Rick Harris was quoted in the article, "Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part Two of Two)," in The CyberSecurity Law Report. In the article, Rick discusses how service providers can engage outside auditors to conduct a review of controls to prevent significant cybersecurity risks. He recommends that onsite visits are most effective.
On February 5, partners Dan Wenner and Jed Davis will present a webinar, "Cybersecurity Incident Report: Applying Reason And Rigor To Control Chaos," produced by PLAC (formerly the Product Liability Advisory Council).
Day Pitney sponsored a program, "Parade of Corporate Horribles: Responding Ethically to a New Problem Around Every Corner," presented by the Westchester/Southern Connecticut Chapter of the Association of Corporate Counsel (ACC).
Day Pitney White Paper
On September 13, Jed Davis was a featured panelist on a webinar, "The Threat at Your Doorstep: Why You Should be Using Cyber Threat Sharing," produced by Thomson Reuters.
Day Pitney Alert
Jed Davis was quoted in an article, "Marriott Hack Shows Risks Of Lax Cyber Diligence In Mergers," published by Law360.
Day Pitney Press Release
Jed Davis was quoted in a feature article, "The Privacy Fight For Digital Data Warrants Is Just Starting," published by Law360.
Steven Cash was quoted in an article, “Mystery in Mueller Probe: Where’s the Hacking Indictment?,” published by The Hill.
Jed Davis was quoted in an article, “Phantom Arrest Shows Tech Cos. Must Police Own Products,” published by Law360.