Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Countless organizations have devoted considerable amounts of resources and time building cybersecurity defenses in the last decade. However, efforts to build secure supply chain networks have only begun in recent years. Indeed, it was not until the April 2021 compromise of SolarWinds software that led to a swath of intrusions across government entities and various industries that attacks on supply chain networks became a common concern within the C-Suite. The heightened threat to distribution networks compelled attorneys, among other professionals, to rethink how best to protect existing infrastructure and allocate risks. This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.
Unlike typical cyberattacks, a supply chain infiltration requires more sophistication and patience than a script kiddie, phishing scam, or brute force attack. However, while it is still possible that a supply chain cyberattack may commence as a typical phishing scam, the sophistication of a supply chain infiltration comes into play after the initial intrusion. To successfully execute this type of attack, the actor must remain undetected in the organization's technology infrastructure and move across different software to access the systems where the victim's data or code resides. The level of sophistication required to stay hidden, combined with the prolonged waiting periods while surveying the systems and devising a compromise plan, leads to the inevitable conclusion that a nation-state actor often conducts such attacks.
The DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.
The parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.
This article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.
There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
Active reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.