Category - Articles

13
Jan

The New Social Contract in Cybersecurity

The New Social Contract in Cybersecurity: It’s Just Around the Corner By Steve Soble The Eighteenth Century was marked by two revolutions that destroyed the power of the leader to legislate—The French Revolution and The American Revolution. The Twenty-First Century is comfortably home to The Digital Revolution, which seems to be changing everything—self-driving vehicles, AI …

16
Nov

Cybersecurity Secrets Unveiled for the Insurance World

What we seem to know is that the cyber-attack against Equifax arose from the exploit of a Known Vulnerability, which Equifax failed to patch. The patch was released on March 8. The cyber-attack continued undetected and unimpeded for months, until discovered at the end of July. Then, for murky reasons, Equifax did nothing until September 7, when it notified authorities and the public of the massive data breach. The CEO has been forced out. The head of IT is gone. And so, too, other executives. In the media and before Congress, Equifax has floated several justifications.

17
Oct

NYDFS Cyber Regulations: Frameworking Compliance

By now, we should all be aware of the sweeping cybersecurity compliance regulations passed by the NYS Department of Financial Services. The risks of non-compliance are stern—fines, potential criminal penalties, injury to reputation, loss of reputation and clients, not to mention public ridicule. It’s important to recognize the minimal requirements, when they are required and what might be practically recommended.

8
Sep

Cybersecurity Secrets Revealed

What exactly is a software vulnerability and how do you find it? In common usage, a vulnerability is a weakness, a corner of our emotional life susceptible to a minor hurt. Vulnerabilities in deployed software are the genuine Achilles heel of our digital systems today—networks, computers, mobile devices, biometrics, even the Internet of Things (IoT).

29
Jun

Cyber Risk Beyond Compliance

The Digital Age has reached a crossroads. We have the technological means of exchanging a vast and specific array of zeroes and ones (the binary language of the digital world). Yet, hardly a day goes by without news of someone getting hacked. In fact, the loss history attributed to cyber-attacks is about $500 Billion per year. What is the insurance industry supposed to do with those numbers?

2
Jun

NIST Issues Guidance On Federal Government Cybersecurity Best Practices

On May 11, President Trump signed a long-delayed and much-discussed Executive Order—Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.

A day later, NIST (the National Institute of Standards and Technology) issued draft guidance—The Cybersecurity Framework—Implementation Guidance for Federal Agencies—outlining cybersecurity best practices for federal agencies.

28
May

Assured Reveals Unique Solution for Autonomous Vehicles

Assured provides insight on the global auto makers attacked by WannaCry ransomware.

20
Mar

Pre-Breach Cyber Risk Management for Insurance Industry

Assured Enterprises, Inc., has announced its Pre-breach Cyber Risk Management suite for Reinsurers, Insurance Companies, Captives, Program Administrators, Brokers, Agents, Insureds, Risk Managers, Underwriters, Actuaries, and Data Analysts. With increased pressure to protect data from breach, and the growing list of standards and regulations surrounding cybersecurity, risk bearers know they must address the challenge with …

27
Feb

Ground-Breaking New York State Cybersecurity Regulations Require Comprehensive, Thoughtful Response

23 NYCRR 500 New York State Cyber Regulations Another set of regulations, another set of discussions between attorneys and clients, now requiring very detailed insight into what is possible on the market from the cybersecurity engineering world: How to make the response practical, effective and valuable is, of course, the goal. Read this blog to …

15
Dec

Law Firm Liability for Inadequate Cybersecurity Just Became a Lot More Real

Companies are increasingly threatened with financial and reputational fallout from security breaches and compromised sensitive client and customer information, and a growing number of law firms are profiting from advising their unfortunate clients on how to deal with the fallout from cyber-incidents. While some well-known firms—think Cravath, Swaine & Moore and Weil, Gotshal & Manges—have …

Page 1 of 2