Cybersecurity 2025

Last Updated March 13, 2025

USA

Law and Practice

Authors



Freshfields is a global market leader in handling data crises, investigations, class actions, and regulatory engagement. The firm has in-depth experience in cybersecurity ‒ from prevention to governance to responding to incidents ‒ and has a deep bench of cybersecurity and privacy attorneys who provide clients with global coverage from offices around the world, including in the USA, Europe, the UK, and Asia. With a strong market-leading data and cyber practice comprising more than lawyers, Freshfields’ global team of experts works seamlessly at the highest level, leveraging their expertise in crisis management and judicial proceedings to provide high-quality advice. This includes extensive know-how, honed through involvement in hundreds of international cases.

The USA does not regulate cybersecurity under a single, general, nationwide regime. Instead, multiple overlapping regulatory regimes at both the federal and state level address cybersecurity in a sector- or jurisdiction-specific manner. The scope and substantive obligations imposed by each of these regulations address specific aspects of cybersecurity. These aspects can include:

  • technical measures that can be implemented to mitigate the risk of unauthorised access to data;
  • incident response procedures for when data breaches occur; and
  • transparency and reporting requirements.

These regulations serve purposes such as protecting national security, safeguarding personal information (including specific regulations addressing sensitive financial data or health information), and promoting collaboration and innovation. For more information on sector-specific and national security-specific regulations, see 2. Critical Infrastructure Cybersecurity, 3. Financial Sector Operational Resilience Regulation, and 6.3 Cybersecurity in the Healthcare Sector.

At the federal level, the main laws and regulations governing cybersecurity include:

  • the Gramm-Leach-Bliley Act (GLBA) of 1999, which imposes security and transparency requirements on financial institutions’ handling of non-public personal information of customers (see 3.1 Scope of Financial Sector Operational Resilience Regulation for more detail);
  • the Health Insurance Portability and Accountability Act (HIPAA), which regulates the protection of sensitive healthcare-related information (see 6.3 Cybersecurity in the Healthcare Sector for more detail);
  • the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), which regulates disclosure of cyber-incidents by critical infrastructure companies (see 2.1 Scope of Critical Infrastructure Cybersecurity Regulation for more detail);
  • laws and regulations imposing cybersecurity obligations on federal government agencies and contractors, such as the Defense Federal Acquisition Regulation Supplement (DFARS) and the Federal Information Security Management Act; and
  • the SEC’s Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure rules requiring some publicly traded companies to report certain cybersecurity incidents and make disclosures about their cybersecurity strategy, cybersecurity governance, and cybersecurity risk management in public filings.

A number of federal laws and regulations criminalise hacking and otherwise regulate the use of information technology by individuals and law enforcement entities alike. By way of example, the Computer Fraud and Abuse Act criminalises unauthorised access to computer systems, and the Stored Communications Act regulates ISPs’ ability to voluntarily provide stored electronic communications and data to the government and also regulates the manner in which the government may seek compelled access to stored electronic communications and data through legal process. In addition, the Wiretap Act and the Pen Register Act criminalise the unlawful interception of content and non-content data, respectively.

In addition to these cybersecurity-specific laws and regulations, some more general regulations have been enforced with regard to cybersecurity. By example, Section 5 of the Federal Trade Commission Act empowers the Federal Trade Commission (FTC) to regulate and enforce against unfair or deceptive trade practices in general. The FTC and federal courts have interpreted this regulation to permit the regulation and enforcement of cybersecurity where companies’ security practices (and public representations concerning those practices) may qualify as unfair or deceptive.

Finally, in addition to federal regulation, many states impose cybersecurity obligations through statute or regulation. Some states require by statute that companies take reasonable measures to protect sensitive personal information of state residents, with varying levels of specificity as to what measures are required or will be deemed reasonable if employed. Other states have more developed regulatory regimes, including the California Consumer Privacy Act. For more details on cybersecurity regulations promulgated by New York State’s Department of Financial Services (NYDFS), see 6.2 Cybersecurity and AI.

At the federal level, the main cybersecurity regulators include:

  • the FTC, which – as noted in 1.2 Cybersecurity Laws – regulates cybersecurity as part of its broad authority to regulate and enforce against unfair or deceptive trade practices;
  • the Department of Justice (DOJ), the Federal Bureau of Investigation (FBI), and the Department of Homeland Security (DHS), which investigate and prosecute federal criminal activity, including cyber-intrusions and cyber-enabled crime;
  • the DHS, which regulates critical infrastructure and other aspects of national security;
  • the Department of Health and Human Services (HHS), which enforces HIPAA regulations – including those related to data protection – over covered providers; and
  • the SEC, which regulates publicly traded companies and imposes disclosure obligations following cybersecurity breaches.

Federal regulators have the authority to promulgate regulations with the force of law following a public notice-and-comment process, as well as to enforce those regulations through civil investigations (including compulsory disclosure of documents and testimony) and litigation.

At the state level, cybersecurity may be regulated by state Attorneys General or subdivisions within their offices. Some states have established cybersecurity-specific agencies, such as the Utah Cyber Center, and others have conferred authority to sector-specific regulators, such as the NYDFS. For more detail on the NYDFS, see 6.2 Cybersecurity and AI.

In the USA, CIRCIA requires critical infrastructure entities to report covered cyber-incidents to the Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours and ransomware payments within 24 hours. The applicable rules for covered entities under CIRCIA are still under development and it is currently estimated they will go into effect at the end of 2026. The regulation, released in draft form on 4 April 2024, purports to further define the categories of entities and incidents subject to the reporting regime.

The scope of application under CIRCIA is intentionally broad, encompassing entities across all 16 critical infrastructure sectors, as identified by the DHS. These sectors include industries vital to public safety, economic stability, and national security, such as the chemical, critical manufacturing, defence industrial base (DIB), energy, financial services, healthcare, and IT industries.

Sector-Specific Regulations

  • Energy – the Federal Energy Regulatory Commission (FERC) enforces the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Standards, requiring electric utilities to secure cyber-assets, manage supply chain risks, and report incidents under Section 215 of the Federal Power Act (FPA).
  • Transportation – the Transportation Security Administration (TSA) mandates cybersecurity for pipeline, rail and aviation operators through directives requiring incident reporting, risk mitigation, and security plans.
  • Water and waste water systems – the Environmental Protection Agency (EPA) enforces cybersecurity requirements under America’s Water Infrastructure Act (AWIA), requiring utilities serving more than 3,300 people to assess risks and enhance cybersecurity protections.
  • Nuclear – the National Nuclear Security Administration (NNSA) and Nuclear Regulatory Commission (NRC) enforce cybersecurity for nuclear facilities and contractors handling classified data, with strict protections under Title 10, Code of Federal Regulations (CFR) Part 73 and the Department of Energy Cybersecurity Program Plan (CSP).
  • DIB – the Cybersecurity Maturity Model Certification (CMMC) and DFARS 252.204-7012 require defence contractors handling Controlled Unclassified Information to meet National Institute of Standards and Technology (NIST) SP 800-171 standards for cybersecurity and separate departmental requirements obligate certain entities to report identified categories of cyber-incidents.
  • Healthcare – HIPAA mandates cybersecurity protections for electronic protected health information (“ePHI”) under the HIPAA Security Rule, with breach reporting obligations under the HIPAA Breach Notification Rule. See 6.3 Cybersecurity in the Healthcare Sector for more on HIPAA.
  • Other entities handling personal health records – entities not regulated by HIPAA that handle personal health records (PHRs) are required to notify affected individuals under the FTC’s Health Breach Notification Rule (HBNR).

In the USA, critical infrastructure cybersecurity is governed by sector-specific regulations designed to address the unique risks faced by each industry. These requirements aim to enhance resilience against cyberthreats by mandating proactive risk management, incident reporting, and adherence to best practices.

There are a number of sector-specific cybersecurity requirements, as follows.

  • Energy sector – the FERC’s CIP Standards require cybersecurity plans, access controls, and periodic risk assessments.
  • Water and waste water systems sector – the EPA mandates water utilities to incorporate cybersecurity into risk assessments and develop emergency response plans under the AWIA.
  • Nuclear sector – NRC licensees must implement extensive cybersecurity safeguards, including access controls, network monitoring, supply chain risk management, and incident response protocols to prevent cyberthreats from compromising reactor operations or sensitive nuclear materials.
  • Transportation sectors – TSA’s cybersecurity directives require critical infrastructure owners to implement vulnerability assessments, mitigation measures, and cybersecurity plans. Other particular requirements apply to the rail and aviation sectors.
  • Healthcare sector – see 6.3 Cybersecurity in the Healthcare Sector.
  • Financial services sector – see 3. Financial Sector Operational Resilience Regulation (in particular, 3.1 Scope of Financial Sector Operational Resilience Regulation).
  • DIB – the CMMC framework establishes tiered cybersecurity requirements for defence contractors handling controlled unclassified information (CUI), with higher levels requiring measures such as encryption, multifactor authentication, and third-party cybersecurity assessments.

In the USA, incident response and notification obligations for critical infrastructure owners and operators are primarily governed by sector-specific regulations. CIRCIA will apply in addition to, not in replacement of, these sector-specific obligations. Once the CIRCIA regulations are finalised, they will require:

  • cyber-incident reporting – covered entities must report covered cyber-incidents to CISA within 72 hours of determining that a covered incident has occurred; and
  • ransomware payment reporting – entities must notify CISA within 24 hours of making a ransomware payment.

These requirements aim to enable CISA to better co-ordinate incident response efforts and facilitate information sharing between government and private-sector stakeholders. Despite the comprehensive framework, several uncertainties remain, as follows.

  • Covered entities – CISA’s forthcoming regulations will determine which organisations within each sector are subject to CIRCIA obligations. Small or ancillary entities may face ambiguity about whether they fall within the scope.
  • Incident thresholds – CIRCIA has not finalised what constitutes a “covered cyber-incident”. Without CISA’s finalised guidance, entities lack clarity on reporting triggers.
  • Overlapping regulations – entities operating in multiple sectors may face overlapping obligations under federal and sector-specific frameworks (eg, HIPAA versus CIRCIA).
  • Liability protections – while CIRCIA provides limited liability protections for reporting entities, questions remain about their interaction with confidentiality obligations under other frameworks, such as HIPAA or NRC regulations.
  • International implications – organisations operating internationally may need to reconcile compliance with US frameworks such as CIRCIA and foreign standards, including the EU’s Network and Information Security Directive 2 (“NIS2”).

As noted in 2.1 Scope of Critical Infrastructure Cybersecurity Regulation, in addition to the forthcoming CIRCIA requirements, there have already been sector-specific notification requirements in place for quite some time. Those include the following.

  • Energy sector – the NERC, under FERC oversight, requires Bulk Electric System (BES) entities to report cybersecurity incidents that could impact reliability, including operational disruptions, unauthorized access, or attempted compromises, with notification timelines based on the severity of the incident. The most severe incidents (those that successfully compromise BES Cyber Systems and impact reliability) must be reported to the Electricity Information Sharing and Analysis Center (E-ISAC) and CISA within one hour of determination.
  • Water and waste water systems sector – under the AWIA, water utilities must notify local emergency planning committees of any disruptions affecting service delivery, including those caused by cybersecurity incidents.
  • Nuclear sector – the NRC requires immediate notification of cyber-incidents that compromise digital systems essential to nuclear safety, security, or emergency preparedness.
  • Transportation systems sector – the TSA requires pipeline, rail and aviation operators to report identified categories of cybersecurity incidents within 24 hours and conduct post-incident reviews.
  • Healthcare sector – see 6.3 Cybersecurity in the Healthcare Sector.
  • Financial services sector – see 3. Financial Sector Operational Resilience Regulation (in particular, 3.1 Scope of Financial Sector Operational Resilience Regulation).
  • DIB – contractors handling CUI must report cyber-incidents to the Department of Defense (DoD) within 72 hours of discovery.

State governments play a critical role in enhancing resilience and identifying threats to critical infrastructure within their jurisdictions. While the federal government provides overarching guidance and regulatory frameworks, states often act as the frontline co-ordinators for implementing resilience strategies, facilitating information sharing, and supporting critical infrastructure owners and operators.

Resilience Responsibilities

State responsibilities when it comes to enhancing the cyber-resilience of critical infrastructure are as follows.

  • Development of statewide cybersecurity strategies – many states have established cybersecurity offices or task forces to develop and implement strategies aimed at strengthening the resilience of public and private critical infrastructure. These strategies often align with federal initiatives, such as the NIST Cybersecurity Framework, while addressing state-specific risks and priorities.
  • Incident response co-ordination – states frequently serve as co-ordinators for incident response efforts through their state fusion centres and emergency operations centres. These entities work closely with CISA, local governments, and private-sector stakeholders to respond to and recover from cyber-incidents.
  • Infrastructure resilience grants and programmes – states administer federal grant programmes, such as the State and Local Cybersecurity Grant Program, to fund projects that enhance the resilience of critical infrastructure. These grants support initiatives such as system upgrades, cybersecurity training, and vulnerability assessments.

Threat Identification Responsibilities

State responsibilities when it comes to identifying cybersecurity threats to critical infrastructure are as follows.

  • Threat intelligence sharing – state governments act as intermediaries between federal agencies and local entities by disseminating threat intelligence. This includes leveraging the federal Multi-State Information Sharing and Analysis Center (MS-ISAC), which provides cybersecurity threat monitoring, analysis, and early warnings tailored to state and local governments.
  • sector-specific threat monitoring – many states focus on monitoring threats to key sectors, such as water utilities, energy grids, and healthcare facilities, which are often regulated at the state level. State public utility commissions and health departments often collaborate with federal agencies to identify and mitigate threats.
  • Mandatory reporting and oversight – states enforce data breach reporting requirements for businesses and other entities operating within their jurisdiction. Virtually all states have enacted data breach notification laws, requiring organisations to report breaches involving personally identifiable information (PII) to affected individuals and, in many cases, the state Attorney General or other regulatory bodies. For instance:
    1. some states (eg, California) mandate detailed reporting on the nature of the breach and steps taken to address it; and
    2. some state laws also impose specific deadlines for breach notifications, typically ranging between 30–90 days, depending on the jurisdiction.

The Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation (FDIC), and the Office of the Comptroller of the Currency (OCC) (together, the “prudential regulators”) consider cybersecurity to be a component of US financial institutions’ operational risk management framework, as described in the regulatory capital rules and elsewhere.

Title V of the GLBA was the first federal law to require that financial institutions safeguard non-public personal information (NPPI) of their customers. The statute requires each prudential regulator to establish standards for financial institutions to:

  • insure the security and confidentiality of records containing NPPI;
  • protect against “any anticipated threats or hazards” to such records; and
  • protect against unauthorised access of such records (the “Safeguards Rule”).

The Interagency Guidelines Establishing Information Security Standards (the “Security Guidelines”) that derive from this statutory mandate require all financial institutions to have information security programmes that further the objectives of the Safeguards Rule. In 2020, the OCC and the FDIC published a Joint Statement on Heightened Cybersecurity Risk (the “Joint Statement”), which elaborated on the Security Guidelines.

Cybersecurity risks are also addressed in the Interagency Guidelines Establishing Standards for Safety and Soundness (the “Safety and Soundness Guidelines”), which set out broad safety and soundness standards against which financial institutions are evaluated. As with other components of risk management, the prudential regulators expect a financial institution to tailor its cybersecurity risk management system to be proportionate to the size and the complexity of the institution and its risk profile.

In 2020, the prudential regulators published interagency guidance on Sound Practices to Strengthen Operational Resilience (the “Sound Practices”), which brought together existing regulations, guidance, statements and common industry standards for operational resilience. Acknowledging cybersecurity risk as “one of the most important types of operational risk”, the Sound Practices include an appendix with sound practices for managing cyber-risk.

The Federal Financial Institutions Examination Council (FFIEC) – an interagency body that promotes uniformity in the supervision of financial institutions ‒ has also published examination manuals and guidance on cybersecurity risk management, including the FFIEC IT Examination Handbook.

Taken together, these rules, statements and guidelines, as well as the FFIEC examination manuals and supplements, provide the prudential regulators’ most current standards regarding managing cybersecurity risk.

The Bank Service Company Act grants the prudential regulators statutory authority to supervise certain third parties that provide services to financial institutions. In the case of IT, these third-party service providers include core application processors, electronic funds transfer switches, internet banking providers, item processors, managed security service providers, and data storage service providers.

In October 2012, concurrently with the release of the Supervision of Technology Service Providers Booklet (the “TSP Booklet”) of the FFIEC’s IT Examination Handbook (described in 3.1 Scope of Financial Sector Operational Resilience Regulation), the prudential regulators also released the Administrative Guidelines on the Implementation of Interagency Programs for the Supervision of Technology Service Providers. The guidelines describe how technology service providers (TSPs) are assessed for risk using the Uniform Rating System for Information Technology (URSIT). The URSIT score is used to determine the priority, frequency and extensiveness of the examinations of TSPs. TSPs are considered either significant service providers (SSPs), serving a large number of banks and posing higher risk, or regional service providers (RSPs), serving fewer banks and posing less risk.

The Multi-Regional Data Processing Servicer (MDPS) programme is a programme that specifically designates for special monitoring and interagency supervision TSPs that are considered “mission-critical” (vital to the successful continuance of a core business activity) for a large number of financial institutions that are regulated by more than one prudential regulator or provide services through a number of technology service centres located in diverse geographic regions.

the prudential regulators also conduct shared application software reviews (SASRs) to review major software packages used by a significant number of financial institutions or for higher-risk applications in larger financial institutions (such as software packages for use in wire transfer, capital markets, or securities transfer).

Contractual Requirements

Although the prudential regulators have authority to supervise TSPs, financial institutions remain primarily responsible for ensuring that TSPs’ activities are conducted in a safe and sound manner and in compliance with applicable laws and regulations, and face liability for breaches or violations by a TSP. As such, financial institutions are expected to have robust third-party risk management processes, including contract development and ongoing monitoring. As described in the TSP Booklet, contracts between financial institutions and TSPs should include the following:

  • the right to audit and conduct business continuity planning (BCP) testing;
  • measurable service-level agreements (SLAs) for services being provided;
  • default and termination provisions;
  • the need for data security and confidentiality to, at a minimum, adhere to US regulatory standards (for foreign-based service providers);
  • clear definitions of data ownership and handling expectations;
  • the ability to request information describing a TSP’s response to relevant regulations, supervisory guidance, or other notices from federal banking agencies;
  • incident response and notification responsibilities; and
  • the extension of contractual terms to subcontractors.

Financial institutions are required to maintain risk management systems that are proportional to the size and complexity of their organisation (known as “tailoring”). Given that risk management is institution-specific, regulators have not established any processes and controls for cybersecurity risk that are required, but the regulatory guidance and FFIEC manuals described in 3.1 Scope of Financial Sector Operational Resilience Regulation provide standards and best practices to comply with regulators’ objectives. The Joint Statement, described in 3.1 Scope of Financial Sector Operational Resilience Regulation, summarises the elements of effective cybersecurity controls as:

  • “response and resilience capabilities” – review, update and test incident response and business continuity plans;
  • “authentication” – protect against unauthorised access; and
  • “system configuration” – securely configure systems and services.

Incident and Reporting Obligations

The prudential regulators issued a rule, effective as of April 2022, requiring financial institutions to notify their primary regulator of any computer security incidents that rise to the level of “notification incidents”. The final rule defines a “notification incident” as a computer security incident that the financial institution believes could “materially disrupt, degrade, or impair”:

  • “the ability of the banking organi[s]ation to carry out banking operations, activities, or processes, or deliver banking products and services to a material portion of its customer base, in the ordinary course of business;
  • any business line of a banking organi[s]ation, including associated operations, services, functions and support, [where this] would result in a material loss of revenue, profit, or franchise value; or
  • operations of a banking organi[s]ation, including associated services, functions and support, as applicable – the failure or discontinuance of which would pose a threat to the financial stability of the United States”.

Financial institutions must notify their primary regulator as soon as possible and no later than 36 hours after the financial institution determines that a notification incident has occurred. Each prudential regulator has designated their own points of contact for notification, available on each prudential regulator’s website.

Enforcement of the laws and regulations described in 3.1 Scope of Financial Sector Operational Resilience Regulation begins with the supervisory and examination authority of the prudential regulators. For financial institutions, cybersecurity risks are assessed during the course of a full-scope, on-site examination as part of the financial institution’s routine supervisory cycle or during a specialty examination, such as an IT examination. The prudential regulators have the authority to supervise TSPs, as described in 3.2 ICT Service Provider Contractual Requirements, and TSPs are examined based on their risk level as calculated using an URSIT rating. The examinations of TSPs focus on issues such as management of technology, integrity of data, and confidentiality of information. Financial institutions are entitled to copies of the Report of Examination (ROE) of a TSP with which they have a contract.

Cybersecurity control deficiencies are generally not subject to public enforcement actions by prudential regulators unless the financial institution is subject to a major cybersecurity breach. Instead, the prudential regulators may issue a “matter requiring attention” (MRA), a “matter requiring immediate attention” (MRIA), or – in the case of the FDIC ‒ a “matter requiring board attention” (MRBA), which are confidential supervisory findings that require the financial institution to take corrective action. The board of directors is expected to respond to MRAs, MRIAs, and MRBAs through written responses and progress reports, and the prudential regulators will continue to monitor corrective action until resolved. If the corrective action is not satisfactory to the prudential regulators, MRAs and MRIAs could lead to further formal or informal investigation or enforcement action. Formal enforcement actions may take the form of cease-and-desist orders, civil monetary penalty orders, or other actions.

The primary US restrictions on data transfers are not specific to the financial sector but apply more broadly to a range of identified transaction categories. The restrictions were established via Executive Order 14117 (2024) and implemented via DOJ regulation at Title 28, CFR 202.101 et seq and restrict the transfer of certain categories of bulk sensitive data and government information to identified countries of concern. The executive order also identifies certain control measures for defined categories of sensitive transactions that are not outright forbidden.

While other jurisdictions have implemented cyber-resiliency stress testing as part of their supervisory and review process, the USA does not have an equivalent required scenario stress test. Instead, financial institutions are encouraged to use standardised tools that incorporate industry standards and best practices to determine their cybersecurity risk. These tools include FFIEC Cybersecurity Assessment Tool (sunsetting in August 2025), the NIST Cybersecurity Framework, the Center for Internet Security Critical Security Controls, and the Financial Services Sector Coordinating Council Cybersecurity Profile.

Legislation around cyber-resilience continues to develop in the USA, as follows.

  • The Federal Reserve, in co-ordination with the OCC and the FDIC, has issued guidance in the form of a paper on operational resilience that includes an appendix of practices for cyber-risk management.
  • Some regulations impose transparency obligations related to cyber-resiliency. By way of example, the SEC requires publicly traded companies to disclose measures taken to manage certain cyber-related risks. NYDFS regulations (described in greater detail in 6.2 Cybersecurity and AI) impose similar disclosure requirements and technical obligations regarding backup systems to promote resiliency.
  • Draft legislation that would create a task force directed to report on conclusions and recommendations related to protecting critical infrastructure from foreign state-sponsored threats has passed one house of Congress.

Draft legislation would create a task force to consider steps that critical infrastructure companies can take to strengthen resilience against foreign state-sponsored attacks (see 4.1 Cyber-Resilience Legislation).

Unlike Europe, the USA does not have any security certification requirements for information and communications (ICT) products or services. CISA co-chairs the ICT Supply Chain Risk Management Task Force, a PPP that is charged with identifying challenges and solutions for managing risks in the global ICT supply chain. That task force has issued several handbooks and resource guides to help the private sector manage supply chain risk in ICT. Separately, the Federal Communications Commission (FCC) has created a voluntary cybersecurity labelling programme for wireless consumer internet of things (IoT) products – namely, the US Cyber Trust Mark. The Cyber Trust Mark is a label designed to demonstrate to consumers that devices with the label have met robust cybersecurity standards and is expected to launch in 2025.

Federal Data Protection Regulation

At the federal level, the GLBA directs covered financial institutions to provide notices about their information-sharing practices and to implement appropriate safeguards to ensure the security of customer information and protect against unauthorised access to such information. The Safeguards Rule, which is one of the GLBA’s implementing regulations, includes prescriptive security requirements, including implementing a written information security programme. This written information security programme must include risk assessments, access controls, data inventories, encryption, multifactor authentication, logging of access to customer information, regular monitoring and testing, training, and assessments of third-party service providers. The Safeguards Rule also requires covered financial institutions to designate an individual with responsibility for the programme, who must report in writing to the board at least annually. The Safeguards Rule also requires financial institutions to notify the FTC of security breaches involving unauthorised acquisition of at least 500 consumers’ unencrypted information, no later than 30 days after discovering such event.

HIPAA is the primary law that regulates data privacy and security for healthcare providers (see 6.3 Cybersecurity and the Healthcare Sector for more detail).

Additionally, the SEC’s Regulation S-P (“Reg S-P”) requires broker-dealers, investment companies, and registered investment advisers to provide notices about privacy practices, institute written policies and procedures that safeguard customer information, securely dispose of consumer report information, and adequately oversee third-party service providers. Reg S-P was recently amended to require covered entities to implement an incident response plan and provide data breach notifications to affected individuals whose sensitive customer information was, or is reasonably likely to have been, accessed or used without authorisation.

State-Level Data Protection Regulation

Many states have passed comprehensive data privacy laws that also include cybersecurity requirements. Typically, these state laws require covered entities to implement reasonable security measures to protect consumer personal data. The California Consumer Privacy Act includes a private right of action for consumers whose unencrypted personal information is subject to a breach of security due to the failure of the business to implement reasonable security measures. Additionally, in November 2024, the California Privacy Protection Agency (CPPA) released a proposed rule that would require covered businesses to conduct annual independent cybersecurity audits, present the results of the audit to senior executives at the business, and submit a certification of the audit to the CPPA.

AI regulation is still nascent, but some government entities are starting to address the cybersecurity implications of AI. Although Congress has not passed any comprehensive AI bill to date, there have been Presidential executive orders on AI and cybersecurity. During the Biden administration, President Biden issued an executive order directing federal entities to implement guidance related to safety and security in the deployment of AI. In November 2024, the DHS released a voluntary framework for how to safely and securely deploy AI in critical infrastructure. However, on his first day in office in 2025, President Trump revoked former President Biden’s executive order that had established initiatives related to the safe deployment of AI. President Trump has since issued two new executive orders on AI, which do not focus on cybersecurity, safety or accountability measures.

At the state level, the NYDFS’s 23 New York Codes, Rules and Regulations (NYCRR) 500 (“Part 500”) includes prescriptive requirements for covered financial services companies to implement cybersecurity safeguards, such as implementing multifactor authentication. In October 2024, the NYDFS issued guidance on how companies can address the emerging security threats from AI. It includes recommendations such as updating employee training to expand awareness of AI-powered social engineering and designing access controls to better withstand deepfakes and other AI-enhanced attacks.

HIPAA is the primary law that regulates data privacy and security for healthcare entities. HIPAA’s Security Rule includes prescriptive requirements for covered entities to implement specific safeguards to ensure the confidentiality, integrity and availability of ePHI, including through risk assessments, encryption, “minimum necessary” access controls, a contingency plan to restore any loss of data, and business associate contracts. In December 2024, the HHS published a Notice of Proposed Rulemaking and announced proposed changes to the Security Rule that would heighten the requirements for covered entities ‒ for example, newly requiring annual penetration testing, as well as a written technology asset inventory mapping the data flows of ePHI within the covered entity’s systems. Shortly after his election, President Trump issued an executive order directing federal agencies to not propose or issue any rule until a department or agency head appointed by President Trump approved such rule. Accordingly, the future of these proposed amendments remains unclear.

Additionally, the HIPAA Breach Notification Rule requires covered entities to provide notification of certain breaches of protected health information to affected individuals, the HHS, and the media.

Through the Health Breach Notification Rule, the FTC separately requires vendors of personal health records and their third-party service providers to report certain breaches to affected individuals and the FTC.

Freshfields

3 World Trade Center
175 Greenwich St
51st Floor
New York
NY 10007
USA

+1 212 277 4000

+1 212 277 4001

beth.george@freshfields.com www.freshfields.us
Author Business Card

Trends and Developments


Authors



Freshfields is a global market leader in handling data crises, investigations, class actions, and regulatory engagement. The firm has in-depth experience in cybersecurity ‒ from prevention to governance to responding to incidents ‒ and has a deep bench of cybersecurity and privacy attorneys who provide clients with global coverage from offices around the world, including in the USA, Europe, the UK, and Asia. With a strong market-leading data and cyber practice comprising more than lawyers, Freshfields’ global team of experts works seamlessly at the highest level, leveraging their expertise in crisis management and judicial proceedings to provide high-quality advice. This includes extensive know-how, honed through involvement in hundreds of international cases.

Current Cybersecurity Threats Faced by US Companies and How to Minimise Liability in the Event of a Cyber-Attack

Top of mind for many US cybersecurity executives has been the threat of personal liability for cybersecurity incidents. In late 2023, the SEC charged SolarWinds’ chief information security officer Timothy Brown for defrauding investors by making public statements regarding the company’s cybersecurity standards that he allegedly knew was not accurate. SolarWinds provides cybersecurity software to thousands of companies. In 2020, it suffered a supply chain attack whereby nation state threat actors were able to insert code into a software update that allowed the threat actors to access SolarWinds customers’ networks, leveraging the accesses that SolarWinds’ software was given on these systems.

Relying on internal communications between information security engineers at SolarWinds, in addition to accusing the company of having inadequate internal accounting controls, the SEC alleged that Brown defrauded investors by falsely touting SolarWinds’ cybersecurity strength. Specifically, the SEC alleged Brown was aware that the company’s security controls were weak but he nevertheless approved the company’s risk factors on cybersecurity ‒ which the government described as “generic” ‒ and supported a number of other public statements about the company’s high cybersecurity standards, including blogs and a security statement that was provided to actual and prospective customers.

In 2024, a federal district court dismissed some – but not all – of the charges against Brown. Even though the court disagreed with the SEC’s accusation that the risk factors were “generic”, it did find that the company’s public “security statement” (which was posted on its website and discussed its cybersecurity standards) could be a material statement. Whether the statement was inaccurate, and whether Brown was aware the statement was inaccurate, are issues that the court allowed to proceed to trial.

The SEC case is not the only case in which senior executives have faced personal liability. In 2023, the Federal Trade Commission (FTC) finalised a settlement with Drizly, an app for the delivery of alcohol, that imposed personal liability on its CEO for the company’s security failures. The FTC alleged that Drizly and its CEO implemented woefully inadequate cybersecurity practices at the company, resulting in a data breach affecting more than 2.5 million customers.

In the settlement, which included a consent decree binding the company, the FTC reached an agreement that Drizly CEO James Cory Rellas would be required to implement an information security programme at any future company where he was a majority owner, CEO, or senior officer with information security responsibilities, if that company collected consumer information from more than 25,000 individuals. The settlement ensured that these requirements would follow Rellas to future companies, likely due in part to the fact that Drizly had been acquired by another company.

These cases highlight a newly aggressive posture of regulators towards executives who have cybersecurity responsibility. In the aftermath of the SolarWinds charges, many companies have reviewed their directors’ and officers’ liability insurance to ensure it covers senior security professionals. The cases also highlight the importance of ensuring that executives understand their legal obligations regarding accurate disclosures, including with regard to cybersecurity controls, and the importance of ensuring companies meet certain cybersecurity standards. 

Ransomware

Ransomware continues to be a leading cybersecurity threat for corporations, with several companies reporting multiple attacks within the course of a year. Threat actors in this space have commodified software supporting the attacks – a trend dubbed “ransomware as a service” (RaaS) – thereby making the attacks more accessible and executable by less sophisticated actors.

RaaS is a business model in which cybercriminals provide ransomware tools and services to other attackers, often for a fee or a share of the ransom payments. Essentially, RaaS operators develop and maintain the ransomware software, while affiliates or customers use it to carry out attacks. The RaaS operators typically provide user-friendly interfaces, technical support, and even updates to ensure the ransomware remains effective. This approach has led to an increase in the frequency and scale of ransomware attacks, as it lowers the barrier to entry for cybercriminals and allows them to focus on targeting victims and extorting payments.

Additionally, the RaaS model can make threat actors more unpredictable. Famously, the BlackCat ransomware gang had a very public falling out with one of its affiliates in connection with the Change Healthcare attack that ‒ according to the company’s public statements ‒ may have affected the personal information of approximately 190 million individuals. Reportedly, the company made a USD22 million ransom payment to the BlackCat ransomware gang to try to get services back online and for the ransomware gang to delete the company’s stolen data. However, the affiliate who claimed to have given BlackCat access to the company’s network also claimed that BlackCat cheated the affiliate of its share of the ransom. Accordingly, the affiliate did not delete the information that Change Healthcare had reportedly paid BlackCat to return and destroy. 

In 2024, ransomware demands and payments also continued to climb, reflecting the evolution and aggressiveness of cybercriminals’ tactics. In 2024, ransomware attacks increased in both frequency and scale, with the average ransom demand reaching more than USD3 million and the average ransom paid estimated at more than USD9.5 million. The increase in ransomware payments has been largely driven by the continued success of extortion schemes whereby attackers often exfiltrate data prior to encrypting it, threatening to release sensitive information if ransoms are not paid, in addition to seeking payment for the decryption keys.

Ransomware attackers have also threatened to deploy distributed-denial-of-service attacks or threatened employees and customers of victims so as to apply additional pressure on companies. Some attackers have even notified regulatory authorities of victims’ data breaches, using the law as a means of exerting pressure. The emergence of new groups and ransomware variants of cyber-attacks, including rebranded ransomware groups, has also contributed to the record-breaking number of incidents and payments.

There have been ongoing law enforcement efforts, including a successful 2024 bust of infrastructure used by the Lockbit, a leading ransomware group. Nevertheless, the overall threat continues to grow, increasing pressure on companies to have plans for detection of ransomware attacks and develop plans for sophisticated recovery.

Supply chain attacks

Beyond ransomware attacks, supply chain attacks continue to be a significant issue. Hackers have found that third-party vendors (including security vendors) can create successful avenues of attacks, allowing them to leverage accesses and service deliveries to the vendors’ customers to amplify their attack space. In addition to the SolarWinds attack, in June 2023, a significant cyber-attack exploited a vulnerability in managed file transfer software MOVEit. The vulnerability allowed attackers to steal files from organisations through SQL (structured query language) injection on public-facing servers. This breach affected thousands of organisations and millions of individuals ‒ including government agencies, media outlets, and organisations in other sectors ‒ and was considered one of the largest supply chain attacks to date. The Cl0p ransomware gang, a Russian-affiliated cyber group, claimed responsibility for the attack.

Cyber-attacks on and exploitation of vulnerabilities at vendors have resulted in significant losses for their customers. In fact, supply chain risk has become such a significant issue that the US’ National Institute of Standards and Technology (NIST) released its first major update of the NIST Cybersecurity Framework, incorporating practices to manage cybersecurity risks within and across organisations’ supply chains.

Supply chain attacks can be more challenging to investigate, as an affected customer may have limited visibility into an attack on a third-party vendor and limited control over the vendor’s investigation. Companies need to assess which of their vendors have the greatest access to their systems – and thus are the highest risk – in order to identify the greatest risks posed by supply chain attacks. By focusing on those highest-risk areas, companies can develop mitigations by placing technical limitations and increased monitoring on those vendors as well as by requiring the vendors to engage in robust cybersecurity practices, in addition to potentially shifting liability through contractual agreements.

Cybersecurity and AI

Cybercriminals are increasingly using AI to automate and target their attacks. This allows them to carry out individualised mass phishing attacks tailored to their targets ‒ not only greatly increasing the efficiency of the attacks, but also allowing well-organised threat actors to automatically create fake login pages that are virtually indistinguishable from the legitimate pages. Additionally, research has indicated that the use of AI will significantly improve the capability of threat actors to crack passwords.

AI also allows threat actors to replicate proofs of concept or other types of successful attacks more quickly. By way of example, if a zero-day vulnerability is identified, the amount of time for threat actors to identify and target companies with such vulnerabilities in their systems is becoming shorter. The dwell time that threat actors are in a company’s systems is also decreasing, as AI allows threat actors to identify data that appears to be valuable more efficiently and thus extract that data more quickly.

There is some good news, however. AI is increasingly being leveraged in cyberdefence to enhance the detection and prevention of cyberthreats and enhance the response to such threats. One of the primary applications of AI in this field is the identification and quarantine of suspicious emails that may be part of phishing campaigns. AI-powered tools use machine-learning algorithms to analyse email content and detect phishing attempts by identifying patterns and anomalies that are indicative of malicious intent.

Another significant application of AI in cyberdefence is the detection of vulnerabilities and malicious or anomalous activity within a company’s systems. These tools utilise AI to monitor network traffic and identify unusual behaviour that could signify a cyber-attack. By continuously learning from the network’s normal behaviour, these tools can quickly detect deviations and alert security teams to potential threats.

Although AI tools and systems can benefit companies, cybersecurity plays a crucial role in ensuring that AI systems are resilient to attempts by malicious third parties to exploit the system’s vulnerabilities and thereby alter the system’s behaviour, performance or security properties. Cyber-attacks against AI systems can exploit AI-specific assets, such as training data sets or trained models, but also vulnerabilities in the AI system’s (underlying) digital assets or the underlying ICT (information and communications technology) infrastructure. To address these risks, the EU AI Act requires certain high-risk AI systems to meet a specific cybersecurity standard.

Insider threats

With the increase in remote work and readily available AI tools during the past few years, there has also been an uptick in insider threat risk from nation state actors. North Korea, in particular, has been exploiting the recruitment and onboarding processes to install thousands of fraudulent remote IT workers at companies. These fraudsters typically use falsified or stolen identities to secure their positions. The wide availability of AI tools reportedly has increased this trend, as these tools help the fraudulent IT workers to create convincing profiles and evade detection during the hiring process.

Once hired, these fraudulent IT workers can remotely access company systems within the scope of their job responsibilities and steal proprietary information, which they can then use to extort payment from the victim company. Alternatively, fraudulent IT workers can deploy malware within the network or create backdoor access into the company’s network for future cyber-espionage campaigns, as they often have deeply embedded and difficult-to-detect access to company systems. Additionally, this creates sanctions risk, given that the US Treasury’s Office of Foreign Assets Control recently advised that the vast majority of these fraudulent IT workers’ earnings were used to fund North Korea’s weapons of mass destruction and ballistic missile programmes.

Mitigation measures

While cyber-attacks such as ransomware, supply chain attacks, and insider threats are pervasive, there are measures that companies can take to mitigate the impacts of such incidents, including:

  • regularly updating and patching systems ‒ given that exploited vulnerabilities are one of the most common attack vectors and easily accessible AI tools are increasing the rate at which zero-day vulnerabilities are exploited;
  • conducting employee training on phishing and social engineering, as another one of the most common attacks vectors is phishing;
  • using advanced threat detection and response tools, as industry research and statistics show that the cost of responding to incidents is significantly lower for companies that have deployed such tools within their systems;
  • maintaining an asset inventory to ensure the company has visibility of all its endpoints and throughout its systems;
  • implementing network segmentation, including by following the principle of least privilege and limiting third-party access to systems and data;
  • sufficiently logging and monitoring, which is crucial for any investigation and can help identify anomalous behaviour that could signal an insider threat risk; and
  • regularly backing up critical data and testing those back-ups to help minimise the impact of ransomware and increase the likelihood that the company can recover without making a ransom payment.

Leveraging these practices as part of a comprehensive information security programme may not prevent all incidents. However, such practices can minimise damage if a cyber-attack occurs, which ‒ in turn ‒ can minimise liability (including personal liability) in relation to a cyber-attack.

Freshfields

3 World Trade Center
175 Greenwich St
51st Floor
New York
NY 10007
USA

+1 212 277 4000

+1 212 277 4001

beth.george@freshfields.com www.freshfields.us
Author Business Card

Law and Practice

Authors



Freshfields is a global market leader in handling data crises, investigations, class actions, and regulatory engagement. The firm has in-depth experience in cybersecurity ‒ from prevention to governance to responding to incidents ‒ and has a deep bench of cybersecurity and privacy attorneys who provide clients with global coverage from offices around the world, including in the USA, Europe, the UK, and Asia. With a strong market-leading data and cyber practice comprising more than lawyers, Freshfields’ global team of experts works seamlessly at the highest level, leveraging their expertise in crisis management and judicial proceedings to provide high-quality advice. This includes extensive know-how, honed through involvement in hundreds of international cases.

Trends and Developments

Authors



Freshfields is a global market leader in handling data crises, investigations, class actions, and regulatory engagement. The firm has in-depth experience in cybersecurity ‒ from prevention to governance to responding to incidents ‒ and has a deep bench of cybersecurity and privacy attorneys who provide clients with global coverage from offices around the world, including in the USA, Europe, the UK, and Asia. With a strong market-leading data and cyber practice comprising more than lawyers, Freshfields’ global team of experts works seamlessly at the highest level, leveraging their expertise in crisis management and judicial proceedings to provide high-quality advice. This includes extensive know-how, honed through involvement in hundreds of international cases.

Compare law and practice by selecting locations and topic(s)

{{searchBoxHeader}}

Select Topic(s)

loading ...
{{topic.title}}

Please select at least one chapter and one topic to use the compare functionality.