FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
Compliance Tip of the Day: Embedded Compliance
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Law School Toolbox Podcast Episode 496: The Early BigLaw Recruiting Timeline (w/Sadie Jones)
Whistleblower Challenges and Employer Responses: One-on-One with Alex Barnard
Compliance Tip of the Day: Compliance By Design
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
Podcast - How to Use Humor and Anger Effectively in the Courtroom
Podcast - At Trial, Less Is More
Enhancing Workplace Feedback: Lessons From Harry Potter — Hiring to Firing Podcast
Podcast - Voice and Delivery
Podcast - Crafting Winning Strategies: Theories and Themes in Trials
Podcast - Borrowing and the Art of Trial Advocacy
This Extraordinary Process Called "Trials"
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 209: North Carolina’s Life Sciences Industry with Laura Gunter of NCLifeSci
Due Diligence in AI: 3 things you need to survive AI scrutiny
#WorkforceWednesday®: New DOL Guidance - ERISA Plan Cybersecurity Update - Employment Law This Week®
Meeting the Needs of General Counsel: Beyond the Basics of Legal Advice - On Record PR
Studying the Global Legal Market to Keep Businesses Ahead of the Curve: On Record PR
PODCAST: Williams Mullen's Gavels & Gowns - Title IX Regulations - Changes on the Horizon
Managing risk in the employment law circus isn’t always easy when the rules change like they are contortionists. The 41st Annual Employment Law Update will highlight recent changes to the law and how employers can most...more
Les cybermenaces se multiplient et évoluent sans cesse, ce qui oblige les organisations à maintenir leur résilience opérationnelle et à protéger leurs actifs clés, comme leurs infrastructures critiques et leurs données...more
Cybersecurity threats continue to grow and evolve, increasing pressure on organizations to maintain operational resilience and protect their key assets, such as critical infrastructure and sensitive data. As cyberattacks...more
The conclusion of Cybersecurity Awareness Month is a reminder of the importance for organizations to implement robust security measures and promote good cyber hygiene. As we noted in our State of the Cyber Landscape webinar,...more
We invite you to join us for an insightful webinar on Best Practices in Cyber Preparedness for Government Contractors and Critical Infrastructure Operators on Wednesday, October 23, 2024, from 12:00 p.m. – 1:00 p.m. EDT....more
Kennedys and CYPFER are delighted to invite you to our 60 minute webinar on Tuesday, June 4, 2024. We will explore the practical and legal implications involved in navigating a ransomware event, and how decision-making in a...more
Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more
The ever-increasing privacy and security risks via third-party vendors and service providers were apparent in 2023 with news of large organizations such as MOVEit, Okta and AT&T being affected. Research has shown that 98...more
Learning Objectives: - Overview of current US privacy/cybersecurity laws and regulation - Current cyber threats: overview of recent trends in cyberattacks and risk areas for healthcare providers - Incident Response: how...more
General and specialty compliance training from the comfort of your home or office! HCCA’s Regional Healthcare Compliance Conferences provide practitioners with virtual compliance training that includes updates on the...more
HR employees are, willingly or not, the guardians of the company’s most sensitive collection of data—its employee’s personal information. Cybercriminals often perceive the human resources department as the perfect gateway...more
Recent data thefts and systems intrusions, particularly with respect to ransomware, have assured that cybersecurity is top of mind for corporate executives and compliance officials. We at EBG have tried to keep you up to date...more
Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more
Law firms process sensitive information on a daily basis. Confidential client data is targeted by hackers and insiders for a variety of reasons including financial gain or retaliatory purposes. When a law firm has a security...more
While business risks abound, including intensified cybersecurity attacks, the impact of rapid technological advances and increasing regulations, there are healthy ways to uncover and mitigate risks. Organizations are...more
Corporate Social Responsibility (“CSR”) and Environmental, Social, and Governance (“ESG”) practices have increasingly become priorities for many organizations as they assess their obligations to their employees, customers,...more
Several federal agencies have teamed up to warn healthcare employers of the increased threat they face as a result of malicious cybercriminals aiming to take advantage of the pandemic to wreak havoc on their operations. The...more
Compliance Today (July 2020) - An April 14 survey conducted by Gartner of 145 legal and compliance leaders found that more than half of the respondents rated cybersecurity and the possibility of a data breach as the...more
With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more
Our Virtual Regional Healthcare Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask...more
More and more companies are experiencing crippling data breaches. The statistics make for depressing reading. According to IBM Security’s Cost of a Data Breach Report 2019, the average cost of a data breach is $3.9 million...more
Practical steps to address cybersecurity threats—what you should do when heightened tension in the Middle East or other events increase the threat of cybersecurity incidents. - When news events or business initiatives turn...more
In line with recent actions taken across the government to enhance the resilience of the nation’s cybersecurity apparatus, the Cybersecurity Infrastructure Security Agency (CISA) recently released a set of best practices for...more
As we’ve written about in the past, the SAFETY Act has the potential to help companies mitigate their risk from cyber-terrorism. As previously noted, the statute has never been fully tested in courts, so the full contours of...more
• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more