• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Alston & Bird Privacy, Cyber & Data Strategy Blog

  • Home
  • Services
  • Events
  • Contacts

SEC Chair Asks Staff to Review Cybersecurity Disclosure Practices at Urging of Senator Rockefeller

May 13, 2013 By Privacy, Cyber & Data Strategy Team

In a letter responding to a request by Senator Jay Rockefeller (D-WV), Chairman of the Senate Commerce Committee, Chairman Mary Jo White of the U.S. Securities and Exchange Commission (SEC) stated that she has asked her staff for a briefing on … [Read more] about SEC Chair Asks Staff to Review Cybersecurity Disclosure Practices at Urging of Senator Rockefeller

Filed Under: Uncategorized

WATCH: Kim Peretti Interviewed by BankInfoSecurity.com on $45 Million Heist

May 10, 2013 By Privacy, Cyber & Data Strategy Team

Kim Peretti, co-chair of the firm’s Security Incident Management and Response Team and former senior litigator for the Justice Department’s Computer Crime and Intellectual Property Section, was interviewed by BankInfoSecurity.com, … [Read more] about WATCH: Kim Peretti Interviewed by BankInfoSecurity.com on $45 Million Heist

Filed Under: Uncategorized

Kim Peretti Quoted in The New York Times

May 9, 2013 By Privacy, Cyber & Data Strategy Team

Kim Peretti, co-chair of the firm’s Security Incident Management and Response Team and former senior litigator for the Justice Department’s Computer Crime and Intellectual Property Section, was quoted in The New York Times article, … [Read more] about Kim Peretti Quoted in The New York Times

Filed Under: Uncategorized

ALI-CLE Program, “The Top Five Data Security Threats in 2013: Knowing and Understanding the Legal Risks”

April 30, 2013 By Privacy, Cyber & Data Strategy Team

On May 17, 2013, Kim Peretti will serve as planning chair and Todd McClelland will be a featured speaker in the program entitled “The Top Five Data Security Threats in 2013: Knowing and Understanding the Legal Risks,” by ALI-CLE. Data security … [Read more] about ALI-CLE Program, “The Top Five Data Security Threats in 2013: Knowing and Understanding the Legal Risks”

Filed Under: Uncategorized

FERC Seeks To Mandate Electric Utilities Implement Specific Cybersecurity Protections

April 24, 2013 By Privacy, Cyber & Data Strategy Team

In the newly proposed version of the Critical Infrastructure Protection (“CIP”) Reliability Standards, the Federal Energy Regulatory Commission (“FERC”) is seeking, for the first time, to create mandatory cybersecurity … [Read more] about FERC Seeks To Mandate Electric Utilities Implement Specific Cybersecurity Protections

Filed Under: Uncategorized

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 180
  • Page 181
  • Page 182
  • Page 183
  • Page 184
  • Interim pages omitted …
  • Page 206
  • Go to Next Page »

Primary Sidebar

This blog is a service of Alston & Bird’s Privacy, Cyber & Data Strategy team and focuses on key data privacy and data security issues.


Receive email notifications when new posts are added.

Receive email notifications when new posts are added.


RANSOMWARE FUSION CENTER
Click here to request access

THE DIGITAL DOWNLOAD
Click here to see the editions

PRIVACY & CYBER EVENTS
Click here to see upcoming and past events

PRIVACY & CYBER MAILINGS
Click here to sign up

@ALSTONPRIVACY
Click here to follow us on Twitter

Secondary Sidebar

Categories

Recent Posts

  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • UK Data Protection Regulator Fines 23andMe ~$3.1 Million Following Credential Stuffing Attack
  • NYDFS Issues Guidance on Heightened Cybersecurity and Sanctions Risk from Global Conflict
  • Are You Ready For The Department Of Justice’s Bulk Data Transfer Rule?
  • Trump Administration Releases Cyber Executive Order Revealing Renewed Strategy for U.S. Cybersecurity
Copyright © 2025 · Alston & Bird · All Rights Reserved. Privacy.
This website uses cookies to improve functionality and performance. By continuing to browse this site, you are consenting to the use of cookies on this website. OkCookie policy