GDPR. NIST CSF. NY DFS. These acronym laws and standards can be maddening to navigate clearly for legal and compliance teams. Particularly when the threat landscape is ever evolving, and the threat actors - from outside and within - are unrelenting. This is why we have designed these sessions as an opportunity for...
Cyber threats pervade almost every aspect of our lives today creating risks that have huge potential impacts on legal and compliance matters. Should we be more concerned? Should we be more aggressive in our pursuit of solutions? Join Dr. Ed Amoroso, former CISO of AT&T and current CEO of TAG Cyber, as he walks us...
As cyber threats grow and regulatory regimes strengthen, global enterprises increasingly are in search of a common cybersecurity framework to improve their abilities to be both secure and compliant. At the heart of this discussion is the NIST Cybersecurity Framework, which has emerged as a de facto global standard....
Creating a cybersecurity incident response plan is a fundamental requirement of any cybersecurity program - and a requirement of many global regulations, including GDPR and PCI DSS. During this workshop, Troutman Sanders partner Ron Raether will discuss the benefits of table top exercises. He then will explain how to...
Smart cities contain IT, OT and IIOT environments at different scales, which are dependent on each other at variant degrees, but not managed centrally. The Global Cyber Alliance will explore the systemic risk and legal/compliance challenges that come with securing smart city initiatives and how they can be addressed....
Since 2011, the US federal government has required agencies to establish insider threat detection and prevention programs. What are the elements of a successful insider threat program, and how can these help non-government entities improve their own defenses and regulatory compliance? The CERT Insider Threat Center at...
British Airways, Panera Bread and Facebook/Cambridge Analytica have been among the year's highest-profile breaches. But beyond the headlines and reputational damage, what are the legal realities of a major data breach? And what are key elements of a breach investigation that you must know before, during and after...
As of March 1, 2019, the two-year transition comes to an end, and covered entities are required to be in compliance with the New York Department of Financial Services Cybersecurity Regulation Section 500.11, the Third Party Service Provider Security Policy. What are the key requirements of this section, and how might...
In October of 2018, the banking industry unveiled its new Cybersecurity Profile to help financial institutions develop and maintain cyber risk management programs. This groundbreaking document - the culmination of two years' work - marries the NIST Cybersecurity Framework with the finance sector's highly complex...
Digital commerce is now the business of big data science. To combat cyber threats like the exposure of Personally Identifiable Information (PII), solutions need to keep pace with fraudsters through prevention and quick response when attacks happen.
The application of artificial intelligence and machine learning...
We've spent countless hours and dollars getting ready for the arrival of the EU'S GDPR and then its enforcement deadline. In the months since the May 25th enforcement date, what's actually changed? How have companies reacted? What should we expect going forward in the EU, and in North America? Has it been all bark and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.