Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Iranians Hackers Targeted Control of New York Dam

The seven Iranian hackers that were indicted for conducting distributed denial of service attacks on banks also were charged with illegally accessing the supervisory control and data acquisition, or “SCADA,” system at a dam in New York State. This is reportedly the first time a breach in a U.S. computer system that controls critical infrastructure has been linked by the FBI to a hacker...

NIST RFI on Cybersecurity Framework

The National Institute of Standards and Technology (NIST) is seeking information on how it might update and improve its February 2014 ‘‘Framework for Improving Critical Infrastructure Cybersecurity.” The Framework consists of voluntary standards, guidelines, and practices intended to help organizations manage cybersecurity risks. In a Request for Information (RFI) issued on December...

Space Weather Strategy and Action Plan

Owners and operators of critical infrastructure are encouraged to coordinate with electric power providers to ensure response and recovery following outages resulting from space-weather events. Space weather refers to variations in the space environment between the sun and earth, such as geomagnetic storms, that can cause hazardous conditions and disruptions of the power grid. The...

Cybersecurity Amendment Included in Highway Bill

UPDATE:  The Fixing America’s Surface Transportation Act, the FAST Act, including the cybersecurity amendment, was signed into law by the President on December 4, 2015. Under an amendment to the highway bill approved last week by the U.S. House of Representatives, the federal government would be authorized to direct owners and operators of critical energy infrastructure to act to...

Sutherland Partner Addresses Cybersecurity Concerns in TheStreet

Sutherland Partner Mary Jane Wilson-Bilik was recently quoted in TheStreet article “What Banks and the IRS Should Do to Prevent a Cyber 9/11” authored by  Marguerite Arnold. In this article, Mary Jane addresses cybersecurity threats and the potential impact a large-scale cyberattack may have on critical infrastructure.

« Older Entries Next Entries »