Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
How to Fix the Cyber Incident Reporting Mess--DHS Weighs In
[Podcast] Cyber Spotlight: Wiley Tackles White House’s National Cybersecurity Strategy and Other Developments
Federal Investigations within the Department of Homeland Security
The State of Cyber: Breaking Down Recent Rules and Regulations
Immigration Insights Podcast: International Entrepreneur Parole Program & Biometrics Requirement
DHS and Cyber: What Should Companies Expect?
Take 5 Immigration Podcast Series: Episode 10
Nota Bene Episode 90: U.S. Q3 Check In: Stimulus, Relief, Election, and Direction with Elizabeth Frazee and Jonathan Meyer
Is it the End of the EB-5 World as We Know it? How to Prepare for Potential Changes
Benesch B-Cast 07: Immigration Deadlines and Demands Employers Need to Know
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
In response to President Biden’s Executive Order authorizing increased data privacy measures, Assistant Attorney General (AAG) Matthew G. Olsen announced that the National Security Division of the Department of Justice (DOJ)...more
Pelosi Statement Dims the Lights on ADPPA - The prospects for the nation’s first comprehensive data privacy law, the American Data Privacy and Protection Act (the “ADPPA” or the “Bill”), dimmed after House Speaker Nancy...more
Exclusive roadmap reveals, immersive Q&A with top product & industry experts, live product demos, electrifying presentations, co-innovation opportunities, and so much more— all coming to you live from the heart of Nashville,...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the National Institute of Standards and Technology's four principles of the "explainability" of artificial intelligence and the U.K. Information...more
State breach notification statutes are being amended on almost a monthly basis. Several laws have, or will soon have, a mandatory notification deadline for notifying affected individuals after the discovery of the incident....more