FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
Compliance Tip of the Day: Embedded Compliance
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Law School Toolbox Podcast Episode 496: The Early BigLaw Recruiting Timeline (w/Sadie Jones)
Whistleblower Challenges and Employer Responses: One-on-One with Alex Barnard
Compliance Tip of the Day: Compliance By Design
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
Podcast - How to Use Humor and Anger Effectively in the Courtroom
Podcast - At Trial, Less Is More
Enhancing Workplace Feedback: Lessons From Harry Potter — Hiring to Firing Podcast
Podcast - Voice and Delivery
Podcast - Crafting Winning Strategies: Theories and Themes in Trials
Podcast - Borrowing and the Art of Trial Advocacy
This Extraordinary Process Called "Trials"
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 209: North Carolina’s Life Sciences Industry with Laura Gunter of NCLifeSci
Due Diligence in AI: 3 things you need to survive AI scrutiny
#WorkforceWednesday®: New DOL Guidance - ERISA Plan Cybersecurity Update - Employment Law This Week®
Meeting the Needs of General Counsel: Beyond the Basics of Legal Advice - On Record PR
Studying the Global Legal Market to Keep Businesses Ahead of the Curve: On Record PR
PODCAST: Williams Mullen's Gavels & Gowns - Title IX Regulations - Changes on the Horizon
Organizations seeking to improve their cybersecurity posture in 2025 must assess what happens after an incident has occurred, and how an incident response team will be able to mobilize to respond. This article provides...more
According to research by the International Association of Privacy Professionals (IAPP), privacy is growing—but not fast enough. Privacy teams are growing by 12% year-over-year, but many organizations are still struggling to...more
The office of the Colorado Attorney General, Phil Weiser, recently issued a data security best practices guidance document as part of his office’s role in “implementing and enforcing data security and data privacy laws.” In...more
Ransomware and other cybersecurity attacks have made national headlines during the past 12 months, and public pension systems are as susceptible to these attacks as any other organization. In this episode of Public Pensions &...more
Our podcast series features AGG attorneys and guests discussing challenges they’ve encountered when assisting clients on business and legal issues related to the Technology industry. While all topics will have a legal...more
While business risks abound, including intensified cybersecurity attacks, the impact of rapid technological advances and increasing regulations, there are healthy ways to uncover and mitigate risks. Organizations are...more
Please join Epiq and Microsoft Canada for an interactive roundtable discussion on the impact of digital transformation, compliance, data protection and Information Governance in Canada's Healthcare Sector. This 60-minute...more
Attend SCCE’s annual conference for those who manage compliance at higher education institutions. Learn best practices and strategies, ask questions of the speakers, and share ideas with other attendees. The 2021 virtual...more
Participate in thoughtful discussions with Epiq and Microsoft Canada on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft Canada would like to personally invite you to join a...more
The March sessions of Legalweek took place recently, and as with the February sessions, the virtual event struck a chord that reverberated deep from within the heart of a (hopefully) receding pandemic. However, the...more
Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
Practical steps to address cybersecurity threats—what you should do when heightened tension in the Middle East or other events increase the threat of cybersecurity incidents. - When news events or business initiatives turn...more
Effective as of January 1, 2020, the California Consumer Privacy Act (CCPA) gives broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more
In line with recent actions taken across the government to enhance the resilience of the nation’s cybersecurity apparatus, the Cybersecurity Infrastructure Security Agency (CISA) recently released a set of best practices for...more
For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more