Businesses of all types and sizes throughout the United States, Mexico and beyond bring their disputes to Gardere's litigation team and receive practical, responsive, boutique-style attention in return. Our clients have access to the firepower and value of a well-known and highly-regarded Firm's capabilities and interdisciplinary strengths.
Gardere has a national and international energy practice formed around our Energy Industry Team, which is a multidisciplinary group of approximately 80 attorneys with diverse backgrounds, experience and skills specific to the energy industry. Our team includes attorneys who have served as in-house counsel for major energy companies, providing a depth of insight into our clients' needs, issues and concerns. We understand and regularly practice in virtually every sector of the energy, and we represent a wide variety of industry participants from multinational corporations to individuals.
From our offices in the United States and Mexico, our International Practice helps clients operate in today’s global economy. We have more than 30 professionals operating as a boutique within an Am Law 200 law firm and are able to provide focused service with the resources of a large firm. We understand that clients who are engaged in the global marketplace need lawyers who can operate seamlessly across multiple jurisdictions. Our international experts are multi-lingual, are culturally fluent and intimately familiar with various legal systems across the world, especially those in Latin America. Whether you need help with commercial transactions, regulatory matters, customs and import regulations, immigration matters, M&A and joint ventures, international disputes, or international tax planning, Gardere’s international team is here to assist you.
We represent domestic and foreign private funds in all aspects of fund formation, fund operations, platform and add-on acquisitions, and portfolio company operations. Our team has a reputation for being the go-to-lawyers for private equity funds, hedge funds, venture capital funds and family offices. We are known for our vast deal experience, the efficient way we staff and manage our work, and the way we maintain our relationships. We get deals done with sophisticated, strategic, and practical advice tailored to the needs of our clients.
*Not admitted to practice law.
A recent report concluded that the “cybersecurity programs of US organizations do not rival the persistence, tactical skills, and technological prowess of their potential cyber adversaries. Today, common criminals, organized crime rings, and nation-states leverage sophisticated techniques to launch attacks that are highly targeted and very difficult to detect. Particularly worrisome are attacks by tremendously skilled threat actors that attempt to steal highly sensitive—and often very valuable—intellectual property, private communications, and other strategic assets and information.” The June 2014 report was from a survey of 500 executives from US businesses, law enforcement services, and government agencies, was entitled “US cybercrime: Rising risks, reduced readiness Key findings from the 2014 US State of Cybercrime Survey.” The US cybercrime report was issued by PriceWaterhouseCoopers and co-sponsored by The CERT® Division of the Software Engineering Institute at Carnegie Mellon University, CSO magazine, and the United States Secret Service.
The “8 cybersecurity issues that should concern you” in the report were as follows:
1. Spending with a misaligned strategy isn’t smart. Strategy should be linked to business objectives, with allocation of resources tied to risks.
38% prioritize security investments based on risk and impact to business
17% classify the business value of data
2. Business partners fly under the security radar. Recent contractor data leaks and payment card heists have proved that adversaries can and will infiltrate systems via third parties, but most organizations do not address third-party security.
44% have a process for evaluating third parties before launch of business operations
31% include security provisions in contracts with external vendors and suppliers
3. A missing link in the supply chain. Flow of data to supply chain partners continues to surge, yet they are not required to comply with privacy and security policies.
27% conduct incident-response planning with supply chain partners
8% have supply chain risk-management capability
4. Slow moves in mobile security. Mobile technologies and risks are proliferating but security efforts are not keeping up.
31% have a mobile security strategy
38% encrypt devices
36% employ mobile device management
5. Failing to assess for threats is risky business. Organizations typically include cyber risks in enterprise risk-management programs but do not regularly assess threats.
47% perform periodic risk assessments
24% have an objective third party assess their security program
6. It takes a team to beat a crook. External collaboration is critical to understanding today’s threats and improving cybersecurity but most don’t work with others.
25% participate in Information Sharing and Analysis Centers (ISACs)
15% work with public law enforcement agencies
7. Got suspicious employee behavior? Cybersecurity incidents carried out by employees have serious impact, yet are not addressed with the same rigor as external threats like hackers.
49% have a formal plan for responding to insider events
75% handle insider incidents internally without involving legal action or law enforcement
8. Untrained employees drain revenue. Employee vulnerabilities are well known, but businesses do not train workers in good cybersecurity hygiene.
20% train on-site first responders to handle potential evidence
76% less is spent on security events when employees are trained, yet 54% do not provide security training for new hires.
Notwithstanding reports of this sort, cybercrime continues to dominate the news, and likely will continue indefinitely.
The publications contained in this site do not constitute legal advice. Legal advice can only be given with knowledge of the client's specific facts. By putting these publications on our website we do not intend to create a lawyer-client relationship with the user. Materials may not reflect the most current legal developments, verdicts or settlements. This information should in no way be taken as an indication of future results.
You may use the wildcard symbol (*) as a root expander. A search for "anti*" will find not only "anti", but also "anti-trust", "antique", etc.
Entering two terms together in a search field will behave as though an "OR" is being used. For example, entering "Antique Motorcars" as a Client Name search will find results with either word in the Client Name.
AND and OR may be used in a search. Note: they must be capitalized, e.g., "Project AND Finance."
The + and - sign operators may be used. The + sign indicates that the term immediately following is required, while the - sign indicates to omit results that contain that term. E.g., "+real -estate" says results must have "real" but not "estate".
To perform an exact phrase search, surround your search phrase with quotation marks. For example, "Project Finance".
Searches are not case sensitive.