Don’t forget you can visit MyAlerts to manage your alerts at any time.
Coverage across state and federal laws and international cybersecurity regulations as well as the measures and technologies used to comply with them. Also cover breaches impacting law firms and find the legal angle for those covering corporations. Litigation ensuing from breaches is covered as well.
By Brian Collins | June 6, 2017
The increased prevalence, and awareness, about cyberattacks should surprise no one. Cybersecurity breaches against businesses and political entities within the last several years has brought the issue from a niche focus into the broader strategic focus of most organizations.
1 minute read
By Nicholas A. Pasciullo | June 6, 2017
A company's supply chain is an integral and sometimes complicated part of its business. As companies optimize their supply chains using interconnected technology, the cyberrisk of disruption and lost business multiplies.
1 minute read
By Melanie Bork Graham and Leeza Garber | June 6, 2017
We are currently witnessing the most expansive digitization of health care in history (Professor Jonathan Weiner, Johns Hopkins School of Public Health, September 26, 2014; Graham, M.B., Thomas Jefferson School of Population Health Capstone Proposal, July 2016).
1 minute read
By Abraham J. Rein | June 6, 2017
Cloud computing, virtually nonexistent 15 years ago, is now verging on being the rule rather than the exception in the business world. According to the Gartner technology research firm, by 2019, more than 30 percent of the 100 largest vendors' new software investments will have shifted from cloud-first to cloud-only, and by the year 2020, a corporate "no-cloud" policy will be as rare as a "no-internet" policy is today.
1 minute read
By thelegalintelligencer | The Legal Intelligencer | June 6, 2017
In the Legal's Cybersecurity supplement read about health care and cybersecurity, cyberinsurance for businesses and data security hazards and how to avoid them.
1 minute read
By Ned Dunham | June 6, 2017
Had enough? If you believe everything you hear, you would be forgiven for concluding that cyberspace is so full of threats that you should shut down all online electronic communications and storage.
1 minute read
By Yelena Barychev | June 6, 2017
The Global Risk Management Survey, which surveyed 2,000 public and private companies across a wide range of industries, places cybercrime/hacking/viruses/malicious codes as the fifth risk globally and the top risk in North America. The survey also projects that the risk of cybercrime will stay at these levels in 2020. Since the cyberrisk is clearly on companies' radar screens and not going away in the near future, boards of directors need to establish an effective governance structure to oversee cybersecurity matters and monitor management's plans and progress in this critical area. An effective oversight mechanism can also serve as a good defense of a board's business judgement in the event of a cyberbreach and related lawsuits claiming that directors breached their fiduciary duties.
1 minute read
By Jared Coseglia, Cybersecurity Law & Strategy | June 5, 2017
If the history of e-discovery is the future of cybersecurity, then what should one expect for the future of e-discovery? How long will the current period of consolidation continue? What will be the next chapter in e-discovery's never-ending reinvention? How closely will the next 10 years of cybersecurity job trends mirror e-discovery's past?
1 minute read
By Benjamin Dynkin, Barry Dynkin and Daniel Garrie | June 5, 2017
Benjamin Dynkin, Barry Dynkin and Daniel Garrie write: Whether an action amounts to an Act of War under the international law of cyber warfare is a complex, intricate, legal question with serious political and military implications. It is not a vague, abstruse general term that can be filled with any meaning that might be politically expedient.
1 minute read
By newyorklawjournal | New York Law Journal | June 5, 2017
In this Special Report: "Westworld, Skynet … There Might Be Insurance for That!," "What to Expect From the SEC's New Cyber-Savvy Chair," "Prosecuting Cyber Crime: An Overlooked Part of Bharara's Legacy," "Blockchain: The Key to True Cybersecurity?," "Deal Breakers: The Importance of Privacy and Security Due Diligence in Transactions," "New DFS Cybersecurity Regulations Are Here: Will Your Insurance Protect You?" and "Is Your Discovery Process Setting You Up for a Data Breach?"
1 minute read
Presented by BigVoodoo
The Legal Intelligencer honors lawyers leaving a mark on the legal community in Pennsylvania and Delaware.
Consulting Magazine recognizes leaders in technology across three categories Leadership, Client Service and Innovation.
Celebrate outstanding achievement in law firms, chambers, in-house legal departments and alternative business structures.
We are seeking an associate to join our Employee Benefits practice. Candidates should have three to six years of employee benefits experienc...
Associate attorney position at NJ Immigration Law firm: Leschak & Associates, LLC, based in Freehold, NJ, is looking for a full time ass...
Seeking a compassionate and experienced estate administration attorney for growing boutique estate planning and elder law practice. Huge eq...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS