News & Analysis as of

Risk Mitigation Young Lawyers

Stotler Hayes Group, LLC

10 New Year Resolutions for Attorneys with ADHD in 2024: Realistic and Actionable Goals for the Year Ahead

Nearly one in five attorneys (20%) may suffer from Attention Deficit Hyperactivity Disorder (“ADHD”), compared to one in twenty (5%) of the general population.  In other words, attorneys are four times more likely to have...more

Orrick - Trade Secrets Group

Pooley’s Corner: How to Recruit and Hire While Avoiding Data Contamination

When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more

K&L Gates LLP

Are Your Company’s Legal, Due-Diligence, De-risking, or Compliance Obligations Impacted by the “Panama Papers”?

K&L Gates LLP on

In an unprecedented event earlier this week, 11.5 million files from the Panamanian law firm Mossack Fonseca were allegedly leaked. Assuming they are genuine, as appears to be the case, these “Panama Papers” offer a...more

JD Supra Perspectives

Hacking Your Health: For Healthcare Providers, Risk Analysis Must Be Ongoing

JD Supra Perspectives on

Healthcare providers would be wise to keep in mind that if a patient is harmed by a hacked medical device, Exhibit A in the negligence suit against them may be that provider’s risk analysis, or lack thereof....more

BakerHostetler

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

BakerHostetler on

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

Foley & Lardner LLP

Blue Pill/Red Pill: How Officers and Board Members Can Swallow the Red Pill and See the Real World of Cybersecurity

Foley & Lardner LLP on

Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide