Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more
10/12/2023
/ Crisis Management ,
Cyber Attacks ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Events ,
Incident Response Plans ,
Risk Mitigation
In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more
3/15/2022
/ Biometric Information ,
Continuing Legal Education ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Use Policies ,
Geolocation ,
Hackers ,
New Legislation ,
Privacy Laws ,
Ransomware ,
State Privacy Laws ,
Webinars
Your personal information is threatened by more pernicious tools and attacks each year.
While this blog often describes poorly written privacy laws stifling business and dangerous bureaucratic overreach by privacy...more
10/6/2021
/ Apple ,
Artificial Intelligence ,
Consumer Privacy Rights ,
Cyber Threats ,
Cyber-Stalking ,
Data Brokers ,
Data Collection ,
Due Process ,
Google ,
Law Enforcement ,
Mobile Apps ,
Personal Information ,
Proposed Legislation ,
School Districts ,
Software ,
Spyware ,
Surveillance ,
Tracking Systems ,
Warrantless Searches ,
Warrantless Tracking ,
Wearable Technology
Within a corporation, teams jockey for resources and promote their roles within the enterprise. It sometimes seems like important parts of the company are working at cross-purposes....more
We all know why selecting appropriate data security standards is difficult. No two business are the same. Different businesses have different assets to protect and different bank accounts to tap. Different sized businesses...more