Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,258 results for "Cybersecurity Law & Strategy"...

Information Sharing for the Information Age
April 01, 2016
As 2015 drew to a close, Congress agreed on a federal budget. That simple act, coming on the heels of a series of contentious continuing resolutions, was big news. But tucked away on page 694 of that 887-page bill was perhaps a more significant achievement. There Congress inserted, passed, and the President signed, the Cybersecurity Act of 2015.
CFPB Takes Step Into Cybersecurity Regulation
April 01, 2016
The Consumer Financial Protection Bureau (CFPB) has fired a shot across the bow of the burgeoning online-payment industry, taking an enforcement action this week that marked the agency's first foray into regulating cybersecurity.
<b><i>Online Extra:</b></i> Cybersecurity Professionals Apprehensive on Government Access to Encrypted Data
March 31, 2016
A recent survey of security professionals takes these concerns to a new level, with 81% of respondents reporting they think it's 'very likely' or 'certain' that hackers can take advantage of the government's capability to access encypted data.
<b><i>Online Extra:</b></i> Dozens of Big Firms Targeted by Hacker Seeking M&A Info
March 31, 2016
For several years law firms have been a key target for hackers seeking to obtain confidential information about initial public offerings, intellectual property and M&amp;A deals, claim cybersecurity consultants, but rarely does word about specific attacks become public.On March 29, Crain's Chicago Business reported that 48 top firms, most of which appear in the Am Law 100 rankings, were targeted recently by a Russian hacker living in Ukraine seeking to trade on M&amp;A information stolen from law firms.
Data Breach Liability
February 29, 2016
Today's legal departments are undergoing fundamental changes thanks in part to the imminent threat of ongoing cyberattacks. Given the massive breaches at some of the world's visible brands, it is increasingly clear that cybersecurity can no longer be regarded as the exclusive domain of IT.
Top Security Intrusion Trends the Legal Community Should Watch
February 29, 2016
Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters that include privacy compliance, contract compliance, data breach response, data breach litigation, M&amp;A due diligence, and insurance coverage. As a result, it is important that lawyers understand the latest trends in cyber intrusions that may expose their stakeholders to unwarranted risk and allow adversaries to exploit technical and human vulnerabilities.
Top Security Intrusion Trends the Legal Community Should Watch
February 29, 2016
Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters. Legal counsel, as trusted neutral advisors, are uniquely qualified to help navigate risk considerations and bridge customer deliverables and workforce expectations with adequate security and shifting legal requirements. As a result, it is important that lawyers understand the latest trends in cyber intrusions.
A 'Cloud Security Doctrine' for Law Firms
February 29, 2016
Cloud computing may be here to stay, but is it truly safer than the solutions that it's outmoding? The Legal Cloud Computing Association (LCCA) thinks there's a path to greater security, publishing for law firms its first "Cloud Security Doctrine."
<b><i>Online Extra:</b></i> FDIC Chimes In on Cybersecurity
February 29, 2016
The Federal Deposit Insurance Corporation is the latest entity to release a framework for cybersecurity.
How Startups Can Protect Consumer Privacy and Enhance Cybersecurity
January 31, 2016
Many startup businesses collect and store vast amounts of personally identifiable information (PII) from consumers, but often fail to adequately protect the privacy of this consumer information. There could be many reasons for this, but it is likely the result of limited budgets and priorities.

MOST POPULAR STORIES