Cybersecurity Resource Center
Miriam Wugmeister from Morrison Foerster and Yinan Yang from CrowdStrike will break down the key concepts every lawyer needs to understand when advising during a cybersecurity incident.

Cybersecurity Resource Center
“Preparedness against cyber threats is best done together.”
—Juhan Lepassaar, ENISA Executive Director (European Union Agency for Cybersecurity)
Today’s emerging digital environment is treacherous. Bad actors have proliferated and grown more sophisticated, becoming a persistent and evolving threat. Information technology continues to be integrated into all aspects of our society and IT networks have become more complex and reliant on the software and systems of third-party vendors, who themselves may experience incidents affecting customer data. Artificial intelligence (AI) and machine learning (ML) have presented themselves as important tools with the potential to enhance our world through their use in cyber-defense against increasingly sophisticated and malicious malware, ransomware, and social engineering attacks. However, AI and ML can be double-edged swords when used by hackers for advanced attacks, and other bad actors in the creation of deep fakes and bots, which are already rampantly spreading misinformation. As the metaverse comes more online, it too, will serve as a new area for exploitation. These vulnerabilities increase our risk and may lead to wide-scale or high-consequence cybersecurity events that could harm or disrupt services on which our global economy and peoples’ daily lives depend. For both public and private organizations, developing and implementing tailored cybersecurity plans and processes is key to protecting and maintaining operations.
We work with clients to help them be aware of critical cyber risks, prepare for incidents, and take steps to reduce the likelihood and impact of a potentially damaging compromise. We have served as lead counsel on some of the highest profile ransomware attacks and other cyber breaches of recent years, coordinating all response components, including responding to regulatory inquiries and investigations, defending clients in multi-jurisdiction litigation, engaging on public and customer relations issues, advising on contractual obligations and remedies, and working with forensic investigators, credit monitoring firms, and crisis communication professionals to provide an integrated, cost-effective, and seamless response to data security incidents.
In addition to data loss, these incidents raise significant business and legal risks, including damage to brand and reputation, disruption of business operations, and triggering of contractual and regulatory obligations. We have helped Fortune 500 companies and other leading organizations respond to dozens of significant ransomware incidents and have experience with wide-ranging ransomware variants including Akira, BlackCat/ALPHV, LockBit, Conti, Ryuk, REvil/Sodinokibi, WastedLocker, Maze, MegaCortex, Nephilim, SunCrypt, and Harma.
Morrison Foerster’s renowned Data, Cyber + Privacy Group wants to help you identify the risks and make sure you and your organization are prepared for a potential major security breach or ransomware attack. Our Data, Cyber + Privacy Litigation team can help your company with potential litigation arising from a breach. Join us in our #MoFoCyberAware media and thought leadership series and take advantage of the complimentary resources and tools we have gathered to help protect yourself online and reduce cybersecurity risks.
The Lawyer’s Field Guide to Cybersecurity Incidents
Miriam Wugmeister from Morrison Foerster and Yinan Yang from CrowdStrike will break down the key concepts every lawyer needs to understand when advising during a cybersecurity incident.
North Korean IT Workers: Recent Developments, Risks & Best Practices
Increasingly, the DPRK is disguising remote North Korean IT workers as U.S. based contractors—allowing them to evade U.S. sanctions, generate revenue for the regime, and potentially compromise networks.
CTRL+ALT+DEFEND: Insights on Emerging Threats and Best Practices for Cyber Risk Mitigation
Join Kaylee Bankston and Linda Clark for an engaging and informative webinar exploring the most pressing cybersecurity topics of 2025 and beyond.

How the New DOJ Rules on Sensitive Bulk Data Will Impact Your Company
The clock is ticking – U.S. companies that share “sensitive bulk data” with non-U.S. entities have until early April to comply with the new requirements under DOJ’s Sensitive Bulk Data Security Regulation.

Trump Issues Executive Order on Cybersecurity Rolling Back Some Prior Policies and Introducing New Ones
Last week, the Trump administration made its priorities clear for the nation’s cybersecurity posture in the form of the newly issued executive order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13964 and Executive Order 14114” (the “Order”).

China’s New CBDT Regime: One Year On
China rolled out its “new,” streamlined cross-border data transfer (CBDT) regime on March 22, 2024, with the issuance by the Cyberspace Administration of China (CAC) of the Provisions on Facilitating and Regulating Cross-Border Data Flows (《促进和规范数据跨境流动规定》, the CBDT Provisions)

DOJ Bulk Sensitive Data Regulations Update: New Compliance Guidance and Temporary Non-Enforcement Policy for Companies Working in Good Faith to Achieve Compliance
On Friday, April 11, 2025, the U.S. Department of Justice (DOJ) issued guidance about how the regulations would be applied, namely, a Compliance Guide and answers to 108 Frequently Asked Questions.

This webinar discusses cybersecurity initiatives underway in the EU and assesses how they match up to what China’s cybersecurity laws have been developing into over the last few years.

Responding to a Cyber Security Incident – Best Practices
Morrison Foerster invites you to join an interactive webinar where you will learn more about the best practices for responding to a cybersecurity incident.

The SEC’s Controls-Based Approach to Cybersecurity Enforcement Continues, with an Accounting Twist
This settlement marks the SEC’s second application of Section 13(b)(2)(B) to cybersecurity controls in the aftermath of cyber incident threat actors accessing a public company’s IT systems and networks.

Five Things to Know About the EU Cybersecurity Framework
Alex van der Wolk discusses how the EU has been bolstering its stance on cybersecurity through the implementation of various regulations.

An Unprecedented Cross-Border Data Regulatory Regime Version 3.0: Department of Justice Issues Final Rule Regulating Bulk Sensitive Data Transfers
The U.S. Department of Justice (“DOJ”) released final guidance on its new regulatory regime governing transactions involving certain sensitive data of U.S. persons and government‑related data and countries of concern. Read our analysis.























