Skip to main content

National Cybersecurity Awareness Month - October 2017

The risks posed by cyber threats and the importance of appropriately managing company and personal data have never been more significant for businesses.

  • AddRemove
  • Build a Report 

Contacts

Staying Ahead of the Curve: Cybersecurity and Data Privacy–Hot Topics for Global Businesses

 

Cybersecurity Book

Cyber threats continue to evolve, and data privacy considerations continue to grow more complex. Whether defending against global ransomware campaigns or adjusting to new legal regimes governing international data transfers, companies of all sizes face unprecedented cybersecurity and data privacy challenges.

As General Counsel of the National Security Agency, I saw firsthand the increasingly dynamic nature of these challenges around the globe, including changes in technology, the threat landscape and applicable legal regimes. I am proud now to lead Mayer Brown’s diverse team of Cybersecurity & Data Privacy lawyers, who deliver strategic advice and practical thinking in this crucial area. While we provide counsel on a broad range of cybersecurity and data privacy issues—from board governance, supply chain and vendor management, and regulatory compliance to data breach preparation, response and litigation—our priority remains simple: to help clients safeguard their businesses and maintain the trust of key stakeholders.

National Cybersecurity Awareness Month (NCSAM) provides businesses an opportunity to review and enhance their cybersecurity posture. To that end, we will participate in a series of forums in October, offering incisive thinking on a wide range of cybersecurity issues. As 2017 NCSAM Champions, we look forward to sharing our insights and hope you will join us for some or all of the upcoming programs. Throughout the month, we will circulate additional program information and pertinent thought leadership. Meanwhile, we are pleased to announce the publication of our new practical guide Staying Ahead of the Curve: Cybersecurity and Data Privacy—Hot Topics for Global Businesses.

Regards,
Raj De


Five Questions General Counsels Should Ask about the EU General Data Protection Regulation

The European Union and the United States have very different privacy regimes in place. While US privacy laws tend to be sector-or topic-specific (e.g., the Gramm-Leach-Bliley Act), the European Union has an overarching privacy law—the EU Directive 95/46/EC (the “EU Directive”). The EU Directive provides for various restrictions and requirements for the processing of EU personal data by all companies, regardless of sector, and gives EU data subjects certain rights with respect to their personal data. The new European General Data Protection Regulation (GDPR) will replace the EU Directive in May 2018. This article describes five things that a company should be doing to comply with the GDPR.

Read the full report >>

For more information about the topics raised in this Q&A, please contact , or .

Preparing for the EU General Data Protection Regulation

Replacing the current EU Directive, the EU General Data Protection Regulation (GDPR) will introduce significant changes and additional requirements impacting businesses around the world. Please click the image below for an overview of the coming changes and what your company needs to do to prepare for the GDPR.


Five Questions General Counsels Should Ask about Vulnerability Disclosure

As businesses continue to leverage complex systems, managing the vulnerabilities inherent in such operations will become an increasingly important task. Vulnerabilities are the weaknesses in software code and network systems that render information and products susceptible to exploitation by malicious actors. As recent headlines attest, the consequences of such exploitation can be significant. Vulnerability management and the specific topic of vulnerability disclosure have thus become C-suite issues. Vulnerability disclosure is an essential aspect of how companies are managing the risks that vulnerabilities can pose. This article highlights five key questions that general counsels should consider as they evaluate whether vulnerability disclosure should serve as part of their holistic response to cybersecurity threats.

Read the full report >>

For more information about the topics raised in this Q&A, please contact or .

Vulnerability Disclosure

Recent cyber attacks and data breaches have highlighted the potential legal, financial and reputational cost to companies that fail to manage cybersecurity vulnerabilities in their systems and products. Please click the image below for an overview of vulnerability disclosure programs.

Please keep an eye out for an invitation to our upcoming webinar on Vulnerability Disclosure during which we will discuss topics including:

  • The history of vulnerability disclosure programs,
  • How they have been adopted by the US government,
  • Regulatory guidance encouraging their use,
  • How companies can go about establishing them,
  • Their constituent components, and
  • Priority issues to consider as companies evaluate whether a vulnerability disclosure program fits within their overarching cybersecurity framework.

Securing the Internet of Things

Five Questions General Counsels Should Ask about Securing the Internet of Things

The rapid growth of the Internet of Things (“IoT”) has brought significant new opportunities for businesses across sectors. From consumer products such as smart homes or connected cars to business implementations in supply chains or delivery networks, these connected devices are creating new markets and new efficiencies for global businesses. But the Internet of Things also raises a wide range of cybersecurity and data privacy questions for general counsels and their legal teams. Here we discuss five questions for general counsels to consider in managing such cybersecurity risks and data privacy challenges posed by the Internet of Things.

Read the full report >>

For more information about the topics raised in this Q&A, please contact , or .

Securing the Internet of Things

A brief discussion of a key issue for global businesses: managing the cyber risks and data privacy challenges posed by the Internet of Things or “IoT.”

Please keep an eye out for an invitation to our upcoming webinar on securing the Internet of Things during which we will discuss topics including:

  • The rapid growth of the Internet of Things and key features that raise cybersecurity and data privacy challenges for global businesses.
  • Recent developments at regulatory agencies, in court and in Congress.
  • Priority issues for businesses that sell, operate or otherwise rely on the connected devices that make up the Internet of Things.

Five Questions General Counsels Should Ask about Security and Privacy Implications of Cloud Services

Businesses today are increasingly turning to cloud computing solutions and accumulating data in the cloud at a staggering pace. Although cloud solutions have many advantages, they also present challenges. For example, cloud providers generally do not customize the cloud environment for any particular customer’s business needs given the multi-tenant nature of cloud solutions. In addition, complying with data privacy and cybersecurity regulations in the cloud environment requires special consideration. This article describes five privacy and security-related questions that a general counsel should ask regarding cloud services.

Read the full report >>

For more information about the topics raised in this Q&A, please contact , or .

Security and Privacy in the Cloud

As businesses turn to cloud computing solutions and accumulate data in the cloud, they are presented with many challenges for complying with data privacy and cybersecurity regulations. Please click the image below for a preview of our upcoming webinar.

Join Linda Rhodes, Brad Peterson and Joe Pennell on November 14, 2017, for our webinar Security and Privacy in the Cloud. They will cover topics including:

  • The background and nature of cloud solutions;
  • Recent developments having significant consequences for cloud computing services; and
  • Priority legal issues related to contracting for cloud solutions

Register >>

The Build a Report feature requires the use of cookies to function properly. Cookies are small text files that are placed on your computer by websites that you visit. They are widely used in order to make websites work, or work more efficiently. If you do not accept cookies, this function will not work. For more information please see our Privacy Policy

You have no pages selected. Please select pages to email then resubmit.