Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Jannica Houben and Katarzyna Golonka on Complex Investigations
In today's digital landscape, where data is often dubbed the "new oil," ensuring the smooth operation of databases is crucial for businesses. Regular oversight, including monitoring database metrics, is essential to optimize...more
Process inefficiency can create problems that quietly stifle productivity and potential growth. In an era of rapid digitalization, companies that lag in business process improvement risk falling behind competitors who embrace...more
Over the past few decades, the commodity and energy trading and risk management (C/ETRM) landscape for the natural gas industry has been stable, dominated by a select few big players in the market – namely, ION Endur or...more
The name denotes the systems are focused on improving operations in trading and risk, but what’s in it for other business stakeholders who support the transaction lifecycle? We will highlight the top advantages our team has...more
Biden Administration to Introduce New National Cyber Strategy for Critical Infrastructure - The Biden administration is reportedly working on a National Cyber Strategy for critical infrastructure that will advocate a more...more
Trading and accounting departments look at the origination-to-settlement lifecycle differently and this can often lead to disconnects and miscommunication that manifest late in the timeline of ETRM system implementations,...more
It has been over a year since the Colonial Pipeline cybersecurity incident, and the Department of Homeland Security’s Transportation Security Administration (“TSA”) continues to issue cybersecurity directives to owners and...more
Business processes can get complicated over time in any organization. A fitting example of a core business process is the processing of payable invoices. The old-fashioned way of processing invoices is to receive the invoices...more
I am at the RSA Conference 2022 in San Francisco, my first time as a member of the private sector, since retiring from the FBI last year. I attended one of the keynotes on the first day of the conference, in between panels on...more
Getting the most out of your energy trading and risk management (ETRM) system means taking an ecosystem perspective to technology decisions that aim to extend and enhance the inherent capabilities of the platform. We’ve...more
Technology is at the forefront of minimizing the negative impacts of constant change. We seek out advancements to modernize business, sequence our day, and make our lives easier. Among these advancements in the business...more
Optimization tools are powerful additions to the arsenal of business systems for any company. The tools leverage the transactional advantages afforded by the discipline and interconnectedness of energy trading and risk...more
Find out why the intersection of digital transformation and ESG is more tightly woven than ever. ...more
Find out what goes into the transfer of a refinery asset and why post-acquisition integration is where true value is delivered to the buyer....more
Find out why companies making technology-based acquisitions should be prepared with defensible and supportable valuation analyses that can stand up to scrutiny....more
Find out why GIS solutions enable the ability to capture and interpret real-time data to make quicker, more informed decisions....more
Here are five things to look for in your business process outsourcing (BPO) firm. Using the right business process outsourcing (BPO) firm can help your business in many ways. From improving operations, eliminating...more
Find out why oil and gas companies operating in the new normal requires migrating to a digital transformation strategy that enhances operations—profitably. ...more
The U.S. Department of Homeland Security (DHS) issued a security directive (Directive) that, for the first time, imposes mandatory cybersecurity requirements on companies in the pipeline industry. ...more
The recent Colonial Pipeline ransomware event provides a strong incentive for organizations to evaluate their resiliency to cyberattacks. With ransomware being the No. 1 concern for many Security Officers surveyed in a recent...more
On May 12, 2021, the Biden Administration issued an Executive Order on “Improving the Nation’s Cybersecurity” (EO). The EO was in the works prior to the Colonial Pipeline cyberattack, reportedly a ransomware incident that...more
Recently, the largest gasoline pipeline in the United States fell victim to a ransomware attack that caused the pipeline to go offline for several days. In addition to causing gas shortages across the Southeastern United...more
Disruptionware attacks have become increasingly more common over the last few months. Just last month, I wrote about a dangerous disruptionware attack against a Florida Water Treatment Center that could have been a mass...more
It was not a matter of if, but when. On Friday, Colonial Pipeline Company, the largest U.S. fuel pipeline, closed its entire 5,500-mile pipeline system that carries liquid fuels, including gasoline, from the Gulf Coast of...more
Find out why risk control and IT need to be aligned to gain maximum value in real-time commodity position and exposure reporting....more