Tag Archives: cybersecurity

Strategies for Protecting Against Vendor Payment Fraud

balance sheet
Cybercrime is an ever-increasing threat from which manufacturers are not immune. Although reliable statistics are not available, one particular type of scheme that seems to be on the rise is vendor payment fraud.  In cases of vendor payment fraud, the fraudster poses as an existing supplier and provides the manufacturer with seemingly legitimate instructions changing … Continue reading this entry

Integrating Information Security Into the Technology Development Process

GDPR
In a recent blog post, I discussed limitation of liability clauses in technology contracts. Given the favorable response to that post, I thought it would be of interest to discuss another misunderstood and frequently neglected area of technology contracting: information security warranties. Let me be more specific. Most well-drafted technology agreements contain specific warranties and … Continue reading this entry

Highlights from the Foley & Lardner LLP/BNY Mellon Wealth Management Tech X 2018 Conference

What lessons can be learned from serial and successful entrepreneurs?  How does one build a great team? What challenges and opportunities do today’s business owners and entrepreneurs face? How secure is your internet-connected technology from cyberattack?… Continue reading this entry

DFW: Cybersecurity, Data Security, and Fraud Risk – What CEOs Need to Know

Cyber threats, data breaches, and corporate fraud have led to the downfall of entire organizations, massive investment losses, significant legal costs, and more than a few top executives and directors losing their jobs and their reputations. As CEO’s, we must ensure that our companies’ most important business assets remain secure and that we address threats … Continue reading this entry

Doing Security Policies Right

To maximize the effectiveness of your business’ security policy, consider these five essential areas during the creation and deployment stages. Most sophisticated businesses have at least some form of a security policy for their organizations.  Unfortunately, all too often, those policies are inadequate, fail to comply with applicable regulatory requirements, are profoundly complex and difficult … Continue reading this entry

How to Avoid Security Assessment Cost Overruns

Engaging a third-party assessment expert in conducting a review of a business’ security measures is a cornerstone of good security practice.  Among other things, assessments can identify hidden vulnerabilities in a business’ systems and remediate them before they become a problem.… Continue reading this entry

Foley & Lardner to Host 2018 Brainbabe - STEAM Conference Connection Kick-off

Please join Foley’s Technology Industry Team on Thursday, January 25, 2018 at Foley’s Boston office (111 Huntington Avenue, 25th Floor, Boston, MA 02119) as we host Brainbabe’s STEAM Conference Connection Kick-off. Click HERE to register. Deidre Diamond, CyberSN and Brainbabe Founder and CEO will be presenting. This is a MUST ATTEND event for all cyber … Continue reading this entry

The Impact of Employee Training on Cybersecurity Breaches

Every organization is exposed to information security threats daily. It is essential that organizations have an information security protection program that is properly designed, documented, executed, and updated to minimize exposure to information loss, disruption of operations, and liability to third parties and regulators. An effective cybersecurity risk management program requires an effective governance structure … Continue reading this entry

November 2017 Midwest Cyber Security Alliance Meeting

cyber security
Foley & Lardner Partner Jennifer Rathburn is gearing up to host the November meeting of the Midwest Cyber Security Alliance. Jennifer will be joined by Joseph Abrenio, Founder and CEO of CyberSquire, and John Orbe, Vice President, Government, Education & Medical, Americas Enterprise at Juniper Networks.… Continue reading this entry

Tech Startups Play Critical Role in Development of Self-Driving Cars, According to Foley Survey

tech startups
Automakers and suppliers have been joined by a growing list of early-stage and established technology companies from outside the traditional automotive supply base in the race to build a truly connected car, and ultimately the first completely autonomous vehicle.… Continue reading this entry

Tips for Protecting Your Company Against Cyberattacks

Cybersecurity has become, as it should, an extremely important topic on company boards’ agendas. The main question on everyone’s mind is: “How can we eliminate this problem?” The answer, unfortunately, is that you can’t. Hackers are becoming more sophisticated, and their knowledge evolves with every new technology. As discussed by a panel of experts at … Continue reading this entry