• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Alston & Bird Privacy, Cyber & Data Strategy Blog

  • Home
  • Services
  • Events
  • Contacts

Kim Peretti

Retail Breaches: Investigating Payment Card Breaches

January 29, 2014 By Kim Peretti

“Challenges in Conducting Breach Investigations: Part 2,” was published in April 2013 by Law360, however, given the recent spate of retail breaches involving payment cards, it is highly relevant to entities experiencing these types of incidents. The article describes some of the challenges to conducting breach investigations in response to increasingly sophisticated attacks. In particular, […]

Filed Under: Board Governance & Cyber Risk Management, Crisis & Data Breach Response, National Security & Digital Crimes Tagged With: US State Law

NIST’s Preliminary Cybersecurity Framework Could Have Broad Implications for Critical, Non-Critical Infrastructure Alike

December 16, 2013 By Kim Peretti

On October 22, 2013, the National Institute of Standards and Technology (NIST) released its Preliminary Cybersecurity Framework (“Framework”), marking one of the final steps in creating the “voluntary” Framework envisioned in an Obama Administration Executive Order (EO) issued earlier this year. That EO, which was designed to strengthen the cybersecurity of the United States’ critical […]

Filed Under: Board Governance & Cyber Risk Management, Crisis & Data Breach Response, Privacy & Cyber Regulatory Enforcement Tagged With: Cybersecurity Executive Order, The White House

New European Data Breach Rules for Telcos and ISPs

September 11, 2013 By Kim Peretti

On August 25, 2013, a new European Regulation came into effect that changed and expanded upon the breach notification procedures set forth in the E-Privacy Directive (2002/58/EC). The Regulation outlines two independent notification obligations: (1) notification to the relevant national authority within 24 hours after detection of a personal breach where feasible; and (2) notification […]

Filed Under: Board Governance & Cyber Risk Management, Crisis & Data Breach Response, National Security & Digital Crimes, Privacy & Cyber Regulatory Enforcement

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 23
  • Page 24
  • Page 25

Primary Sidebar

This blog is a service of Alston & Bird’s Privacy, Cyber & Data Strategy team and focuses on key data privacy and data security issues.


Receive email notifications when new posts are added.

Receive email notifications when new posts are added.


RANSOMWARE FUSION CENTER
Click here to request access

THE DIGITAL DOWNLOAD
Click here to see the editions

PRIVACY & CYBER EVENTS
Click here to see upcoming and past events

PRIVACY & CYBER MAILINGS
Click here to sign up


Secondary Sidebar

Categories

Recent Posts

  • The FTC’s COPPA Policy Statement to Incentivize Age Verification Through a More Flexible Enforcement Approach
  • NYDFS Revises Prescriptive FAQs on Multifactor Authentication
  • Threat Actors Exploit Google’s Gemini to Accelerate Cyberattacks
  • CISA Revives CIRCIA Rulemaking
  • Genetic Goldmine or Legal Landmine? Tempus AI Confronts GIPA Exposure
Copyright © 2026 · Alston & Bird · All Rights Reserved. Privacy.