Strengthening American Cybersecurity Act of 2022

NAVEX on

On March 1st, the United States Senate passed a historic cybersecurity bill with bipartisan and unanimous support. This bill impacts operators of federal infrastructure and federal civilian agencies. The Strengthening...more

Foster Garvey PC

Happy Data Privacy Day – What Are You Doing to Keep Your Data Secure?

Foster Garvey PC on

Data Privacy Day is celebrated on January 28 each year to raise awareness about the importance of respecting privacy, safeguarding data and enabling trust. In honor of Data Privacy Day, now is an ideal time to review your...more

Lighthouse

Cybersecurity Defense: Recommendations for Companies Impacted by the Biden Administration Executive Order

Lighthouse on

As summarized in the first installment of our two-part blog series, President Biden recently issued a sweeping Executive Order aimed at improving the nation’s cybersecurity defense. The Order is a reaction to increased...more

Society of Corporate Compliance and Ethics...

Debra Geroux and Scott Wrobel on Responding to Data Breaches

When a data breach occurs, one step is often overlooked in the rush to remediate: preserving as much of the data logs and backups as possible That’s a mistake, say Debra Geroux, Shareholder at Butzel Long and Scott Wrobel,...more

Reveal

Ramping Up Cloud Usage for Government Agencies

Reveal on

As the COVID-19 pandemic and social distancing enforced remote work only accelerated the move to the cloud for many organizations, it should come as no surprise that the use of cloud-based solutions continues to be on the...more

Pillsbury Winthrop Shaw Pittman LLP

Congress Requires Foreign Ownership Disclosures for Federal Government Tenancies of “High-Security Leased Spaces”

Federal government lessees seeking to occupy high-security spaces in foreign-owned buildings will be required to obtain complete beneficial ownership and impose access restrictions on owners and property managers. The...more

Proskauer - Minding Your Business

Cybersecurity: A Guide to Preparing for and Responding to a Breach

A cyber breach can have serious legal, financial, and reputational consequences for a company, as described in our previous post. As such, cybersecurity threats must be treated as business risks, not just a potential IT...more

Proskauer - The Capital Commitment

Private Equity and Cybersecurity: A Guide to Preparing for and Responding to a Breach

A cyber breach can have serious legal, financial, and reputational consequences for a fund sponsor, as described in our previous post. As such, cybersecurity threats must be treated as business risks, not just a potential IT...more

Barnea Jaffa Lande & Co.

Protect Your Business by Learning How to Handle Data

We are living in the age of data and big data, where everyone wants to collect as much information as possible. The ability to analyze and monetize such information is a key strategy and selling point for many businesses. ...more

Proskauer Rose LLP

OCIE Publishes Cybersecurity and Resiliency Observations

Proskauer Rose LLP on

Background - On January 27, 2020, the U.S. Securities and Exchange Commission's Office of Compliance Inspections and Examinations ("OCIE") published its Cybersecurity and Resiliency Observations. Cybersecurity and data...more

Sheppard Mullin Richter & Hampton LLP

New Trends Emerge in FTC Data Security Orders, Including Emphasis on C-Suite Involvement

The FTC recently summarized three major changes it made to its orders in data security cases. In a blog signaling these changes, the FTC Indicated that some of the things it has been requiring of companies in 2019 are here to...more

78 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide