Topic: Cybersecurity

5 Ways to Prepare for a Cyber Attack

Is your business prepared for a cyber attack? It should be, writes Roberta Anderson of K&L Gates: “As the incidences of cyber attacks escalate, the costs associated with attacks are also increasing. In data breach cases, companies may incur substantial expenses relating to federal and state notification requirements… Companies may also face governmental and regulatory… Read more »

What Companies Should Do Now in Response to President Obama’s Cybersecurity Order [VIDEO]

[Link: How to Respond to President Obama’s Cybersecurity Executive Order] “Cybersecurity” is now front-and-center, thanks to Barack Obama’s executive order on the matter; but the president’s framework will take months to implement. In the meantime, what can business leaders do today to respond to the call for a framework to protect the nation’s critical infrastructure… Read more »

Cybersecurity and Data Protection in Europe: Latest Need-to-Know

“The European Network and Information Security Agency’s recent report on the cyber threat landscape highlights the vulnerability of network information system technologies, such as cloud computing and associated big data sets, where the concentration of vast amounts of data in few logical locations makes it an attractive target for cyber threat agents.” Do business in… Read more »

Obama Signs Cybersecurity Executive Order to Protect Nation’s “Critical Infrastructure”

“This Executive Order will begin a multi-year legislative and regulatory process that will result in new cybersecurity regulations, information sharing channels and changes in cyber liability for critical infrastructure and government contractors. These changes will create a number of opportunities and risks for companies in a wide range of private sector companies.” (Holland & Knight)… Read more »

[Video] Corporate Law Report: News to Use… Now

Welcome to our latest Corporate Law Report. You know the drill: Watch the video overview above and, for any topics that interest you, go deeper with the legal analysis and commentary below>> 1. Managing Cyber Risk Top Ten Ways To Manage Cyber Risk – Sherman & Howard L.L.C. 2. BYOD, But Leave the Risks Behind… Read more »

[Video] Corporate Law Report: News to Use Now

Welcome to 2013’s inaugural edition of the Corporate Law Report, a look at some of the top corporate news items we’ve been following this first week of the new year. You know the drill: Watch the video overview above and, for any topics that interest you, go deeper with the legal analysis and commentary below>>… Read more »

Senator Rockefeller to Fortune 500 CEOs: What’s In Your Cybersecurity Plan?

“Companies should be proactive and implement cybersecurity safeguards and policies now so that these protections are already in place by the time any regulatory action is taken.” (Mintz Levin) Earlier this month, Senator John D. (Jay) Rockefeller IV took his fight for greater cybersecurity preparedness directly to Corporate America. Senator Rockefeller is Chairman of the… Read more »

Medicine is Mobile. What Does That Mean for Security?

“New medicine is mobile, miniature and you can play angry birds on it. But what does that mean for security and privacy?” (Jo Ellen Whitney of law firm Davis Brown) The Massachusetts Eye and Ear Infirmary (MEEI) received a $1.5 million lesson in HIPAA and mobile device security earlier this month. Not because MEEI lost… Read more »

SEC Guidance on Disclosing Cybersecurity Risks

“In the past year, there were reports of cyber thieves hacking corporate networks to steal customer data from financial services firms and retailers, intellectual property from life sciences, technology and industrial companies and information regarding the location of major oil reserve from multinational oil companies. This proliferation of cyber attacks led to … interpretive guidance… Read more »

SEC to Public Companies: Disclose Your Cyber Risks

“For a number of years, [public companies] have migrated toward increasing dependence on digital technologies to conduct their operations. As this dependence has increased, the risks associated with cybersecurity have also increased, resulting in more frequent and severe cyber incidents… [W]e determined it beneficial to provide guidance that assists registrants in assessing what, if any,… Read more »