Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Jannica Houben and Katarzyna Golonka on Complex Investigations
As applications and use cases for digital assets and their blockchain infrastructure grow and become more sophisticated, investments and valuations for businesses in these areas have grown as well. The growing number of...more
The FBI issued a Private Industry Notification on November 2, 2021, warning companies that “ransomware actors are very likely using significant financial events, such as mergers and acquisitions, to target and leverage victim...more
In an era of increased M&A transactions, organizations must understand the risks and potential liabilities associated with the personal information they obtain on their customers, vendors, and employees....more
TRANSFER OF EMPLOYEES - Once the terms of intellectual property and infrastructure transfer have been agreed, the buyer should investigate the human resources required to maintain and support the application. ...more
In our third issue, we looked at some focus areas for insurers in the fintech, edtech and healthtech/ medtech sectors. In our fourth and final note, we dig deeper into the areas of underwriting focus for artificial...more
Foreign investment control has become a key factor in M&A deals and 2020 was a particularly eventful year. A large number of countries have recently introduced foreign investment control regimes (or tightened their existing...more
In our first issue, we looked at how valuation, IP and cyber were areas of key focus for M&A insurers on most tech transactions. In this note, the attention shifts to distinct areas of focus for underwriters around three...more
Adding corporate flexibility to IT-related commercial contracts can make seemingly unrelated mergers and acquisitions (M&A) transactions a bit less complex. Although many contracting parties already consider assignment rights...more