Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Cybersecurity and Data Privacy review and update: Looking back on 2018 and planning ahead for 2019

From the implementation of the GDPR to the passage of the CCPA, the year 2018 proved to be a monumental one for cybersecurity and data privacy. Regulators from around the world responded to devastating, large-scale cyber-attacks, and a desire for their citizens to have more control over their data, by passing a wide range of regulations aimed at protecting consumer information. These...

The SEC wants companies to talk about cybersecurity

On February 21, 2018, the Securities and Exchange Commission issued an interpretive release providing important guidance to certain registrants on cybersecurity disclosure. The guidance makes clear its view that material risks or incidents related to cybersecurity fall within a company’s ongoing obligation to disclose material information in current and periodic reports. The guidance...

NHTSA Releases New Automated Vehicle Policy

The US Department of Transportation (DOT) and the National Highway Traffic Safety Administration (NHTSA) this week released Automated Driving Systems 2.0: A Vision for Safety. This updated guidance on automated driving systems (the Guidance) is intended to “pave[] the way for the safe deployment of advanced driver assistance technologies by providing voluntary guidance that encourages...

Toward a Culture of Continuous Cybersecurity

The SEC’s Office of Compliance Inspections and Examinations (OCIE) just issued a “Risk Alert” containing the results of its Cybersecurity 2 Initiative. In their article for Law360, which analyzes the OCIE Alert, Eversheds Sutherland (US) Partners Michael Bahar and Brian Rubin write that the SEC supports the notion that effective cybersecurity is not a matter of one-and-done, but rather...

The Future of Cyber Coverage Leans to Standardization

In this interview with A.M BestTV, Eversheds Sutherland (US) Partner Michael Bahar discusses cybersecurity issues and how organizations can prepare for potential cyberattacks. Learn more.

« Older Entries