

Angle
After a Data Breach: Navigating Long-Tail Legal and Financial Risks
3 Mins
With the number and severity of cyber claims increasing and the passing of stricter consumer data privacy laws, the litigation tail is lengthening.
Read MoreCyber Incident Readiness and Response Implications of the Privacy and Other Legislation Bill 2024
On 12 September 2024, the Australian Government introduced the Privacy and Other Legislation Amendment Bill 2024 (Cth) (Bill). Styled as the first set of a raft of incoming reforms, the Bill sets out a range of new enforcement powers, penalties...
Read MoreCyber Incidents on the Rise: Tips for Effective Data Breach Notification
3 Mins
Cyber incidents have been growing at an exponential rate in recent years. A recent report from the Identity Theft Resource Center found that there were over one billion data breach victims in Q2 of 2024, which is around five times the number of...
Read MoreData Breaches up 72% From Record High: Cyber Incident Readiness Must be Top of Mind
3 Mins
“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materialising. Awareness is no longer enough. It must be coupled with...
Read MoreBreaking Down the New SEC Cybersecurity Rules
4 Mins
On July 26, the Securities and Exchange Commission (SEC) adopted new cybersecurity rules. Organizations will need to disclose material cyber incidents pursuant to a prescribed timeline and information regarding risk management, strategy, and...
Read MoreDeepfakes Bring Deep Risk
3 Mins
Most people know what a deepfake is but have not put much thought into how it could affect business operations. Deepfakes are videos, pictures, or audio that have been convincingly manipulated to misrepresent a person saying something they never...
Read MoreIt’s Time to Blow the Whistle on Deficient Cyber Reporting Programs
4 Mins
What exactly is cybersecurity whistleblowing? That is a question that all organizations should be asking, but the answer is not a simple one. According to the Merriam-Webster dictionary, a whistleblower is defined as an 'employee who brings...
Read MoreHow Thinking Outside Silos Helps Risk Management and Cyber Threat Response
3 Mins
The term “risk” gets tossed around constantly in the corporate world. But who is responsible for defining and managing risk? This answer is not black and white, as risk type and appetite will look different for every organization. What should be a...
Read MoreElevating Cyber Risk Analysis During M&A Due Diligence
4 Mins
Before a deal closes on a merger or acquisition, due diligence investigation will ensue to confirm goal alignment and identify any obstacles present. There are several integral components of this process such as identifying transaction purpose...
Read MoreMandated Cyber and Privacy CLE for New York Attorneys – Will Other States Follow Suit?
3 Mins
The majority of U.S. states require attorneys with active law licenses to complete continuing legal education (CLE) credits. The number of hours, reporting deadlines, and topic requirements differ between jurisdictions. It is not only important...
Read More










