Software security is a critical issue for multinational businesses. Highlighted as a top priority by the Biden administration and other governments worldwide, software security is a central pillar of effective cybersecurity—and managing associated legal risk. But developing and maintaining secure software is challenging, including to the extent that companies manage complex software development lifecycles, face
National Cybersecurity Awareness Month (NCAM)
Webinar: Cyber Perspectives: Cyber Leadership and the Board – Fireside Chat with Bethany De Lude, CISO, Carlyle Group and João Pedro Gonçalves, CISO, EQT Group AB
An organization’s board of directors assumes ultimate accountability for governing cybersecurity risk. Chief information security officers (CISOs) play an increasingly indispensable role in enabling board members and senior executives to engage in appropriate cyber risk management, communicate using cyber metrics with business objectives in mind, and facilitate proper oversight of the company’s cyber program. Among…
Webinar: Cyber Spotlight: Ransomware 3.0 War Stories – Triple Extortion, Sanctions Risks, and Best Practices from the Trenches
Ransomware attacks continue to cause serious disruption to organizations and show no signs of slow-down. What starts as a security failure quickly becomes a serious business risk, requiring decision-making at the board level. Our speakers will touch on various legal and technical factors impacting a company’s response to a ransomware attack and provide practical advice…
Webinar: Cyber Perspectives: Software Security With Sam Kaplan of Palo Alto Networks, Aaron Cooper of BSA and Maria Garzaro of Aveva
Software security is a critical issue for multinational businesses. Highlighted as a top priority by the Biden administration and other governments worldwide, software security is a central pillar of effective cybersecurity—and managing associated legal risk. But developing and maintaining secure software is challenging, including to the extent that companies manage complex software development lifecycles, face…
Cyber Spotlight: Cybersecurity Developments in Europe, the UK and China
In this National Cybersecurity Awareness Month conversation, Mayer Brown lawyers from our global practice will discuss the latest legal trends and developments relating to cybersecurity in China, Europe and the UK. Topics will include:
- The implications for international businesses seeking to comply with China’s new Data Security Law and Personal Information Protection Law in combination
…
2018 INSIGHT: Missiles, Malware and Merger Management: Why Cybersecurity and Data Privacy Matter to M&A Practitioners—Part IV
Bylined article by Corporate & Securities partner Joe Castelluccio (New York).
INSIGHT: Missiles, Malware and Merger Management: Why Cybersecurity and Data Privacy Matter to M&A Practitioners—Part III
Bylined article by Corporate & Securities partner Joe Castelluccio (New York).
INSIGHT: Missiles, Malware and Merger Management: Why Cybersecurity and Data Privacy Matter to M&A Practitioners—Part II
In the first installment of this series, I described some reasons why cybersecurity and data privacy issues should be front of mind for M&A practitioners. In this installment, I will talk about the ways that an acquirer’s—and a target company’s—compliance programs can play a significant role in the success of a merger or integration.
INSIGHT: Missiles, Malware and Merger Management: Why Cybersecurity and Data Privacy Matter to M&A Practitioners—Part I
What does a nuclear missile accident have in common with a cybersecurity or data privacy issue in a
merger or integration? While it is easy to see that most people would prefer not to encounter either of them, in both situations, small missteps can lead to wide-ranging and potentially catastrophic consequences. As an M&A practitioner,…
Cybersecurity Regulation in the United States: Governing Frameworks and Emerging Trends
Companies across industry sectors have developed risk-based cybersecurity programs to respond to the substantial and complex cyber threats they face. Managing regulatory risk has become an important element of these cybersecurity programs, as regulators use rules, enforcement actions, and guidance to establish an increasingly complex framework of regulatory expectations.
This 80-page book offers insights on…