Cybersecurity and Privacy

screenshot of a fake legal firm website.

Online Imposters Add to Law Firms' Cyber Risks

By Lizzy McLellan |

More law firms are learning that they aren't immune from identity theft.

Cheryl Davis,  managing director , FTI Consulting

Former NSC Cybersecurity Policy Director Explains the ‘Partnerships’ of Government Cybersecurity

By Ian Lopez |

On the heels of a move to FTI Consulting, Cheryl Davis chats on her career, cyber policies and her move to the private sector.

Lawyers Discuss 'What's Next' After China Shuts Down Cryptocurrency Exchange

By Ed Silverstein |

‘Many industry people believe the government’s ban will effectively extinguish the hope that China becomes a global center of cryptocurrency,’ attorney Pinghsan Li said.

When Products Start Teaching Cybersecurity Process

By Jared Coseglia, TRU Staffing Partners |

New Nuix cybersecurity training and certification point to pivot not only in company but in community at large.

NY's New Cybersecurity Regs for Banks, Insurers Take Effect

By Josefa Velasquez |

Banks, insurance companies and other financials services providers will have to comply with groundbreaking new cybersecurity rules established by the state Department of Financial Services starting Monday, Aug. 28.

Buoyed by Law Firm Cybersecurity Demand, eSentire Announces Sizable Investment

By Rhys Dipshan |

The cybersecurity company's investment comes as law firms are expressing greater interest in manager detection and response services.

8th Circuit Finds Standing in Data Breach, but Tosses Claims as 'Bare Assertions'

By Amanda Bronstad |

The panel found that Matthew Kuhns had standing to bring breach-of-contract claims against Scottrade, but affirmed dismissal of the case on different grounds brought up on appeal.

Panelists at a cybersecurity discussion during the ABA annual meeting, from left, Rishi Bhandari, Joseph Lawlor, Craig Newman, Edward Kim and Rachel Nguyen

2017 Bonuses Revealed! (Just Kidding: You've Been Hacked)

By Christine Simmons |

At an ABA discussion on law firm cybersecurity threats, one panelist said his security company tricked 85 percent of an organization's employees to click on a fake phishing email about bonuses. Another had a simple cybersecurity lesson for lawyers: Don’t forget your laptop on the plane.

Disney, App Partners Hit With Suit Under Child Privacy Law

By Ross Todd |

Disney and three software companies were hit with a class action complaint Thursday claiming Princess Palace Pets violates a federal law designed to protect children's privacy while online.

3 Unanswered Regulatory Cybersecurity Questions GCs Should Watch

By Rhys Dipshan |

From FTC oversight to state breach laws, questions abound about how enforcement will take shape and what exactly constitutes compliance.

Proposed IoT Cybersecurity Legislation Could Lead to Consumer Device Standards

By Rhys Dipshan |

In setting security standards for IoT devices sold to the federal government, the proposed bill may make it economically infeasible for IoT manufacturers to ignore cybersecurity best practices.

Kremlin complex in Moscow

New VPN Ban in Russia Latest Step in Increasing Cyber Risk for US Companies

By Ed Silverstein |

Recent Russian cyber actions, such as the restrictive use of VPN technology, may make it more difficult for companies to conduct routine business activities.

Of counsel Richard M. Frankel and partner Steven J. Kuperschmid of Ruskin Moscou Faltischek

'A Wild Ride': Ruskin's New Cyber Co-Chairmen Talk Future Threats

By Rhys Dipshan |

The new additions to Ruskin's Cybersecurity and Data Privacy Practice Group, Richard Frankel and Steven Kuperschmid, discuss why modern attacks are so successful and why they will be getting worse.

Justice Mariano-Florentino Cuellar, California Supreme Court

What Worries a Calif. Supreme Court Justice About AI and the Law?

By Ben Hancock |

Justice Mariano-Florentino Cuéllar isn't afraid of the robot uprising. But when is reliance on AI arbitrary and capricious? That's a heavy question.

Verizon headquarters

Vendor Breached Your Company Data? Sorry, You're Still Liable

By Rhys Dipshan |

The liabilities companies face due to vendor cybersecurity incidents can vary widely depending on the particular situation and the actions they take beforehand.

How WordPress Takes On the Challenges of Protecting User Data

By Jennifer Williams-Alvarez |

Paul Sieminski, Automattic's GC, said that the Snowden leaks significantly changed the data privacy and government requests landscape.

The IGP and CFSR: Transitioning Your E-Discovery Career Into a Cybersecurity One

By Jared Coseglia, TRU Staffing Partners |

The second part of this look at cybersecurity education and certifications explores two certifications that touch on both cybersecurity and e-discovery: the IGP and CFSR.

Federal Trade Commission

GM's Top Cyber Official Warns FTC Not to Repeat History

By C. Ryan Barber |

While their life-saving potential is clear, connected cars raise significant cybersecurity concerns. Jeff Massimilla addressed those concerns at an FTC and NHTSA conference.

Data Breach.

DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm

By James Booth |

The shutdown appears to have been caused by a ransomware attack, similar to the WannaCry attack that hit organizations such as the NHS last month.

Winning? US Is Top in Corporate Data Breach Costs Thanks to Legal

By Rhys Dipshan |

An IBM and Ponemon Institute study found indirect costs such as litigation make the United States the most expensive country for corporations to suffer a data breach.

Businessman hand holding money banknote for paying the key from hacker for unlock folder got ransomware malware virus computer. Vector illustration technology data privacy and security concept.

Taking Stock of Ransomware: What It Is, and Why You Should Care

By Gabrielle Orum Hernández |

A Legalweek West panel offered quick solutions to mitigate the ransomware dilemma and explored the 'should I pay' question.

3 Realities of Modern Cybersecurity

By Rhys Dipshan |

The new era of data protection and regulation is far from fool proof, but more realistic and comprehensive than ever before.

'A Great Target for Cyber-crime': WannaCry Attacks Push Firm Tech Security Up the Agenda

By Alex Berry |

With cyber-attacks continuing to make headlines, partners and IT security experts discuss the implications for law firms.

Maneuvering the Madness of Cyber and ESI Education & Certification

By Jared Coseglia, TRU Staffing Partners |

Step one: Get the basics quickly, and stay ahead of the curve professionally.

Andrew P. Gold and Dee Dee Fischer, with Akerman.

'Shared' Password Leads to $3.73M Verdict Against Florida Company

By Celia Ampel |

A jury found Compass iTech had misappropriated trade secrets, interfered with a contract and breached the terms of service of an analytics company.

Judge OKs $10M Target Data Breach Settlement—Again

By Amanda Bronstad |

U.S. District Judge Paul Magnuson came out with an order approving class certification in a $10 million data-breach settlement.

For Staffing, the History of E-Discovery Mirrors the Present of Cybersecurity

By Jared Coseglia, TRU Staffing Partners, Cybersecurity Law & Strategy |

Examining the current similarities between e-discovery and cybersecurity can be a predictor of future patterns in the cybersecurity staffing market.

NHS website affected by international computer cyber attack Ransomware cyber attack, London May 13 2017 (Rex Features via AP Images)

The WannaCry Attack: A Wake-up Call for Organizational Information Governance?

By Ian Lopez |

The sort of ransomware attack experts have warned about for years has happened. Now organizations need to examine their security postures.

Making Sense of New Data Types in the App Age

By Tim Anderson and JR Jenkins, Law Journal Newsletters |

While the threat of "big data" — massive amounts of data inside an organization — has cast a shadow over IT and legal departments for several years, the real challenge can oftentimes be the variety. It's why we believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.

Considering Cyberinsurance? Here’s What You Need to Know

By Judy Selby, BDO Consulting |

A rundown of what potential buyers need to know when thinking about purchasing cyberinsurance.

Planning for the Worst: White House Guidance on Avoiding, and Coping With, Data Breaches

By Kristen Price, Haight Brown & Bonesteel |

The White House memo reflects changing laws and policies and provides guidance for how organizations should tailor their response plans.

Integris Looks to Help Companies Manage 'Live Maps' of Sensitive Data

By Gabrielle Orum Hernández |

Founder Kristina Bergman hopes to bring dynamic data mapping to information governance.

Colorado Latest State to Propose Cybersecurity Compliance Rules

By Ed Silverstein |

The rules for broker-dealers and investment advisers are directed at 'ensuring that each entity has baseline data security procedures in place that are commensurate with its size.'

Julie Brill

Microsoft Hires Ex-FTC Commissioner as Cybersecurity, Privacy Lead

By David Ruiz |

Julie Brill joins the company after roughly a year with Hogan Lovells, where she served as co-director of the firm’s privacy and cybersecurity practice.

J.C. Boggs, King & Spalding, Partner and Dean C. Garfield, Information Technology Industry Council, President and CEO opened the 2017 Cybersecurity & Privacy Summit, hosted by King & Spalding on April 24, 2017.

Cyberinsurance and Vendor Follies Headline King & Spalding Cybersecurity Summit

By Gabrielle Orum Hernández |

Panelists hoped to bring clarity to risk management anxieties arising from the fast-changing cybersecurity market.

Will 'Draft Measures' Help Clarify Data Transfer Issues in China?

By Ed Silverstein |

The Chinese government says the data transfer Draft Measure clarifies the recently passed Cybersecurity Law, but companies may find some of the regulations potentially cumbersome.

Wolters Kluwer Aiming to Streamline Research into the Cybersecurity ‘Haystack’

By Zach Warren |

The new Cybersecurity & Privacy Law Suite provides curated news and enhanced searching capabilities for security-minded corporate legal professionals.

Information Governance: Law Firms' Cybersecurity Weak Spot

By Ian Raine, Cybersecurity Law & Strategy |

Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

Ex-New Jersey Judge, Colleagues Lose Bid to Dismiss Computer Hacking Suit

By Charles Toutant |

Former Essex County Superior Court Judge Carol Ferentz, Benjamin DelVento and DelVento's sons Benjamin Jr. and Matthew had moved to dismiss the suit by Maurice Donovan.

Aaron Tantleff, left, and Mark Krotoski, right.

Two Lawyers’ Forecast for Cybersecurity Regulations? Cloudy

By Joel Stashenko |

The lawyers discuss regulatory conflicts that may emerge between federal agencies and states as they grab pieces of cybercrime deterrence.

Preparing for Ransomware Attacks: Your Company Is a Target

By Ryan Bergsieker and Allison Chapin, Gibson Dunn |

Planning ahead is essential, and legal teams should consider these nine tips when assessing their companies' readiness.

legal computer judge concept, lady justice isolated on white, 3D illustration.

Getting Serious About Document Security Means Balancing Access and Productivity

By Tracie Sokol, Canon U.S.A |

The need for workflow security components goes much deeper than simply meeting compliance requirements.

Hacker Tries Extortion Plot vs. Apple, but Co. Says it Is Not Harmed; Here's What To Do

By Sue Reisinger |

While Apple says users are safe, the event underscores the importance for companies to be prepared for cyber events, says Alston & Bird partner.