Cybersecurity Resource Center
Cybersecurity Resource Center
"So it's clear that the threat environment and the threat actors that we're up against are continuously evolving, growing more complex and more dangerous every day. And we need to lean on a wide variety of tools and techniques to combat them because the threat is too great for any one agency or any one business to combat alone.”
– Christopher Wray, FBI Director
Today’s emerging digital environment is treacherous. Bad actors have proliferated and grown more sophisticated, becoming a persistent and evolving threat. Information technology continues to be integrated into all aspects of our society and IT networks have become more complex and reliant on the software and systems of third-party vendors, who themselves may experience incidents affecting customer data. Artificial intelligence (AI) and machine learning (ML) have presented themselves as important tools with the potential to enhance our world through their use in cyber-defense against increasingly sophisticated and malicious malware, ransomware, and social engineering attacks. However, AI and ML can be double-edged swords when used by hackers for advanced attacks, and other bad actors in the creation of deep fakes and bots, which are already rampantly spreading misinformation. As the metaverse comes more online, it too, will serve as a new area for exploitation. These vulnerabilities increase our risk and may lead to wide-scale or high-consequence cybersecurity events that could harm or disrupt services on which our global economy and peoples’ daily lives depend. In the Morrison Foerster/Ethisphere 2023 Global Crisis Benchmarking Report, many general counsel reported that “Cybersecurity remains top of mind for organizations, with 60% considering it as a top crisis risk.” For both public and private organizations, developing and implementing tailored cybersecurity plans and processes is key to protecting and maintaining operations.
We work with clients to help them be aware of critical cyber risks, prepare for incidents, and take steps to reduce the likelihood and impact of a potentially damaging compromise. We have served as lead counsel on some of the highest profile ransomware attacks and other cyber breaches of recent years, coordinating all response components, including responding to regulatory inquiries and investigations, defending clients in multi-jurisdiction litigation, engaging on public and customer relations issues, advising on contractual obligations and remedies, and working with forensic investigators, credit monitoring firms, and crisis communication professionals to provide an integrated, cost-effective, and seamless response to data security incidents.
In addition to data loss, these incidents raise significant business and legal risks, including damage to brand and reputation, disruption of business operations, and triggering of contractual and regulatory obligations. We have helped Fortune 500 companies and other leading organizations respond to dozens of significant ransomware incidents and have experience with wide-ranging ransomware variants including Akira, BlackCat/ALPHV, LockBit, Conti, Ryuk, REvil/Sodinokibi, WastedLocker, Maze, MegaCortex, Nephilim, SunCrypt, and Harma.
As we recognize Cybersecurity Awareness Month in October 2024, the landscape of cybersecurity continues to evolve rapidly in response to increasing threats and technological advancements. Organizations across various sectors face sophisticated cyber-attacks, including ransomware, phishing, and supply chain attacks, which have grown in both frequency and complexity. Regulatory bodies worldwide are expanding and implementing stricter laws, compelling businesses to adopt more robust cybersecurity measures. Additionally, the rise of AI and machine learning plays a dual role, offering enhanced security solutions while also being leveraged by cybercriminals to execute more advanced attacks. Yet, By the end of the 2025, the cost of cyber-attacks on the global economy is predicted to top $10.5 trillion. Therefore, the emphasis on cybersecurity resilience, employee training, and the integration of advanced technologies remains paramount as organizations strive to protect their digital assets and maintain trust with stakeholders.
Morrison Foerster’s renowned Privacy + Data Security Group wants to help you identify the risks and make sure you and your organization are prepared for a potential major security breach or ransomware attack. Our Privacy + Data Security Litigation team can help your company with potential litigation arising from a breach. Join us in our #MoFoCyberAware media and thought leadership series and take advantage of the complimentary resources and tools we have gathered to help protect yourself online and reduce cybersecurity risks.
Five Things to Know About the EU Cybersecurity Framework
Alex van der Wolk discusses how the EU has been bolstering its stance on cybersecurity through the implementation of various regulations.
Responding to a Cyber Security Incident – Best Practices
Morrison Foerster invites you to join an interactive webinar where you will learn more about the best practices for responding to a cybersecurity incident.
The SEC’s Controls-Based Approach to Cybersecurity Enforcement Continues, with an Accounting Twist
This settlement marks the SEC’s second application of Section 13(b)(2)(B) to cybersecurity controls in the aftermath of cyber incident threat actors accessing a public company’s IT systems and networks.
Cybersecurity Regulations State of Play: EU vs China
This webinar discusses cybersecurity initiatives underway in the EU and assesses how they match up to what China’s cybersecurity laws have been developing into over the last few years.
The SEC’s Risk Disclosure and Controls Claims Against SolarWinds Fall to the Cutting Room Floor
The decision represents a significant victory for SolarWinds and undoubtedly will affect the future scope of SEC cybersecurity enforcement and strategy.
An Unprecedented Cross-Border Data Regulatory Regime: The Biden Administration Announces New Program to Shield Sensitive U.S. Data
While in its infancy, the regulatory regime will be unprecedented and will impact any entity operating in the United States that collects or sells data within the program’s ambit. Read our analysis.
Getting it Across - Quick Cybersecurity Tips
Watch our cybersecurity crossword video series to see if you can complete the mini crossword before we do and get quick tips on protecting your data.
CISA’s Very Broad Proposed Rule for “Critical Infrastructure” Entities to Report Cyber Incidents
Next year, a lot more companies, including many that have not considered themselves to be critical infrastructure, may be required to report cyber incidents to the U.S. government.
EU Cyber Resilience Act Raises the Cybersecurity Bar for Digital Products
The EU Cyber Resilience Act (the CRA) is one legislative step away from becoming law and focuses on bolstering the cybersecurity of products with digital elements (PDE).