Recognizing that cyberattacks have already commenced and could spread beyond the Russian-Ukrainian battlefield, organizations can take several steps to protect themselves. They can recognize the risk. Then organizations can assess likely cyber threats and vulnerabilities, build resilience and take preventive actions, to avoid becoming another casualty in a conflict that already has too many.
Read the full alert on the Faegre Drinker website.
The material contained in this communication is informational, general in nature and does not constitute legal advice. The material contained in this communication should not be relied upon or used without consulting a lawyer to consider your specific circumstances. This communication was published on the date specified and may not include any changes in the topics, laws, rules or regulations covered. Receipt of this communication does not establish an attorney-client relationship. In some jurisdictions, this communication may be considered attorney advertising.
About the Author: Paul Luehr
Paul Luehr is a partner in the firm's Intellectual Property group. Read Paul's full bio on the Faegre Drinker website.
About the Author: Ken Dort
Ken Dort is a partner in the firm's Intellectual Property group. Read Ken's full bio on the Faegre Drinker website.
About the Author: David Porteous
David Porteous routinely counsels clients in the investment management, broker-dealer and financial services industries on regulatory matters including examinations, investigations and enforcement proceedings as well as complex civil and securities-related litigation. In addition, he assists clients in developing and implementing compliance and regulatory risk management plans and represents clients in complex civil and securities litigation. Read David's full bio on the Faegre Drinker website.
About the Author: Peter Baldwin
Peter Baldwin draws on his experience as a former federal prosecutor to counsel clients facing government investigations and cybersecurity issues. View Peter's full bio on the Faegre Drinker website.
About the Author: Jason G. Weiss
Jason G. Weiss leverages a past career as a cybersecurity and computer forensics Supervisory Special Agent with more than 22 years of decorated service at the FBI to guide clients through the complex and high-stakes issues associated with cybersecurity incident preparedness and response and compliance. View Jason's full bio on the Faegre Drinker website.
About the Author: Mitch Noordyke
Mitchell Noordyke leverages a background in data analytics to guide clients through the practical application of federal and state privacy and cybersecurity laws to their business, and he develops privacy and cybersecurity practices, protocols and compliance strategies. Read Mitch's full bio on the Faegre Drinker website.
About the Author: Jane Blaney
Jane Blaney assists clients seeking solutions related to insurance matters, with concentrated knowledge in health insurance, health insurance regulation and technology services. View Jane's full bio on the Faegre Drinker website.
Receive Email Alerts to New Articles