Cybersecurity, Cybercrime, & Incident Response

Daniel T. Brown attorney profile image

Washington, DC

T: (202) 661-7020
F: (202) 661-7059
Katherine Cooper attorney profile image

New York, NY

T: (212) 880-3630
F: (212) 825-9828
Barry S. Gold attorney profile image

New York, NY

C: (347) 949-2054
T: (212) 880-3978
F: (212) 880-3998
Thomas J. McGonigle attorney profile image

Washington, DC

C: (202) 680-4941
T: (202) 661-7010
F: (202) 661-7059

New York, NY

T: (212) 880-3624
Katherine M. McGrail attorney profile image

Richmond, VA

C: (347) 899-0434
T: (804) 762-5370
F: (804) 762-5366

New York, NY

Heather B. Middleton attorney profile image

New York, NY

C: (347) 899-0544
T: (212) 880-3980
F: (212) 825-9828
Sharon A. O'Shaughnessy attorney profile image

New York, NY

C: (917) 538-9223
T: (212) 880-3990
F: (212) 880-3998
Robertson Park attorney profile image

Washington, DC

C: (202) 680-4181
T: (202) 661-7022
F: (202) 661-7059
Michael V. Rella attorney profile image

New York, NY

C: (914) 525-1916
T: (212) 880-3973
F: (212) 880-3998
For more information visit Our Team page.

Looking Forward

The coming change of administration in the U.S. promises more aggressive cybersecurity and data privacy enforcement from federal regulators. On the state level, California’s recently passed Privacy Ballot Initiative imposes new privacy rules—in addition to those in the California Consumer Privacy Act—on any business with sufficient contacts with that sta. And internationally, countries around the world are racing to adopt new data protection laws while foreign regulators, particularly those within the EU, are becoming more aggressive in seeking to punish businesses for missteps and noncompliance. At the same time, we expect that private cyber-criminals and sophisticated nation-state actors will continue to target businesses of all sizes and in all industries. Meanwhile, human error and trusted vendors will remain the biggest vectors for cyberattacks. If businesses have not done so already, now is a good time to reassess their cybersecurity and data privacy programs.