Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
The Compliance Challenge: Managing Legal & Regulatory Risk
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
Polsinelli Podcasts - FDA Denies Amgen Citizen Petition in Biosimilar Dispute
FCPA Compliance and Ethics Report-Episode 51-Interview with Tim Haidar
ACADEMI's Suzanne Rich Folsom and PwC's Glenn Ware on Moral Hazard
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
In the last two decades, incident response has evolved significantly, adapting to the dynamic cyber threat landscape. As the internet became an integral part of daily life, cyber threats escalated in scope and scale. This...more
On October 3, the Department of Defense, General Services Administration, and the National Aeronautics and Space Administration published two sets of proposed revisions to the Federal Acquisition Regulation (“FAR”) pertaining...more
In February 2023, the Department of Justice (DOJ) announced the creation of the Disruptive Technology Strike Force (strike force) in conjunction with the Department of Commerce to protect against the illegal export of U.S....more
Governor Pritzker recently signed into law Public Act 101-0455 amending the School Safety Drill Act (105 ILCS 128/1) to require threat assessment procedures and the creation of threat assessment teams in school districts...more
On July 26, 2016, the White House approved a Presidential Policy Directive (“PPD”) on coordinating responses to cyber incidents that occur in the United States. The PPD seeks to clarify who in the federal government is...more
In response to increasing cybersecurity threats in vehicles, in 2015 the Automotive Information Sharing and Analysis Center (Auto-ISAC) was formed. Its member companies include all automakers operating in North America...more
Entering 2016, the relentless stream of cyberattacks continues unabated, having become a "business as usual" reality to which companies must adapt. All companies, regardless of size or industry, are potential targets, and the...more
It reads like a movie script: First, the financial services industry experiences a bout of firm-specific attacks in the form of distributed denial of service (DDoS), domain name system (DNS) poisoning, or breach of personally...more
Part of Bradley Arant’s Privacy and Information Security Team’s seven-part Data Breach Toolkit Webinar Series, the “Data Breach Response Planning: Laying the Right Foundation” webinar, led by Paige Boshell and Amy Leopard,...more