Senators Introduce Bipartisan Legislation To Require Federal Contractors and Operators of Critical Infrastructure to Disclose Cyber Intrusions

Share

A bipartisan group of 14 United States senators recently introduced proposed legislation that would require federal contractors and operators of critical infrastructure to disclose any cyber intrusion within 24 hours. A copy of the proposed legislation can be found here.

Currently, there is no federally mandated reporting requirement for cyberattacks on American infrastructure targets. The newly proposed legislation is designed to prevent these attacks from going unreported and uninvestigated.

Continue reading “Senators Introduce Bipartisan Legislation To Require Federal Contractors and Operators of Critical Infrastructure to Disclose Cyber Intrusions”

Faegre Drinker on Law and Technology Podcast: Practical Tips To Keep Phishing Attacks at Bay

Share

Phishing attacks are simple, widely used and highly effective — and they can be devastating to the people and organizations they target. In this episode of the Faegre Drinker on Law and Technology Podcast, host Jason G. Weiss sits down with Art Ehuan, vice president of Palo Alto Networks, and Chris Holden, chief information security officer at Crum & Forster, to discuss practices and defense strategies to keep phishing attacks at bay.

Continue reading “Faegre Drinker on Law and Technology Podcast: Practical Tips To Keep Phishing Attacks at Bay”

Faegre Drinker on Law and Technology Podcast: Computer Forensics

Share

Computer Forensics: What is it? How is it Used in Civil and Criminal Incident Response Work? In this episode of the Faegre Drinker on Law and Technology Podcast, host Jason G. Weiss talks with Supervisory Special Agent Steve Crist of the FBI and former Orange County DA Investigator Dave White about the importance of using computer forensics in private sector and government cyber and incident response investigations. They explore the differences between computer forensics and traditional “wet” forensics; how computer forensics has grown to play a significant role in civil investigative and legal matters; the importance of digital evidence in criminal cases; and how a digital investigator works their way through a case.

Continue reading “Faegre Drinker on Law and Technology Podcast: Computer Forensics”

Federal Legislation Considers Banning Ransom Payments to Hackers

Share

The year 2021 continues to reveal an alarming rise in ransomware attacks. Two of the most notable of such attacks include the ransomware attack on CNA Financial Corp., with resulting payment of $40 million in ransom, and the attack on Colonial Pipeline Co., with a ransom payment of $4.4 million.

With these two recent ransomware attacks—and subsequent payments—receiving massive publicity, congressional law makers have begun to question whether ransom payments should be permitted or remain legal, or if federal law makers should step in to prohibit such ransom payments as a means to curtail these forms of attacks. Although no bill taking that approach has been introduced yet, recent discussions of such a law have given rise to debate on the issue.

Continue reading “Federal Legislation Considers Banning Ransom Payments to Hackers”

Faegre Drinker on Law and Technology Podcast: What Brexit Means for Law, Technology and Your Data

Share

Earlier this year — and five years after the Brexit referendum — the U.K. officially left the EU, giving rise to a new era of international commerce. As businesses work to adapt to this new paradigm, one question should not be overlooked: how does Brexit impact the international movement of data? In the first international episode of the Faegre Drinker on Law and Technology Podcast, host Jason G. Weiss talks with Faegre Drinker’s Huw Beverley-Smith and Jonathon Gunn about the data protection and privacy implications of life after Brexit.

Continue reading “Faegre Drinker on Law and Technology Podcast: What Brexit Means for Law, Technology and Your Data”

“Zero Trust Architecture” Is Officially Here: NIST Publishes New Cybersecurity Framework

Share

The National Institute of Standards and Technology, commonly referred to as NIST, recently published a new computer framework for users to consider as a cyber-framework security model — the Zero Trust Architecture Model (ZTA). This new model was officially published in NIST SP 800-207 in late 2020.

Continue reading ““Zero Trust Architecture” Is Officially Here: NIST Publishes New Cybersecurity Framework”

©2024 Faegre Drinker Biddle & Reath LLP. All Rights Reserved. Attorney Advertising.
Privacy Policy