Rick Harris was quoted in the article, "Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part Two of Two)," in The CyberSecurity Law Report. In the article, Rick discusses how service providers can engage outside auditors to conduct a review of controls to prevent significant cybersecurity risks. He recommends that onsite visits are most effective.
On February 5, partners Dan Wenner and Jed Davis will present a webinar, "Cybersecurity Incident Report: Applying Reason And Rigor To Control Chaos," produced by PLAC (formerly the Product Liability Advisory Council).
Day Pitney sponsored a program, "Parade of Corporate Horribles: Responding Ethically to a New Problem Around Every Corner," presented by the Westchester/Southern Connecticut Chapter of the Association of Corporate Counsel (ACC).
Day Pitney White Paper
On September 13, Jed Davis was a featured panelist on a webinar, "The Threat at Your Doorstep: Why You Should be Using Cyber Threat Sharing," produced by Thomson Reuters.
Day Pitney Alert
Jed Davis was quoted in an article, "Rise Of Nation-State Hacks Doesn't Give Cos. A Free Pass," published by Law360.
David Doot, Steven Cash and James Blackburn, IV authored an article, "Risk and Opportunity with the Industrial Internet of Things," which was published in the July-August 2019 issue of The Journal of Robotics, Artificial Intelligence & Law.
Jed Davis was quoted in an article, "Manager Data in Peril from Growing Cyber Threats," published by FundFire, a Financial Times news service for professionals working in the high net worth and institutional investment management industry.
Jed Davis was quoted in an article, "Marriott Hack Shows Risks Of Lax Cyber Diligence In Mergers," published by Law360.
Day Pitney Press Release