Mass Torts & Multidistrict Litigation Panel at Class Action Law Forum 2020 presented by Western Alliance Bank

Join us March 4-5, 2020, at the University of San Diego School of Law for Western Alliance Bank presents Class Action Law Forum 2020, […]

Privacy & Data Breach Class Actions Session Panel 2020

Join us March 4-5, 2020, at the University of San Diego School of Law for Western Alliance Bank presents Class Action Law Forum 2020, […]

Developing a Privacy Training Program for Your Workforce | A Privacy+Security Forum Webinar

 

The Cloud: Selected Benefits, Risks, and Insurance Coverage Issues (Part 1) — Barnes & Thornburg

 
Cloud Risk: Do You Transfer Liability Along with Data?
Many of us were using data clouds before we even knew what they were. Now, while […]

National Geographic Disclosed Customer Info, Class Action Says — Top Class Actions Blog

Cyber Security Summit | Philadelphia | April 25

Financial Institutions Struggle to Keep Up with ‘Changing Business Needs’ Such as Social Mobile Apps, and Getting Risk Data Quickly, Deloitte Report Suggests

Deloitte’s report is based on a survey of 94 financial institutions around the world that operate in a range of financial sectors and with aggregate […]

A.I. Best Practices: Rules and Policies for Using Artificial Intelligence in Your Business

Protected: Insurance Coverage re Opioid Claims | Oct. 00

This content is password protected. To view it please enter your password below:
Password:

International Cyber Risk Management Conference | April 15-16, 2019 | Toronto

Get 10% off with promotion code HB2019

A.I. Best Practices: Rules and Policies for Using Artificial Intelligence in Your Business

BitSight Releases eBook on Use of A.I. & Big Data in Continuous Cyber Risk Monitoring

“With every reported data breach or cyberattack, the cyber risk landscape gets a little more complex. Cyber criminals create new attack vectors, cybersecurity professionals […]

International Cyber Risk Management Conference | Dec. 6-7, 2018 | Bermuda

The Urgency of Cyber Threats to U.S. and Global Critical Infrastructures | Video Session

As posted on YouTube:

I was truly honored to have such a great panel present at our Cyber Sector Risk: Critical Infrastructure seminar in New […]

Cyber Security Summit: Seattle | July 19, 2018

 

The Social Media Fraud Revolution: An RSA White Paper

In describing their new analysis, RSA writes:

The rise in popularity of multiple social media platforms throughout the world has caused many fraudsters to expand […]

News Release re HB Corporate Counsel and Cyber Risk Programs April 2018

For Immediate Release | Download PDF 
Cyber Attacks on U.S. Power Grids, Artificial Intelligence, Autonomous Vehicles and Blockchain Security – Upcoming HB Seminars Address These […]

Insurance Industry’s Role in Mitigating Natural Disasters

The insurance industry can play a role in helping prepare for future severe weather because the companies have a tremendous amount of data and […]

Attempt to Kill via Cyber Attack

“The only thing that prevented an explosion was a mistake in the attackers’ computer code,” the investigators said.
 
From the New York Times March 15, […]

The Insurance Lifecycle of a Ransomware Attack | April 10 | 2pm

 

Critical Infrastructure & Cybersecurity | March 13 | 2pm

Healthcare Cyber Attacks 2017 Report from CryptoniteNXT

In boxing your trainer will tell you to keep your eyes open and your head and feet moving.
After all, it’s way harder to land […]

Cyber Risk and Privacy Liability: 3 Upcoming Events!

International Privacy+Security Forum
We are proud to partner with Dan Solove and Paul Schwartz on this prestigious event. Click the image to see what an […]

Hildebrandt: Law Firms Must Consider Cyber Sector Risks

 
In its 2018 Client Advisory, Hildebrandt Consulting LLC, shared insights and trends we’ve come to expect from this leading monitor of the legal market. […]

From Symantec: WannaCry: Ransomware attacks show strong links to Lazarus group

Symantec Security Response Team provides valuable insight to Wannacry, where “similarities in code and infrastructure indicate close connection to group that was linked to […]