By now, everyone knows that the Internet can be a dangerous place. But while just about everyone knows about the pervasiveness of Internet scams, many users still fall prey to the tricksters’ latest ploys. In this guest post, Paul Ferrillo and Randi Singer of the Weil, Gotshal & Manges law firm take a look at
Cyber Liability
Guest Post: Cybersecurity Enforcement: The FTC Is Out There
Along with the disruption and the reputational damage, a company experiencing a data breach can also find itself attracting the unwanted attention of regulators. Among the federal regulators that has proven to be active in data breach arena has been the Federal Trade Commission. In the following guest post, Robert Carangelo, Eric Hochstadt…
Guest Post: Is Employee Awareness and Training the Holy Grail of Cybersecurity?
In the current environment, most organizations are aware of the potential threats to their firms from a breach of their data systems and networks. Among the ways companies can protect themselves from these types of threats is through improved employee awareness and training. In the following guest post, Paul Ferrillo and Randi Singer of the…
Guest Post: The Key Players in Cybersecurity Investigations
One of the most immediate challenges when a company experiences a data breach is trying to figure out what has happened – how the breach occurred and how serious it is. Determining what has happened is also critical to re-establishing the company’s cybersecurity. In the following guest post Robert F. Carangelo and Paul A. Ferrillo…
Guest Post: Cybersecurity and Privacy Diligence: Incident Response and Business Continuity Planning
The disclosure of yet another massive cyber breach at yet another company has become a weekly occurrence. These recurring events have a number of implications, which include not only what companies need to do to try to prevent these kinds of events, but also how companies need to prepare in order to be able to…
Guest Post: Hack to the Future: Ten Cyber Risk Developments Watch in 2015
Without a doubt, during 2014, cyber security emerged as one of the critical topics for discussion. In the following guest post, Bill Boeck, who is senior legal and claim resource worldwide for cyber and executive risk coverages and claims at Lockton Financial Service, takes a look at the top cyber risk developments to watch in…
As Part of White House Cyber Security Initiative, President Proposes Uniform Data Notification Rules
As previously discussed on this blog (refer for example here), over the years there have been a number of different responses from the federal government to the threat of cyberattacks on U.S. companies and infrastructure, but overall the government’s track record on the issue is mixed. However, according to a January 12, 2015 Wall …
Guest Post: Changing the Cyber Security Playing Field in 2015
As I have noted in a number of recent posts, there have been a host of significant cyber security developments, including among the Sony Pictures Entertainment hack attack. These developments have a number of important implications for the cyber security arena in the year ahead. In the following guest post, Paul Ferrillo of …
Will Investors Sue Over the Sony Hack Attack?
As I noted in my recent rundown of the top D&O stories of 2014, one of the most important developments during the year just finished was the emergence of cyber security as a D&O liability concern. During 2014, plaintiff shareholders launched cyber breach-related derivative lawsuits against the boards of Target and Wyndham (about which refer …
That Time the Entire Cyber Security Exposure Narrative Changed
The hack attack on Sony Pictures Entertainment was massive, and it had a devastating effect on the company. As detailed in the December 30, 2014 Wall Street Journal article entitled “Behind the Scenes at Sony as Hacking Crisis Unfolded,” (here), the hackers who attacked Sony’s systems didn’t just pilfer the company’s data — …