Search for: "Cybersecurity " Results 61 - 80 of 16,345
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
13 Jan 2015, 10:45 am by Jeff Kosseff
In remarks scheduled for later today at the National Cybersecurity Communications Integration Center (NCCIC), President Obama will announce an updated cybersecurity legislative proposal, which would encourage the private sector to quickly share cyberthreat information with NCCIC. [read post]
11 May 2017, 3:16 pm by Helen Klein Murillo
Cybersecurity of Federal Networks Section 1 deals with cybersecurity risk management and IT modernization in the executive branch. [read post]
3 Aug 2017, 8:42 am by Daily Record Staff
., a provider of cybersecurity training and simulation platforms, announced Thursday the opening of the new Baltimore Cyber Range cybersecurity training and simulation center in Baltimore. [read post]
27 Jan 2023, 12:00 am by Lawrence Solum
An Application of Just Securitization Theory to Cybersecurity Based On the Principle of Subsidiarity (Applied Cybersecurity & Internet Governance 1, no. 1 (17 November 2022): 97–120) on SSRN. [read post]
9 Aug 2017, 12:31 pm by tvasil
On August 7, 2017, the NAIC’s Cybersecurity (EX) Working Group met in its continuing effort to develop a model cybersecurity law for the insurance industry. [read post]
4 Dec 2014, 10:00 am by The Public Employment Law Press
Cybersecurity: An enterprise-wide governance issueDecember 9, 2014 • 2 PM ET A complimentary CLE webinarBoth a hot button and hot potato in many organizations, the issue of who is responsible for cybersecurity can be nebulous. [read post]
26 Sep 2015, 6:50 am
Given the priority regulators are placing on cybersecurity (including NAIC’s Cybersecurity Task Force) and the continued occurrence of high profile data breaches, we expect that cybersecurity examinations will commence as early as 2016 and will be performed by insurance regulators as part of their standard three-year exam cycle. [read post]
20 Feb 2023, 3:16 pm by Sabrina I. Pacifici
Identifying cybersecurity risks is the first step in managing them. [read post]
27 Jul 2023, 4:10 am by David Lynn
Foreign private issuers must furnish on Form 6-K information on material cybersecurity incidents that they disclose or otherwise publicize in a foreign jurisdiction, to any stock exchange, or to security holders. [read post]
1 Mar 2018, 4:30 pm by Christopher L. Doerksen
 The SEC’s new guidance reinforces and expands on its October 2011 guidance, emphasizing the importance of adopting sound cybersecurity policies and procedures and safeguards against insider trading in the event of a potentially material cybersecurity breach.... [read post]
23 Jul 2021, 9:00 am by QMiceli
Read this recent article by Partner Renée Brooker in Inside Sources: “Blowing the Whistle on Cybersecurity Fraud. [read post]
20 Mar 2024, 9:31 am by Jeff
Do Healthcare Organizations Cheap Out on Cybersecurity Spending? [read post]
6 Nov 2018, 2:03 pm by Tim Curtis
The University of Baltimore plans to create a cybersecurity management master’s program focused on developing cybersecurity leaders. [read post]
31 May 2012, 9:04 am by P.J. Blount
Source – ITU: ITU calls for global collaboration to tackle cybersecurity threats ITU Telecom World 2012 to provide platform to examine core global cybersecurity issues Geneva, 31 May 2012 – ITU today called for greater international co-operation between governments and the ICT industry to tackle the global nature of today’s cybersecurity threats. [read post]
30 Oct 2023, 9:22 am by Jackson Biesecker
If you have questions about developing cybersecurity policies and procedures, reach out to a member of the Privacy, Data, and Cybersecurity Team. [read post]
22 Jun 2021, 5:00 pm by Lisa S. Boehm
It seems clear that in issuing its cybersecurity guidance, the DOL is setting minimum expectations for addressing cybersecurity risk in retirement plans. [read post]
2 Jun 2015, 7:00 am by Susan Landau
I’d like to announce the new Journal of Cybersecurity, an interdisciplinary journal encouraging submissions in all aspects of cybersecurity. [read post]