Cybersecurity and Privacy

J.C. Boggs, King & Spalding, Partner and Dean C. Garfield, Information Technology Industry Council, President and CEO opened the 2017 Cybersecurity & Privacy Summit, hosted by King & Spalding on April 24, 2017.

Cyberinsurance and Vendor Follies Headline King & Spalding Cybersecurity Summit

By Gabrielle Orum Hernández |

Panelists hoped to bring clarity to risk management anxieties arising from the fast-changing cybersecurity market.

Will 'Draft Measures' Help Clarify Data Transfer Issues in China?

By Ed Silverstein |

The Chinese government says the data transfer Draft Measure clarifies the recently passed Cybersecurity Law, but companies may find some of the regulations potentially cumbersome.

Wolters Kluwer Aiming to Streamline Research into the Cybersecurity ‘Haystack’

By Zach Warren |

The new Cybersecurity & Privacy Law Suite provides curated news and enhanced searching capabilities for security-minded corporate legal professionals.

Information Governance: Law Firms' Cybersecurity Weak Spot

By Ian Raine, Cybersecurity Law & Strategy |

Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

Ex-New Jersey Judge, Colleagues Lose Bid to Dismiss Computer Hacking Suit

By Charles Toutant |

Former Essex County Superior Court Judge Carol Ferentz, Benjamin DelVento and DelVento's sons Benjamin Jr. and Matthew had moved to dismiss the suit by Maurice Donovan.

Aaron Tantleff, left, and Mark Krotoski, right.

Two Lawyers’ Forecast for Cybersecurity Regulations? Cloudy

By Joel Stashenko |

The lawyers discuss regulatory conflicts that may emerge between federal agencies and states as they grab pieces of cybercrime deterrence.

Preparing for Ransomware Attacks: Your Company Is a Target

By Ryan Bergsieker and Allison Chapin, Gibson Dunn |

Planning ahead is essential, and legal teams should consider these nine tips when assessing their companies' readiness.

legal computer judge concept, lady justice isolated on white, 3D illustration.

Getting Serious About Document Security Means Balancing Access and Productivity

By Tracie Sokol, Canon U.S.A |

The need for workflow security components goes much deeper than simply meeting compliance requirements.

Hacker Tries Extortion Plot vs. Apple, but Co. Says it Is Not Harmed; Here's What To Do

By Sue Reisinger |

While Apple says users are safe, the event underscores the importance for companies to be prepared for cyber events, says Alston & Bird partner.

Yahoo, Verizon Debacle Shines Light on M&A Cybersecurity

By Ed Silverstein |

These days, cybersecurity is 'a meaningful issue in almost every modern day M&A transaction,' said King & Spalding's Robert Leclerc.

5 Key Cyber Trends Dominating the Early 2017 Discourse

By Jason Straight, UnitedLex |

These talked-about trends span not only the progress made, but also the cybersecurity challenges that still lie ahead.

Counsel Face Major Challenges with Rise of the Internet of Things

By Rhys Dipshan |

In addition to heeding ever-changing regulations over Internet of Things devices, counsel must reckon with novel security and discovery burdens.

Legal Tech 'Crosses the Pond' In Spite of Brexit Vote

By Gabrielle Orum Hernández |

Despite uncertainty around last year's Brexit vote, legal technology companies continue to push operations into the U.K. market.

Law Firm Dodges Class Claims in First-of-Its-Kind Data Security Case

By Roy Strom |

Claims against Chicago-based Johnson & Bell for allegedly failing to protect client information must be heard individually in arbitration.

What Companies Need to Know About California Privacy Risk Mitigation

By Lothar Determann, Baker & McKenzie |

Companies should implement a privacy compliance program (or add California privacy law considerations to an existing program). Here's what they should entail.

John T. Araneo, General Counsel of Align.

The Evolution of a Cyber Lawyer: LTN Talks With Align's John Araneo

By Rhys Dipshan |

Araneo discusses his path to becoming cybersecurity counsel at Align, and what general counsel across the corporate world are underestimating about modern-day threats.

4 Key Legal Operations Lessons from This Year's LDO Survey

By Brad Blickstein, The Blickstein Group |

This year's survey sees shifts in e-discovery handling, metrics use and more.

FTC Commissioner Terrell McSweeny.

The Internet of Things: Transformative for Industry, Major Headache for Privacy

By Ian Lopez |

The FTC and Big Law weighed in on the ups and downs of IoT for security, privacy and consumers at New York Law School.

The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics

By Jerry Cohen, JAMS |

By following certain best practices and structures, lawyers and law firms can meet ethical standards for protecting client data.

Flight-Check Your Cloud Tech: 7 Security Questions to Ask Your Vendor

By Lisa Hawke, Everlaw |

With suitable care and the proper questions, you should be able to keep your law firm out of the data breach headlines.

Illustration by Val Bochkov

In Corporate Cyber-risk Planning, Legal Takes the Helm

By Ricci Dipshan |

A Legalweek panel explores practical approaches to security incident planning, and legal's pivotal role.

3 Risks (and Solutions) for Document Security in 2017

By Dean Sappey, DocsCorp |

Organizations have focused on securing the storage of documents, but little attention is paid to access and distribution of documents.

Inside the Federal Government's Latest Guidance on IoT Security

By Hanley Chew, Fenwick & West |

Companies need to be mindful of November guidance from DHS and NIST.


Hackers, Data Leaks, Encryption and Hidden Data Can Wreak E-Discovery Havoc

By Adam Feinberg, BIA |

As we enter 2017, here's how changes in cybersecurity may affect your e-discovery plans moving forward.

Andrew M. Cuomo

New York Governor Cuomo Promises New Cybersecurity Measures in 2017

By Joel Stashenko |

Among the measures is forming a "response team" when confidential information from state and local governments is breached.

Ashley Madison website.

Ashley Madison Data Breach Claims Should Be Arbitrated, Company Says

By Amanda Bronstad |

The plaintiffs counter Avid’s “shoddy record-keeping practices” made it difficult to know whether the plaintiffs signed arbitration agreements.

New FTC Contest Confronts 'Internet of Things' Security

By Marcia Coyle |

The agency has announced the latest in a series of cash-reward contests for solutions to protect personal data.

New York Delays Implementation of Cybersecurity Mandate by Two Months

By Joel Stashenko, New York Law Journal |

5 Cybersecurity Challenges for Enterprises in 2017

By Liisa Thomas, Winston and Strawn |

Winston and Strawn partner Liisa Thomas lays out a roadmap on challenges to face companies in the coming year.

Preet Bharara

Chinese Nationals Charged With Hacking Firms to Steal M&A Info

By Mark Hamblett, The Am Law Daily |

No Time to Waste: U.S. Companies Will Face European, Homegrown Privacy and Security Challenges in 2017

By Donald G. Aplin, Bloomberg Law |

A look at the GDPR “tidal wave,” FTC authority clarification and more security and privacy challenges to watch for next year.

Computer Hacking

Is 2017 the Year a Leak Sinks Your Firm?

By Dan Bressler, Intapp |

A look into the future for the lessons learned from the “hack” of one major firm.

GCs Are Questioning Their Outside Counsel About Cybersecurity

By Jennifer Williams-Alvarez |

The Johnson & Bell suit is a good reminder of the importance of questioning outside firms about their cybersecurity efforts.

Cloud computing.

6 Often-Overlooked Cloud Security Considerations

By William Kellermann, Hanson Bridgett |

A look at some less obvious but important considerations related to cloud security and why they are often overlooked.

Drone-Jacking and Other Threats: Cyber Veteran Alan Wernick on 2017's Security Landscape

By Ricci Dipshan |

While Wernick sees a more-complicated landscape for cybersecurity and drone issues, he also cites opportunities for developing technology and collaborating against cyberthreats.

concept of leaky software, data with a tap sticking out.

3 Key Cybersecurity Concerns for Department Operations Staff

By Brad Blickstein |

More than three-quarters of law departments are responsible for or meaningfully influence their companies' cybersecurity. Here's what to watch for.

Data Privacy Laws and Blocking Statutes: Practical Strategies for Counsel

By Ashish Prasad and Patrick Oot |

Data privacy laws and blocking statutes can seriously impact investigations and litigation that reach outside of U.S. borders.

Privacy and Data Security Top List of Questions for Legal Experts About Drones

By Gabrielle Orum Hernández |

Uncertainty continues for legal experts and policymakers around issues of privacy and data security raised by the influx of drones circling the skies.

Business Demands Overshadow Cybersecurity Needs at Law Firms, Survey Finds

By Ricci Dipshan |

As firms focus on meeting efficiency demands, experts advise looking at cybersecurity as a business risk.

Now’s the Time for Courts to Accept Digital Signatures

By Pem Guerry, SIGNiX |

After one California lawyer was sanctioned for using electronic signatures, the need for more efficient technology use is here.

Donald Trump.

Privacy, Cybersecurity Steady Spots in Trump Policy Uncertainty

By Ricci Dipshan |

A look at what the Trump administration's pro-security leanings mean for the future of privacy and cyberwarfare, and government surveillance.

Baker Donelson “Accelerates” Cybersecurity Startups

By Gabrielle Orum Hernández |

In building investment in Atlanta’s cybersecurity scene, the law firm found its second start-up partner in Authomate.

FireEye Wins Round in Shareholder Suit

By Ben Hancock |

The judge ruled alleged misrepresentations about the progress of the Mandiant merger amounted to "puffery."

People, Meeting, Risk Management

From Counsel to Keyboard: The Multipronged Approach to Cybersecurity Compliance

By Ian Lopez |

Pillsbury, FireEye and Thomson Reuters bet they’re better than the “patchwork of industry standards” currently guiding cybersecurity regulations.

Democratic National Committee headquarters, Washington, D.C.

Disinformation Campaigns in DNC Hacks Could Shift Threat Landscape for Enterprise Cybersecurity

By Gabrielle Orum Hernandez |

Key moments from the 2016 presidential election could predict the future of the data security landscape.

To Encrypt or Not Encrypt? The NYC Bar Weighs in on the Debate

By Ricci Dipshan |

A look at the rise of absolute encryption, the power of the Fourth Amendment and other encryption issues.

Client Data Security Obligations Begin With the Law Firm

By Timothy Opsitnick, TCDI |

No matter whether firms keep data in-house or work with third parties, certain cybersecurity controls should be in place.

3 Ways E-Discovery is Safer in the Cloud than On-Premise

By David Greetham, Ricoh USA |

Often, cloud service providers have stronger security options than those at law firms.

The Deal and The Data: 3 Ways Cybersecurity Is Changing M&As

By Ricci Dipshan |

M&A practitioners are increasingly expected to provide cybersecurity expertise and help steer companies clear of regulatory action.