Meeting the Needs of General Counsel: Beyond the Basics of Legal Advice - On Record PR
Studying the Global Legal Market to Keep Businesses Ahead of the Curve: On Record PR
PODCAST: Williams Mullen's Gavels & Gowns - Title IX Regulations - Changes on the Horizon
Hot Topics in International Trade-Reasonable Care
Openings of Openings
The Basics of Opening Statements
Podcast - Effective Trial Language Part 2: Legalese
Transparency and the Open Payments Program
Navigating GSA Audits Compliance Strategies and Best Practices
Podcast - Bringing Mindfulness and Best Practices to Trial Law
Law Brief®: Rich Schoenstein and Annmarie Giblin Discuss Cyber Law
Podcast - The Different Ways Lawyers Prepare Notes for Trial
Podcast - The Key to a Successful Trial Lawyer
The Presumption of Innocence Podcast: Episode 26 - Crisis Communication: Managing Perception & Mitigating Reputational Damage
Podcast - The Unwritten Rules of Trial Practice
Building a law firm off of 1.7 million TikTok followers - Legally Contented podcast
Nonprofit Basics: Meeting Minutes Best Practices
The Risk Roundtable: Best Practices for Litigation to Help After an Accident
Constangy Webinar - Spring Cleaning: How to Keep your HR Practices Mess Free
AI: Technology, Opportunities, Risks, and Best Practices (Part Two) – Regulatory Oversight Podcast
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information. This...more
Something keeping you up at night? It just might be the data risks hiding in your e-discovery process. Join us for an in-depth webinar on "Uncovering E-Discovery Data Risks: How to Identify and Mitigate Hidden Threats Before...more
Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing emphasis on data transparency, it's essential to stay ahead...more
Why it matters and how it protects your business - Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing...more
Learning Objectives: - Understand the methods for de-identification - Learn about the differences between anonymization, de-identification, and pseudonymization - Understand what “potential for re-identification”...more
As Artificial Intelligence (AI) continues to evolve and integrates into business processes, the Office of the Privacy Commissioner for Personal Data (PCPD) released its Artificial Intelligence: Model Personal Data Protection...more
Kennedys and CYPFER are delighted to invite you to our 60 minute webinar on Tuesday, June 4, 2024. We will explore the practical and legal implications involved in navigating a ransomware event, and how decision-making in a...more
We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more
Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more
Join us for an insightful webinar with Miller Nash’s head of privacy and data security team, Eva Novick, and colleague, Delfina Homen, where we will delve into the essentials of privacy and data security in 2024. Whether...more
Powerful ideas emerge when you look at something through a completely different lens. And when two parties come together to share those unique perspectives? That’s when the magic happens. Womble Bond Dickinson’s virtual...more
Get focused insights on compliance management for nonprofits - From fraud and conflict of interest to tax exemption, fundraising, and data security, nonprofit organizations are faced with significant compliance issues,...more
In an era where digital information flows ceaselessly, the specter of data breaches looms large. Whether these breaches are the result of deliberate attacks or unintentional leaks, they can range from being merely...more
Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more
One of data privacy’s greatest challenges is that it can all feel just so abstract. What does it really mean for an individual’s data to be at “risk”? What activities are riskier than others?...more
CISA’s Incident Response Guide outlines ways in which WWS owners and operators can engage with federal agencies to prepare for, mitigate, and respond to cyber incidents, including best practices for incident response and...more
Data is likely your organization’s most valuable asset — or, at least, it could be. But chances are that it’s also one of your most underused and underappreciated assets. Every data source has the potential to yield a...more
The ever-increasing privacy and security risks via third-party vendors and service providers were apparent in 2023 with news of large organizations such as MOVEit, Okta and AT&T being affected. Research has shown that 98...more
In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more
Nearly every company today relies on technology to operationalize their business in one form or another. While the use cases for technology, including artificial intelligence (AI), vary among companies and industries, its...more
During the last weeks of 2023, the international community announced several initiatives designed to establish common standards for AI actors to implement in their development and use of AI. On October 30, 2023, the leaders...more
As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages. Among the great tapestry of age groups, despite the wealth of experience and...more
Is your organization a business associate? You could be subject to enforcement action if you fail to protect health information within your control from ransomware attacks. In October, for the first time, the U.S....more
A few weeks ago, on 24 September 2023, the Data Governance Act (Regulation (EU) 2022/868 of the European Parliament and of the Council of 30 May 2022 on European data governance) (“DGA”) came into force. The DGA aims to...more
On October 29, the Biden Administration issued a broad Executive Order (Order) on artificial intelligence (AI). Titled “Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence,”...more