FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
Compliance Tip of the Day: Embedded Compliance
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Law School Toolbox Podcast Episode 496: The Early BigLaw Recruiting Timeline (w/Sadie Jones)
Whistleblower Challenges and Employer Responses: One-on-One with Alex Barnard
Compliance Tip of the Day: Compliance By Design
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
Podcast - How to Use Humor and Anger Effectively in the Courtroom
Podcast - At Trial, Less Is More
Enhancing Workplace Feedback: Lessons From Harry Potter — Hiring to Firing Podcast
Podcast - Voice and Delivery
Podcast - Crafting Winning Strategies: Theories and Themes in Trials
Podcast - Borrowing and the Art of Trial Advocacy
This Extraordinary Process Called "Trials"
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 209: North Carolina’s Life Sciences Industry with Laura Gunter of NCLifeSci
Due Diligence in AI: 3 things you need to survive AI scrutiny
#WorkforceWednesday®: New DOL Guidance - ERISA Plan Cybersecurity Update - Employment Law This Week®
Meeting the Needs of General Counsel: Beyond the Basics of Legal Advice - On Record PR
Studying the Global Legal Market to Keep Businesses Ahead of the Curve: On Record PR
PODCAST: Williams Mullen's Gavels & Gowns - Title IX Regulations - Changes on the Horizon
On April 3, NIST published practical incident response guidance aligned with its CSF 2.0 framework. The guidance outlines best practices in security incident preparation and response for organizations mapped across each of...more
Organizations seeking to improve their cybersecurity posture in 2025 must assess what happens after an incident has occurred, and how an incident response team will be able to mobilize to respond. This article provides...more
In 2021, Congress created the Internet of Things Advisory Board (IoTAB) within the Department of Commerce and charged it with providing advice to the Internet of Things Federal Working Group, a collaboration of Federal...more
On January 30, the NIST National Cybersecurity Center of Excellence (NCCoE) released a draft practice guide, titled “Addressing Visibility Challenges with TLS 1.3 within the Enterprise.” ...more
The U.S. Department of Health and Human Services (HHS) continues to play a central role in helping health care organizations defend against cybersecurity threats, issuing cybersecurity briefs and a new cybersecurity framework...more
On September 7, 2022 the U.S. Department of Transportation’s National Highway Traffic Safety Administration (NHTSA) released an updated edition of its Cybersecurity Best Practices for the Safety of Modern Vehicles, the last...more
The U.S. Department of Defense (DoD) recently released a memorandum signaling its increasing willingness to review contractor compliance with cybersecurity standards in its contracts and take action against noncompliant...more
Hear about the latest in research compliance - Do you want to learn… - How to prepare for upcoming changes in Medicaid? - Ways to build and maintain a better research compliance work plan for your program? - How...more
On May 12, President Biden signed an Executive Order on Improving the Nation’s Cybersecurity. The order comes on the heels of a number of recent widely reported cybersecurity crises, including the Solar Winds and Microsoft...more
To assist utilities with assessing and responding to cyber risks, the Federal Energy Regulatory Commission (FERC) and the North American Electric Reliability Corporation (NERC) recently issued a report on best practices to...more
The spread of the novel coronavirus has upended Americans’ lives in a matter of months. While life outside has ground to a standstill in many regions of the country, much of corporate America is meeting the unique challenges...more
What is CMMC? CMMC is a unified cybersecurity standard and certification program for all U.S. Department of Defense (DoD) contractors. On January 31, 2020, DoD’s Office of the Under Secretary of Defense for Acquisition &...more
Commonsense IoT security steps that startups and small business should consider to comply with California’s new law - California recently enacted a new law, Senate Bill 327, that requires companies that make Internet of...more
• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more
On Dec. 28, 2018, the U.S. Department of Health and Human Services (HHS) announced the release of voluntary cybersecurity practices and tools for the healthcare industry. The documents were the result of Section 405(d) of the...more
Best Practices to Detect and Prevent File-Less and Click-Less Malware - Hackers are clever at exploiting weaknesses in an organization’s systems. They are also efficient. After an organization installs robust cybersecurity...more
The National Institute of Standards and Technology (“NIST”), an agency within the U.S. Department of Commerce, has produced a number of detailed standards for various aspects of information security. These standards outline...more
On Thursday, June 29, 2017, Sens. Hatch and Markey introduced the “Promoting Good Cyber Hygiene Act” that would direct the National Institute of Standards and Technology (NIST) to establish a set of baseline voluntary best...more
On January 12, 2017, prior to the new administration taking power, the National Telecommunications and Information Administration (NTIA) within the Department of Commerce (Department) released a Green Paper on “Fostering the...more
On January 10, 2017, the National Institute of Standards and Technology (“NIST”) released a proposed update to its popular cybersecurity blueprint for organizations and businesses, known as the Framework for Improving...more
The Federal Trade Commission (FTC) can regulate cybersecurity policies and procedures as “unfair” acts or practices under Section 5 of the FTC Act, the U.S. Court of Appeals for the Third Circuit has ruled in a very important...more
With health care breaches constantly on the rise, increasing access to electronic health records (EHRs) from mobile devices, and more prevalent “shadow” cloud use, health care organizations are getting a bit of help from the...more
The Department of Justice (DOJ) recently announced the largest coordinated international law enforcement effort ever directed at an online cyber-criminal forum. Financial institutions and other companies should consider...more