Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Jannica Houben and Katarzyna Golonka on Complex Investigations
Traditional and social media are thick with reports and predictions of the remarkable increase in size, power consumption and significance of data centers. Not only technology companies but real estate and energy developers,...more
Long IT sub-contracting chains can make it hard for financial institutions to understand the vulnerabilities in their IT estate and the location of key functions (where these may be located in entities who do not have a...more
We continue our exploration of how CEOs and senior executives are uniquely positioned to drive home the importance of ethical behavior and adherence to compliance regulations. Today, we consider the humble email and how it...more
Partner Janine Anthony Bowen sits down one-on-one with current Chief Information Officers in the new series, “Technology from the Top: AI, Data and the Future of Business with Today’s CIOs” to discuss how they are adjusting...more
On June 17, 2024, the final rule for Medicare Part D introduced new health IT standards, mandating the adoption of NCPDP SCRIPT Standard version 2023011 by January 1, 2028, while the NCPDP Formulary and Benefit (F&B) Standard...more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
Modern attachments, in Google Workspaces and Microsoft Office, have long posed significant challenges in eDiscovery. They are not actual files attached to an email or message but are links pointing to files stored elsewhere....more
Join Greg Sullivan and Matt Maslow from Deloitte, as they showcase how they have harnessed Generative AI to overcome some of the most persistent challenges in eDiscovery review. Drawing from their experience building a custom...more
Under the previous UK Home Secretary, James Cleverly, minimum salary thresholds for Skilled Worker visas were raised significantly and the 20% discount for shortage occupations were eliminated....more
Some might say there’s little difference between dealing with the devil and being a federal contractor. And for the unwary or unprepared, that may not be far off. Federal contracting comes with a litany of “fine print” that...more
In this post in our series on basic cybersecurity concepts for lawyers, we address open-source software (OSS) supply chain risk. OSS is software developed using an “open-source” protocol, meaning that its code is fully...more
On August 21, 2024, the United States Cybersecurity and Infrastructure Security agency, alongside government agencies in key global allies, including Australia, the UK, Canada, and Japan, released guidance on event logging...more
On June 31, 2024, the Department of Health and Human Services (“HHS”) published a final rule establishing penalties for healthcare providers who violate the information blocking rules implemented under the 21st Century Cures...more
The Centers for Medicare & Medicaid Services (CMS), the Office of the National Coordinator for Health Information Technology (ONC), and thr Department of Health and Human Services (HHS) published 89 FR 51238 (the Final Rule),...more
As data volumes grow, the use of technology to make sense of it is increasing – especially within disputes and investigations where the key data is buried within thousands or millions of documents, emails, text messages,...more
Gen Z attorneys are often extremely valuable, hard-working additions to your trial team. We are sure many of our clients would agree, as we worked alongside quite a few truly impressive young trial attorneys....more
Whether caused by family member thoughtlessness, employee error or the acts of a skilled data thief, everyone is likely to be the victim of an information breach at some point. A cyberattack on a family office or family...more
1. Introduction - The demand for digital infrastructure has seen exponential growth in the recent years, largely driven by the larger economic trend of digitalisation and artificial intelligence (AI) being harnessed and...more
Hong Kong is following other jurisdictions, including Mainland China, Singapore and the UK, in proposing to enhance cybersecurity obligations on IT systems of those operating critical infrastructure (“CI“). While the proposed...more
Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more
It’s no longer hype. Organizations are broadly looking to adopt Gen AI to drive productivity across their workforce. There’s also end-user demand to satisfy. People use Gen AI in their personal lives and want to use it...more
Nashville offers countless reasons to visit, but when you combine the city’s talent and energy with the legal community’s convergence at the Gaylord Opryland Resort and Convention Center, you create an unforgettable...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of August 12-18. Here’s what’s...more