Cybersecurity Law Is A Dynamic Landscape

We Aim To Provide Clients With Clarity


In our increasingly data-first world, cybersecurity is more critical than ever in guarding against cyberattacks that can be catastrophic. In light of the ever-expanding and critical nature of cybersecurity, laws of cybersecurity are dynamic and growing, with several laws in effect, ranging from the EU and UK versions of the GDPR, US state-specific laws such as California’s CCPA as amended by the CPRA and New York’s SHIELD Act and the NYDFS cybersecurity regulation, as well as sector-specific laws such as HIPAA for health information, to the GLBA for financial data, and the SEC’s cybersecurity breach disclosure rules. Layered on top of these laws are cybersecurity frameworks and standards, such as those from the NIST, as well as regulatory guidance, including the UK’s National Cyber Security Centre (NCSC) guide to CEOs on cyber incident response. Furthermore, with the proliferation of artificial intelligence, cybersecurity regulations and standards are becoming increasingly prominent.

While many of these laws have a privacy-specific focus, such as how data can be processed, they also have cybersecurity components, such as the kinds of security needed to ensure the safety and integrity of information to the required procedures that must be followed in the event of a data breach, including regulator and consumer notification. While larger businesses operating globally have larger risk vectors in the cybersecurity context, even smaller businesses must contend with cybersecurity and, by extension, cyberattacks.

Some examples of cybersecurity, privacy, and related data protection laws having an impact on companies, including via enforcement actions, include the following:

At RICHT, we recognize the importance of having a cybersecurity lawyer to advise businesses on navigating today’s digital and dynamic regulatory frameworks, alongside an ever-evolving threat landscape. We focus on helping clients avoid costly legal cybersecurity risks and mitigate damage from cybersecurity incidents and matters that may arise. Whether it is incident and breach response and notification to data privacy and protection, we work closely with our clients to develop tailored strategies that meet their unique needs. In addition, in conjunction with RICHT&Co., we offer a range of technical services, including vulnerability assessments and penetration testing, to help our clients identify and address potential security vulnerabilities before they can be exploited. In addition, clients benefit from reputational risk management and PR strategy via Baker Hartford.


Cybersecurity Law Services We Offer



Some Of The Types Of Clients We Can Help


Defense

Education

eCommerce

SaaS

Manufacturers

Energy

Hospitality

AI

Financial Institutions

Healthcare

Technology

Startups






Find Out About How A Cybersecurity Lawyer Can Provide You With Clarity



    Cybersecurity Law News

    • A Quantum of Context: Cybersecurity Law After Q-Day: Experts warn that future quantum computers will eventually compromise current encryption, necessitating a shift toward post-quantum cryptographic standards. Organizations must address “harvest now, decrypt later” risks to ensure long-term data protection and regulatory compliance. OUR TAKEAWAY: Companies should immediately inventory sensitive data and adopt crypto-agile frameworks to mitigate emerging quantum-enabled threats and satisfy evolving legal reasonableness standards. Read More →
    • California’s CCPA Cybersecurity Audit Rule Takes Effect: What Businesses Need to Know: Effective January 1, 2026, new CCPA regulations mandate that businesses with “significant risk” data processing activities must conduct annual independent cybersecurity audits, with staggered certification deadlines beginning in April 2028. The rules require these audits to be performed by objective professionals who must validate security measures using concrete evidence rather than management assertions. OUR TAKEAWAY: Organizations should immediately conduct a scoping analysis to determine if their processing triggers the “significant risk” threshold and establish a strictly independent audit function to ensure future certifications are defensible and evidence-based. Read More →
    • Cybersecurity Law Key Terms: The IAPP has published a comprehensive glossary designed to standardize the language used by legal and security professionals in the rapidly evolving field of cybersecurity law. Developed with input from industry experts, this resource defines critical concepts found in U.S. federal and state laws—such as “advanced persistent threat,” “breach notification,” “data minimization,” and “cybersecurity risk”—bridging the gap between technical operations and legal compliance requirements. Read More →
    • China: Amendments to the Cybersecurity Law Come Into Effect: Effective January 1, 2026, significant amendments to China’s Cybersecurity Law have introduced new provisions focused on the development and ethical oversight of artificial intelligence (AI). The updated law aims to support infrastructure for AI training and computing power while simultaneously strengthening security risk monitoring and increasing fines for the illegal sale of key network equipment. These changes also improve alignment with the Personal Information Protection Law (PIPL), signaling a more integrated approach to data security and technological innovation in the region. Read More →
    • Eight European Cyber Priorities for Legal Counsel and CISOs in 2026: As European cybersecurity regulation shifts from preparation to active enforcement, legal and security leaders must navigate a complex landscape defined by the NIS2 Directive, the Cyber Resilience Act (CRA), and sector-specific frameworks like DORA. Key priorities for 2026 include tracking fragmented NIS2 implementation across all 27 Member States, meeting new product-security obligations for digital goods, and preparing for increased regulatory audits and personal management liability. Organizations are urged to embed these requirements into corporate governance, supply-chain management, and incident-response frameworks to ensure business continuity and regulatory compliance. Read More →
    • How to Reassure Stakeholders When Facts Are Still Unknown During Cyber Incidents: As cyber threat actors increasingly adopt “triple extortion” tactics like swatting and DDoS attacks to pressure organizations, legal and communications experts emphasize the importance of maintaining stakeholder trust even when forensic investigations are incomplete. By implementing holistic scenario planning and coordinated messaging strategies, companies can navigate the perilous gap between an initial breach and the validation of facts, ensuring they fulfill regulatory and contractual notification obligations without making premature public refutations that could lead to legal liability. Read More →
    • Privacy Pros as Cybersecurity Champions: Six Key Actions:
      Privacy and security teams thrive when working together, blending expertise to strengthen defenses. Privacy professionals bring a deep understanding of data lifecycles, identify hidden risks, and embed privacy insights into security operations. Their collaboration reduces blind spots, minimizes attack surfaces, improves incident response, and ensures actionable risk management—from live data inventories to vendor oversight and internal misuse monitoring. This integrated approach transforms privacy from a compliance checklist into a core cybersecurity strength.
      Read More →
    • The Defense Department’s Cybersecurity Requirements Go Live:
      Beginning November 10, 2025, the Department of Defense will require contractors and subcontractors handling sensitive information to have a current Cybersecurity Maturity Model Certification (CMMC) at the specified level to receive contract awards. All compliance must be verified before contracts or subcontracts are issued, ensuring robust cybersecurity throughout the supply chain.
      Read More →
    • California Adopts Cybersecurity Audit Rule: The California Privacy Protection Agency requires certain businesses to conduct annual independent audits if their data practices pose significant privacy or security risks. Audits must evaluate safeguards like authentication, encryption, and incident response, identifying gaps and recommending fixes. Compliance is phased by company size, with largest firms first. These rules define “reasonable cybersecurity” under CCPA, aligned with standards like NIST. Read More →
    • FTC Order with GoDaddy Finalized Over Lax Data Security: On May 21, 2025, the Federal Trade Commission (FTC) finalized its order with GoDaddy over allegations that GoDaddy “failed to implement standard data security tools and practices to protect customers’ websites and data.” Read More →
    • Chambers 2025 Global Practice Guide for Cybersecurity: The newest editions of the Chambers Global Practice Guides have been published. Sidley lawyers have contributed to: Cybersecurity2025. These publications cover important developments across the globe and offer insightful legal commentary for businesses on issues related to cybersecurity, including global cooperation to combat cybercrime, international agreement on ‘Software Security by Design,’ a global approach to policy on artificial intelligence, and more. Read More →
    Government Contracts & Investigations Blog

    Navigating the New Cybersecurity Regulatory Landscape Post-Chevron

    On June 28, 2024, in a landmark decision, the Supreme Court overruled the four decade old case Chevron v. Natural Resources Defense Council. This pivotal decision should spur businesses to recalibrate their existing relationship with federal agencies. Indeed, we have already seen industry groups begin to use the overruling to influence agency rulemaking, signaling a future of significant shifts in the regulatory landscape. For those operating in regulated industries—including government contractors, and particularly those navigating the complex world of cybersecurity regulation—understanding the implications of the decision is crucial.

    Cybersecurity Law
    Legal Dive

    Judge Deals Major Blow To SEC’s Cybersecurity Enforcement Stance

    Judge Paul Engelmayer of the U.S. District Court for the Southern District of New York last week dismissed much of the case, including the SEC’s claim that a cybersecurity failure can be punished as an “internal accounting controls” violation under Section 13(b)(2)(B) of the Securities Exchange Act.

    Cybersecurity Law
    DARKREADING

    White House Fills In Details Of National Cybersecurity Strategy

    While the plan may convey the right kind of urgency, it lacks both funding and bipartisan support, industry professionals say.

    Cybersecurity Law
    ZDNET

    NY AG Notifies 17 Companies of Breaches, Says 1.1 Million Accounts Compromised in Attacks

    Seventeen companies have been informed of cyberattacks that compromised user information by New York Attorney General Letitia James following an investigation into credential stuffing. More than 1 million customer accounts were compromised due to the attacks, which James said were previously undetected.

    Cybersecurity Law

    Our Insights