Archives: Cyber and National Security

Subscribe to Cyber and National Security RSS Feed

The Clock is Ticking!: The Types of Cybersecurity Disclosures Required by the Securities and Exchange Commission

On February 21, 2018, the Securities and Exchange Commission (SEC) “voted unanimously to approve a statement and interpretive guidance to assist public companies in preparing disclosures about cybersecurity risks and incidents.”[1] The SEC did not wait long for the public to absorb this guidance. On April 24, 2018, the …

Vacation is Canceled!: Consumer Reporting Agencies Must Satisfy First-in-the-Nation N.Y. Cybersecurity Regulations by the Fall

On June 25, 2018, the New York Department of Financial Services (“NYDFS”) issued a final regulation (the “Regulation”) requiring consumer reporting agencies with “significant operations” in New York to (1) register with NYDFS for the first time and (2) comply with the NYDFS’s cybersecurity regulation. Under the Regulation, consumer reporting …

Collision Course: Foreign Influence Operations, Data Security and Privacy

On June 11, 2018, Deputy Assistant Attorney General Adam Hickey testified to the Senate Judiciary Committee about “foreign influence operations, which include cyber efforts to interfere in our elections. As stated by Hickey, “[f]oreign influence operations include covert actions by foreign governments intended to affect U.S. political sentiment and public …

What Lawyers Need to Know About Security Techniques and Technologies to Mitigate Breach Risk (Part Three of Three)

This article was first published in the Cybersecurity Law Report.

IT has an indisputably important role in implementing a defense-in-depth cybersecurity strategy, however, the legal team is also a crucial part of a company’s cyber program. With input from technical and legal experts, including DWT’s Amy Mushahwar, this …

What Lawyers Need to Know About Security Techniques and Technologies to Mitigate Breach Risk (Part Two of Three)

This article was first published in the Cybersecurity Law Report.

IT has an indisputably important role in implementing a defense-in-depth cybersecurity strategy, however, the legal team is also a crucial part of a company’s cyber program. With input from technical and legal experts, including DWT’s Amy Mushahwar, this …

What Lawyers Need to Know About Security Techniques and Technologies to Mitigate Breach Risk (Part One of Three)

This article was first published in the Cybersecurity Law Report.

IT has an indisputably important role in implementing a defense-in-depth cybersecurity strategy, however, the legal team is also a crucial part of a company’s cyber program. With input from technical and legal experts, including DWT’s Amy Mushahwar, this …

Federal Regulatory Agencies Advise on Cyber Insurance for Information Security Programs

Federal regulatory agencies, acting through the Federal Financial Institutions Examination Council (FFIEC), have issued guidance for financial institutions about the role of cyber insurance in risk management of information technology systems. See, e.g., FDIC FIL-16-2018 (April 10, 2018); OCC Bulletin 2018-8 (April 11, 2018).  The agencies—principally responsible for …

Draft Cybersecurity Legislation Would Impose Substantial New Obligations on Vendors Selling Interconnected Devices to the U.S. Government

On Tuesday, August 1, 2017, a bipartisan group of four Senators from the Senate Cybersecurity Caucus introduced legislation designed to improve the cybersecurity of devices purchased by the U.S. government and – albeit indirectly – sold anywhere in the U.S. or the world.

The legislation – the “Internet of Things …

LexBlog