As we approach the end of the year, here are the Top 10 Cybersecurity posts on the Debevoise Data Blog in 2024 by page views. If you are not already a Blog subscriber, click here to sign up.

  1. Managing Cybersecurity Risks Arising from AI – New Guidance from the NYDFS (October 20, 2024)

As cybersecurity risks continue to grow, so does the regulatory landscape. In October 2024, New York’s Department of Financial Services (“NYDFS”) issued guidance to companies governed by Part 500 regarding how to manage growing cybersecurity risks related to AI. In this post, we discuss how companies can comply with NYDFS’s current approach by establishing internal governance committees, conducting a gap assessment against existing controls and standardizing due diligence processes, among other practical tips.

  1. Real-time Deepfakes May Necessitate Enhancements to Wire Transfer BEC Policies (January 8, 2024)

Attackers’ increasing use of deepfake technology may necessitate additional training and enhanced verification protocols to keep companies safe. In this post, we explain how hackers use deepfakes to promulgate business email compromise (“BEC”) scams and discuss three ways companies can help mitigate the risks those scams pose. Hint: training is the key mitigation measure.  We also offer suggestions about what to do in the event of a BEC attack, when timely disclosure is key to mitigating regulatory penalties.

  1. EU Digital Operational Resilience Act (“DORA”): Incident and Cyber Threat Reporting and Considerations for Incident Response Plans (May 13, 2024)

In January 2025, the EU’s Digital Operational Resilience Act will go into effect, imposing reporting requirements on financial institutions in the aftermath of cyberattacks. In this post, we take a closer look at DORA’s Information and Communications Technology-related incident and cyber threat reporting obligations (which can require notifications in as little as four hours) and how covered entities can prepare to address them within their existing incident response plans.

  1. CISA Proposes Major Reporting Obligations for Critical Infrastructure (April 8, 2024)

In March, the Cybersecurity and Infrastructure Security Agency proposed a rule (based on the Cyber Incident Reporting for Critical Infrastructure Act) which would mandate cybersecurity incident reporting for critical infrastructure entities starting in 2026. If enacted, this rule would cause a dramatic shift in the regulatory landscape, swapping voluntary partnership agreements for detailed reporting requirements and threatening criminal prosecution in the event of non-compliance. In light of the rule’s broad application and stringent penalties, this post arms readers with practical recommendations for ensuring compliance come 2026, assuming the law remains the same in the new administration.

  1. NIST Releases Most Significant Update to Cybersecurity Framework Since 2014 (March 14, 2024)

In February, the National Institute of Standards and Technology released version 2.0 of its voluntary risk management Cybersecurity Framework, significantly updating its prior 2014 version with stricter internal requirements for companies. Although compliance is voluntary, the Framework is increasingly used by regulators like the FTC and SEC as a benchmark for cybersecurity maturity. This post provides a detailed explanation of how to utilize the Framework to mitigate the risk of cyberattacks.

  1. Top 10 Cybersecurity Measures for Deploying AI Systems from the NSA, FBI and CISA (May 2, 2024)

Like other technologies, integrating AI into business practices poses cybersecurity risks. This blog post draws on a joint report from leading agencies to highlight 10 key cybersecurity measures that companies should consider when deploying AI systems. Read this post for a summary of the report’s top recommendations on mitigating risks while benefiting from the advances that AI offers.

  1. Helpful Guidance on Managing AI-Related Cybersecurity Risks from Hong Kong’s SFC (November 19, 2024)

In a circular issued November 12, 2024 (the “Circular”), the Hong Kong’s Security and Futures Commission (the “SFC”) outlined its expectations for how licensed corporations should manage risks associated with AI language models. In the Circular, the SFC addresses cybersecurity, AI governance, and operational risks, recommending that companies implement measures commensurate with the magnitude of risk and impact. In this blog post we cover key takeaways from the circular.

  1. Making Tabletop Exercises Worth the Time and Resources (October 25, 2024)

In today’s threat environment, preparing for a cyberattack is essential, and tabletop exercises can help companies assess their strengths and vulnerabilities without all the pressures of a real crisis.  Many companies have been conducting tabletops for years, but crafting an exercise that is worth executives’ time takes considerable planning and insights gained from the trenches of actual incidents. This blog post outlines our top goals for a tabletop and common lessons from these exercises.

  1. The EU’s Draft NIS2 Regulations: Appropriate ICT Security Measures and Serious Incident Reporting (August 12, 2024)

Effective October 2024, a regulation under the second Network and Information Systems Directive details the EU’s new security requirements and cyber incident reporting triggers. This blog post unpacks the regulation’s requirements—many of which are now in effect—imposing obligations on companies such as cloud computing providers, social media platforms, and many more which may not immediately meet the eye as covered entities.

  1. Part 500, One Year Later (Part Two) – Defining “Material Compliance” (November 13, 2024)

Each year, covered entities must certify that they have materially complied with the New York Department of Financial Services’ (“NYDFS”) Cybersecurity Regulation (“Part 500”). Ahead of the April 2025 certification deadline, this blog post, the second in a two-part series, discusses what constitutes “material compliance.” Since NYDFS has not specifically defined the term, each covered entity must decide for itself whether it has met the requirements, assessing various factors related to the covered entity and its potential noncompliance. This post offers practical guidance to assist covered entities in making these individualized determinations.

  1. Treasury’s Report on AI (Part 2) – Managing AI-Specific Cybersecurity Risks in the Financial Sector (July 3, 2024)

This blog post, the second in a two-part series on the Treasury’s report, Managing Artificial Intelligence-Specific Cybersecurity Risks in the Financial Services Sector (the “Report”), summarizes the benchmarking that Treasury did on the efforts of financial services companies to deal with AI-enhanced cybersecurity risks and how firms can respond. This post walks through risks of, and potential responses to, AI-enhanced social engineering, malware, disinformation, data poisoning, data leakage, evasion, and model extraction. Finally, it recommends measures to strengthen AI system supply chains, design, and deployment, as well as ways to keep up with the evolving regulatory landscape.

***

To subscribe to the Data Blog, please click here.

Author

Charu A. Chandrasekhar is a litigation partner based in the New York office and a member of the firm’s White Collar & Regulatory Defense and Data Strategy & Security Groups. Her practice focuses on securities enforcement and government investigations defense and cybersecurity regulatory counseling and defense.

Author

Luke Dembosky is a Debevoise litigation partner based in the firm’s Washington, D.C. office. He is Co-Chair of the firm’s Data Strategy & Security practice and a member of the White Collar & Regulatory Defense Group. His practice focuses on cybersecurity incident preparation and response, internal investigations, civil litigation and regulatory defense, as well as national security issues. He can be reached at ldembosky@debevoise.com.

Author

Avi Gesser is Co-Chair of the Debevoise Data Strategy & Security Group. His practice focuses on advising major companies on a wide range of cybersecurity, privacy and artificial intelligence matters. He can be reached at agesser@debevoise.com.

Author

Gareth Hughes is a partner in the firm’s Hong Kong office and a member of the International Dispute Resolution Group. His practice focuses on major commercial litigation, international arbitration and white collar / regulatory defense matters. He can be reached at ghughes@debevoise.com.

Author

Erez is a litigation partner and a member of the Debevoise Data Strategy & Security Group. His practice focuses on advising major businesses on a wide range of complex, high-impact cyber-incident response matters and on data-related regulatory requirements. Erez can be reached at eliebermann@debevoise.com

Author

Jim Pastore is a Debevoise litigation partner and a member of the firm’s Data Strategy & Security practice and Intellectual Property Litigation Group. He can be reached at jjpastore@debevoise.com.

Author

Caroline Swett is a partner in Debevoise’s Financial Institutions and Banking Groups. She advises domestic and foreign banks and other financial institutions on a wide range of regulatory, enforcement and transactional matters. She can be reached at cnswett@debevoise.com.

Author

Marshal Bozzo is a regulatory counsel based in the New York office and a member of the Debevoise Insurance Regulatory practice. He can be reached at mlbozzo@debevoise.com.

Author

Matthew Kelly is a litigation counsel based in the firm’s New York office and a member of the Data Strategy & Security Group. His practice focuses on advising the firm’s growing number of clients on matters related to AI governance, compliance and risk management, and on data privacy. He can be reached at makelly@debevoise.com

Author

Robert Maddox is International Counsel and a member of Debevoise & Plimpton LLP’s Data Strategy & Security practice and White Collar & Regulatory Defense Group in London. His work focuses on cybersecurity incident preparation and response, data protection and strategy, internal investigations, compliance reviews, and regulatory defense. In 2021, Robert was named to Global Data Review’s “40 Under 40”. He is described as “a rising star” in cyber law by The Legal 500 US (2022). He can be reached at rmaddox@debevoise.com.

Author

Johanna Skrzypczyk (pronounced “Scrip-zik”) is a counsel in the Data Strategy and Security practice of Debevoise & Plimpton LLP. Her practice focuses on advising AI matters and privacy-oriented work, particularly related to the California Consumer Privacy Act. She can be reached at jnskrzypczyk@debevoise.com.

Author

HJ Brehmer is a Debevoise litigation associate and a member of the Data Strategy & Security Group. Her practice focuses on cybersecurity incident preparation and response, internal investigations, civil litigation, and regulatory defense. She can be reached at hjbrehmer@debevoise.com.

Author

Stephanie Cipolla is an associate in the Litigation Department and a member of the firm’s Data Strategy & Security practice. Her practice focuses on cybersecurity and data privacy issues, including incident preparation and response. She can be reached at smcipolla@debevoise.com

Author

Jackie Dorward is a litigation associate at Debevoise & Plimpton. She can be reached at jmdorward@debevoise.com.

Author

Melyssa Eigen is an associate in the Litigation Department. She can be reached at meigen@debevoise.com.

Author

Josh Goland is an associate in the Litigation Department.

Author

Martha Hirst is an associate in Debevoise's Litigation Department based in the London office. She is a member of the firm’s White Collar & Regulatory Defense Group, and the Data Strategy & Security practice. She can be reached at mhirst@debevoise.com.

Author

Karen Joo is a law clerk in the Litigation Department at Debevoise.

Author

Gabriel Kohan is a litigation associate at Debevoise and can be reached at gakohan@debevoise.com.

Author

Jarrett Lewis is an associate and a member of the Data Strategy and Security Group. He can be reached at jxlewis@debevoise.com.

Author

Noah L. Schwartz is an associate in the Litigation Department and a member of the Data Strategy & Security practice group. His practice focuses on incident response, crisis management and regulatory counselling. He can be reached at nlschwartz@debevoise.com.

Author

Ned Terrace is an associate in the Litigation Department. He can be reached at jkterrac@debevoise.com.

Author

Stephanie D. Thomas is an associate in the Litigation Department and a member of the firm’s Data Strategy & Security Group and the White Collar & Regulatory Defense Group. She can be reached at sdthomas@debevoise.com.

Author

Annabella Waszkiewicz is a law clerk in the Litigation Department.

Author

Michiko Wongso is an associate in the firm’s Data Strategy & Security Group. She can be reached at mwongso@debevoise.com

Author

Mengyi Xu is an associate in Debevoise's Litigation Department and a Certified Information Privacy Professional (CIPP/US). As a member of the firm’s interdisciplinary Data Strategy & Security practice, she helps clients navigate complex data-driven challenges, including issues related to cybersecurity, data privacy, and data and AI governance. Mengyi’s cybersecurity and data privacy practice focuses on incident preparation and response, regulatory compliance, and risk management. She can be reached at mxu@debevoise.com.