News & Analysis as of

Supply Chain Incident Response Plans

Parker Poe Adams & Bernstein LLP

Key Lessons for Cybersecurity and IT Leaders From Judge's Recent Fraud Decision in SEC Case Against SolarWinds

On July 18, a New York federal judge threw out most of the SEC’s claims brought against both SolarWinds Corp. and the company’s chief information security officer (CISO), Timothy Brown....more

Foley & Lardner LLP

Combatting Supply Chain Cyber Threats: Safeguarding Data and Protecting Digital Supply Chains

Foley & Lardner LLP on

As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more

Foley & Lardner LLP

Introduction: What is Supply Chain Management?

Foley & Lardner LLP on

Share on Twitter Print Share by Email Share Back to top In recent years, viral videos featuring a surprising topic have racked up millions of views on social media. Not videos of a celebrity doing something outrageous, a...more

Epiq

Data Breaches up 72% From Record High: Cyber Incident Readiness Must be Top of Mind

Epiq on

“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more

Spilman Thomas & Battle, PLLC

The Site Report - Construction Industry Insights, Issue 3, March 2024

Welcome to our third issue of 2024 for our construction industry insights e-newsletter - The Site Report. In honor of last week’s Women in Construction Week, last Friday’s International Women’s Day, and Women’s History...more

Baker Donelson

Top Privacy and Cybersecurity Issues to Track In 2024

Baker Donelson on

In recognition of International Privacy Day on January 28, we wanted to share some insights on the top privacy and cybersecurity issues for the new year. Data privacy and cybersecurity will continue to be one of the most...more

Davis Wright Tremaine LLP

CISA, UK NCSC, and 17 Other Countries Issue Landmark Joint Guidelines for Secure AI System Development

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the UK National Cyber Security Centre (UK NCSC), along with partner agencies from 17 nations, have released Guidelines for Secure AI System Development (the...more

J.S. Held

Water Cybersecurity? EPA Mandates Regulations to Prevent Cyberattacks on Public Water Systems

J.S. Held on

EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more

Shook, Hardy & Bacon L.L.P.

Are You Involved in the Consumer Product Supply Chain? It's Time To Bring Your Practices in Line with New UK Product Safety Codes

Now is the time for businesses to spring clean their Product Safety Incident Plan, create a new Product Safety Management Plan and review their pre-market product safety compliance procedures in light of several new and...more

Lighthouse

Cybersecurity Defense: Biden Administration Executive Order a Great Start Towards a More Robust National Framework

Lighthouse on

On May 12, President Biden issued a landmark Executive Order (“the Order”) aimed at improving the country’s cybersecurity threat defense. This Order is an attempt to create a “whole of government” response to increasingly...more

Goodwin

Biden Executive Order Likely to Push Private Sector Forward on Cybersecurity

Goodwin on

On May 12, President Biden signed an Executive Order on Improving the Nation’s Cybersecurity. The order comes on the heels of a number of recent widely reported cybersecurity crises, including the Solar Winds and Microsoft...more

Hogan Lovells

NYDFS recommends critical new practices to reduce supply chain risk in wake of SolarWinds attack

Hogan Lovells on

On April 27, 2021, the New York State Department of Financial Services (“DFS” or the “Department”) released a report regarding its investigation into the response by DFS covered entities to the SolarWinds supply chain attack....more

Proskauer - New Media & Technology

How to Respond to the SolarWinds “Orion” Supply Chain Attack

As reported last week, it appears that a state-sponsored security hack has resulted in a major security compromise in widely-used software offered by a company called SolarWinds. The compromised software, known as Orion, is...more

Hogan Lovells

Life Sciences and Health Care Horizons - 2020

Hogan Lovells on

We are pleased to provide you with the third annual installment of our Life Sciences and Health Care Horizons guide. For each of these guides, we have asked our industry thought leaders throughout the world to write about...more

Society of Corporate Compliance and Ethics...

The coronavirus provides an opportunity to hone crisis response plans for the next big challenge

Report on Supply Chain Compliance 3, no. 4 (February 20, 2020) - The coronavirus that has, at the time of writing, infected more than 40,000 people around the world and killed more than 1,000, is also ravaging...more

Stinson - Government Contracting Matters

Addressing the Impact of the Coronavirus on the Public Sector Supply Chain

At the end of December, China acknowledged the existence of the coronavirus. We don’t know how long it has been around or how many people have actually contracted the virus. We do know the virus has spread at an alarming rate...more

Benesch

New PHMSA Lithium Ion Battery Rule Seeks Harmony in the Safe Skies

Benesch on

Safety hazards presented by the air transportation of lithium ion batteries are once again the subject of regulatory action in the United States. The U.S. DOT’s Pipeline and Hazardous Materials Safety Administration (PHMSA)...more

Robinson+Cole Data Privacy + Security Insider

Think Like a Hacker

I was with a bunch of CFOs this week talking about cybersecurity and I told them how easy it is for hackers these days. They can infiltrate a company’s system by compromising an O365 account that doesn’t have multi-factor...more

Benesch

Beyond Care, Custody, and Control: Data Security Best Practices for the Transportation and Logistics Sector

Benesch on

The receipt, storage, and handling of sensitive shipper data occurs, often frequently and in real-time, alongside the flow of goods. Commercial shippers are well aware of the supply chain security risk to the materials and...more

Foley & Lardner LLP

The Top Six Takeaways from Auto-ISAC's and NHTSA’s Cybersecurity Best Practices

Foley & Lardner LLP on

As cars continue to rely more and more on systems that closely resemble those that run mobile phones and personal computers, it’s no surprise that the original equipment manufacturers (OEMs) and suppliers of car parts need to...more

20 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide