Data Security
- Risk Mitigation
- Incident Response
- Litigation
Jan. 13, 2021
Checklist for IoT Security Audits
Jan. 13, 2021
Cybersecurity Resolutions for 2021
Nov. 4, 2020
A Guided Tour of Enterprise IoT Device Hazards
Jun. 17, 2020
The Current State and Future of AI Regulation
Apr. 8, 2020
Wide-Ranging Lessons From Notable Breaches in Q1
Apr. 1, 2020
When Do Force Majeure Clauses Excuse Performance?
Mar. 11, 2020
The Keys to Encryption: Legal and Regulatory Framework
Mar. 11, 2020
Privacy and Cyber Due Diligence in M&A Transactions
Feb. 12, 2020
Compliance Records Are a Strategic Gold Mine
Dec. 11, 2019
Not Just GDPR: Examining the Other European Privacy Laws
Dec. 11, 2019
How to Handle E.U. Data Subject Access Requests
Oct. 23, 2019
CFTC Issues $1.5-Million Fine After Phishing Attack
Sep. 11, 2019
Using “Red-Teaming” to Test and Improve Cyber Defenses
Jul. 17, 2019
Maine Enacts Sweeping Broadband Customer Privacy Law
Jun. 26, 2019
Preparing for the Latest SEC Cyber Sweeps
May 15, 2019
What Does It Mean to Be Technologically Competent?
Apr. 3, 2019
FCA Evaluates Firms’ Cyber Resilience
Mar. 13, 2019
Mitigating the Risks of Open-Source Software
Feb. 20, 2019
Fixing the Chinks in Companies’ Cyber Armor: Executives
Jan. 9, 2019
Ten Cyber and Privacy Resolutions for the New Year
Nov. 14, 2018
Negotiating SaaS Agreements
Oct. 10, 2018
Lessons From the SEC’s First Red Flags Rule Settlement
Sep. 26, 2018
Five Takeaways From the Fiserv Wake-Up Call
Mar. 28, 2018
Evaluating Cybersecurity Coverage in Light of the GDPR
Mar. 14, 2018
How Will the GDPR Affect Due Diligence?
Mar. 14, 2018
Developing an Effective Third-Party Management Program
Oct. 25, 2017
How to Outsource Vulnerability Assessments to Hackers
Sep. 13, 2017
Negotiating an Effective Cloud Service Agreement
Jun. 14, 2017
How Internal Audit Can Improve Cybersecurity
Jun. 14, 2017
Navigating the Evolving Cyber Insurance Market
May 31, 2017
Advice on Incorporating Cybersecurity in eDiscovery
May 17, 2017
Tracking Data and Maximizing Its Potential
Apr. 19, 2017
How to Ensure Cyber Risks Do Not Derail an IPO
Jan. 11, 2017
Ten Cybersecurity Priorities for 2017
Nov. 30, 2016
New NIST and DHS IoT Guidance Signal Regulatory Growth
Sep. 21, 2016
Staying Cybersecure Without Mobile Device Management
Aug. 24, 2016
Cybersecurity Due Diligence in M&A Is No Longer Optional
Jul. 20, 2016
Using Data Analytics to Combat Internal Cyber Threats
Jun. 8, 2016
Minimizing Class Action Risk in Breach Response
Feb. 17, 2016
Cybersecurity Preparedness Is Now a Business Requirement
Apr. 8, 2015
Ten Actions for Effective Data Risk Management
Jan. 13, 2021
Cybersecurity Resolutions for 2021
Jan. 13, 2021
Checklist for IoT Security Audits
Nov. 4, 2020
A Guided Tour of Enterprise IoT Device Hazards
Oct. 28, 2020
Ten Tips for Fighting Breaches Like Fires
Sep. 23, 2020
Identifying and Preventing Ransomware Attacks
Sep. 9, 2020
Action Steps to Respond to Ransomware Attacks
Apr. 8, 2020
Wide-Ranging Lessons From Notable Breaches in Q1
Apr. 1, 2020
Investigation Strategies During Social Distancing
Apr. 1, 2020
When Do Force Majeure Clauses Excuse Performance?
Feb. 19, 2020
Preparing for and Responding to Ransomware Attacks
Dec. 11, 2019
Not Just GDPR: Examining the Other European Privacy Laws
Oct. 23, 2019
CFTC Issues $1.5-Million Fine After Phishing Attack
Oct. 2, 2019
Preserving Customer Goodwill After a Breach
Sep. 11, 2019
Using “Red-Teaming” to Test and Improve Cyber Defenses
Jul. 31, 2019
Learning From the Equifax Settlement
Jul. 17, 2019
How to Establish an Efficient Incident Response Plan
May 29, 2019
Keeping CISOs and the C-Suite Off the Witness Stand
Feb. 20, 2019
Fixing the Chinks in Companies’ Cyber Armor: Executives
Jan. 16, 2019
Key Cyber Threats and Targets for 2019
Jan. 9, 2019
Ten Cyber and Privacy Resolutions for the New Year
Dec. 19, 2018
Interim Response Lessons From the Marriott Breach
Dec. 19, 2018
Ten Steps for Effective Crisis Communications
Sep. 26, 2018
Five Takeaways From the Fiserv Wake-Up Call
Jan. 11, 2017
FTC Priorities for 2017 and Beyond
Jan. 11, 2017
Ten Cybersecurity Priorities for 2017
Jul. 20, 2016
Checklist for an Effective Incident Response Plan
Jun. 8, 2016
Minimizing Class Action Risk in Breach Response
Feb. 17, 2016
Cybersecurity Preparedness Is Now a Business Requirement
Apr. 22, 2015
Steps to Take Following a Healthcare Data Breach
Jan. 22, 2020
How to Stem the Coming Tide of CCPA Private Litigation
May 29, 2019
Keeping CISOs and the C-Suite Off the Witness Stand
Jan. 30, 2019
Navigating Cloud Litigation’s Claims and Theories
Dec. 19, 2018
Interim Response Lessons From the Marriott Breach
Jan. 17, 2018
A Wake-Up Call: Data Breach Standing Is Getting Easier
Aug. 24, 2016
Takeaways From the FTC’s Revival of the LabMD Action
Jun. 8, 2016
Minimizing Class Action Risk in Breach Response
Nov. 11, 2015
Liability Lessons from Data Breach Enforcement Actions
Sep. 16, 2015
Privacy and Cybersecurity in Canada: Legal Risk Update
Most-Read Articles
-
Jan. 13, 2021
Cybersecurity Resolutions for 2021 -
Jan. 6, 2021
Six Practical Tips for Building an Effective Privacy Risk Assessment Program -
Jan. 6, 2021
Maintaining Privacy While Staying Competitive in an Evolving Regulatory Landscape -
Dec. 16, 2020
How Will the Biden Administration’s Approach to Cybersecurity Impact the Private Sector? -
Jun. 10, 2020
After Capital One Ruling, How Will Companies Protect Forensic Reports?
H&M’s Data Protection Fine
In this short video, we discuss Germany’s highest GDPR fine so far in a case against H&M relating to their mishandling of sensitive employee data. The full article on the case is here.
Summer 2020 Editorial Update
Register here to view the complimentary recording or here for an audio version.
CCPA and Third Parties
Editor-in-Chief Rebecca Hughes Parker discusses the California Attorney General’s final CCPA regulations and their effect on contracts with vendors in this video.