Tag Archives: Cybersecurity

17 Measures Manufacturing Companies Should Consider to Reduce the Risk of Cyber-Intrusions

Cybersecurity
Computers are integral throughout the manufacturing process. At every step in the supply chain, there are computers collecting and acting on thousands of data points. As a result, cybersecurity has become a vital consideration throughout the manufacturing industry. Whether it’s protecting data and privacy in the increasingly connected products being manufactured, or replacing vulnerable legacy … Continue reading this entry

Expect IoT to Continue Redefining Customer Experience in 2017

The Internet of Things (IoT) is widely discussed as a revolutionary movement that will continue to have a pervasive impact on our personal and professional lives. But, as is the case with most technological advances that make life more convenient, there are some considerations that must be understood and appreciated by manufacturers as a result … Continue reading this entry

Employee Error Accounts for Most Security Breaches

A recent study by a well-known information security company captures one of the most common information security fallacies: that information security is a technology problem. Most manufacturers, along with many other businesses, view mitigating information security risks as falling squarely in the purview of their information technology department. However, this study reports that human error … Continue reading this entry

Cybersecurity Issues in Focus at Upcoming HNBA Conference

The Hispanic National Bar Association (“HNBA”) will gather for its annual corporate counsel conference on March 17, 2016 in Las Vegas, where presentations and discussion will focus on technology and cybersecurity issues that have the potential to significantly impact manufacturers in 2016 and beyond. The theme of the HNBA conference is “Embracing Technology,” and is further confirmation … Continue reading this entry

Top Trends to Watch for in 2016

Cybersecurity Manufacturers continued to face challenges and find opportunities related to cybersecurity in 2015, and those trends can only be expected to intensify in 2016. New laws and new threats (discussed in more detail here and here) have either incentivized or required manufacturers to evaluate their cybersecurity strengths and weaknesses, then capitalize on the former and … Continue reading this entry

We’re All About Sharing Cyber Information: The National Cybersecurity and Communications Integration Center

Amidst the maelstrom of unceasing cyber attacks and intrusions, the National Cybersecurity and Communications Integration Center (NCCIC or Center) assumes a front-and-center role as the government command and communication center. As a part of the Department of Homeland Security (the Department), the NCCIC is charged with sharing information about cybersecurity intrusions, incidents, risks, and analysis … Continue reading this entry

Needed Now: Experienced and Talented Cybersecurity Professionals to Protect Government Data Systems

The announcement on June 4th of a massive cybersecurity attack that compromised data stored on Office of Personnel Management (OPM) systems for 4.2 million current and former federal employees is the most recent head-smacking report of how porous the government’s cyber defense systems apparently are. It is also another searing reminder of how vulnerable United … Continue reading this entry

Top Three Cybersecurity Misconceptions

Cybersecurity is an issue that should be top-of-mind for all manufacturers. But there are three misconceptions about cybersecurity that can put companies in all industries at significant risk. In this short video, Foley Partner Michael Overly discusses these misconceptions and how companies should change their views of and approaches to cybersecurity.… Continue reading this entry

Congressional Action Supports Improvement of Cybersecurity for Critical Infrastructure and Beyond

None of us in the United States – no family or individual, no industry or business, and no government agency – is immune from the potential devastation that cyber-attacks can wreak. No particular reminder is needed. Each day, our nation’s economic and national security must guard against attack or threat of cowardly villainy at home … Continue reading this entry

“Forewarned Is Forearmed” - The Rise of Chinese Data-Flow Restrictions

Manufacturers with operations, employees, and/or customers in China must be aware of a long list of China-specific data-flow and content restrictions. Data-flow restrictions in particular affect manufacturers employing or launching mobile apps and other IT initiatives, both internal and external. Manufacturers must be very sensitive to China’s rules and guidelines restricting data flow, as these … Continue reading this entry

Cybersecurity Workforce Measures Present Business Opportunities

As part of the federal government’s efforts to address cybersecurity needs in our age of state-sponsored hacking and other high-profile data breaches, the Department of Homeland Security (DHS) will soon undertake a Congressionally-mandated review of cybersecurity resources. In just two months, the Secretary of DHS will be required to conduct the first assessment of the … Continue reading this entry

A New Cyber World Framework to Strengthen Agency Information Security

Manufacturers, defense suppliers and other federal contractors may benefit from a new cybersecurity law intended to safeguard agency information and help bolster defenses to future cyber threats. The Federal Information Security Modernization Act of 2014 (FISMA II or the Act) recently was enacted to update its 2002 model by adapting to current-era cyber realities. It … Continue reading this entry

IoT – Designing Privacy and Security Into Devices

A few weeks ago, the FTC released a report on the Internet of Things (IoT) which provides critical guidance for all companies and presents valuable information for manufacturers on designing privacy and security into their devices. This year, there are estimated to be over 25 billion connected devices – or items with sensors that communicate … Continue reading this entry

The Government's Strategy to Combat the "Cyber Arms Race"

In the midst of ongoing, escalating and increasingly troublesome reports of large-scale corporate cyber breaches, the federal government is trying to fight back more forcefully with a dual strategy to shore up agency capability and exchange information with industry in a “shared mission.” Recently, it added five newly enacted cybersecurity laws to its arsenal – … Continue reading this entry

Top Three Trends From 2014 to Influence Government Contractors in 2015

This post is co-authored by Tamara Jack of LMI.   Federal government contractors, especially those in the manufacturing sector, continue to experience the economic impact of budget cuts, decreased federal spending, and increased regulatory requirements. Nonetheless, the federal government continues to be one of the largest consumers in the country, spending more than $500 billion … Continue reading this entry

Trends in Chinese Regulation for Manufacturers to Watch in 2015

In China, there are an overwhelming number of measures to govern almost all aspects of the process of manufacturing a product, bringing that product to market, and maintaining that product’s integrity and competitiveness in the marketplace. However, the application of these laws varies significantly across agencies, subject matters and internal jurisdictions.… Continue reading this entry

Trade Secrets – Protecting the (Corporate) Family Jewels

Disputes regarding trade secrets and corporate espionage are becoming perpetual fixtures in the news. One of the most common scenarios is that a key employee departs to join a competitor and his or her former employer quickly learns that, just before departing, the former employee copied critical proprietary information to an external drive or uploaded … Continue reading this entry