Through this Statement, the Department of Justice’s Antitrust Division (the “Division”) and the Federal Trade Commission (the “Commission” or “FTC”) (collectively, the “Agencies”) explain their analytical framework for information sharing and make it clear that they do not believe that antitrust is – or should be – a roadblock to legitimate cybersecurity information sharing.
Overview of best practices in risk management. Includes discussion of enterprise risk, advising the board on risk, risk mitigation planning, cybersecurity, and third party risk from vendors and suppliers.
Provides an overview of legal aspects of homeland security including corporate viability and business continuity, cybersecurity, the SAFETY Act, the Department of Homeland Security and information sharing and the Freedom of Information Act.
This “best practices” document was drafted by the Cybersecurity Unit to assist organizations in preparing a cyber incident response plan and, more generally, in preparing to respond to a cyber incident in the United States.
Today's in-house counsel have to deal with many different threats to their companies, including cyber-security threats. In this presentation, learn how to become more cyber resilient in the face of a breach or issue.
Rather than mandating that board members become cybersecurity experts themselves, the well-established framework for public company governance demands that boards oversee effective processes to identify and mitigate cyber risks within a company.
In case there was any doubt, the FTC v. Wyndham decision makes clear that there is a new sheriff in town when it comes to holding businesses accountable for cybersecurity breaches that harm consumers. That sheriff is the Federal Trade Commission (FTC).
Lawyers are so good in their domain and have such high social status that they are often afforded a presumption of competence in areas where they are not expert. This presumption, and the effects of its puncturing, has been in evidence as clients discover that their law firms are the soft underbelly of cybersecurity.