News & Analysis as of

Best Practices Risk Management

Dentons

Ep. 65 – Don’t Make This Mistake When Using Physician Compensation Benchmarks

Dentons on

Physician compensation benchmarks like those from the Medical Group Management Association (MGMA) or the American Medical Group Associations) AMGA are commonly used in the healthcare industry. Organizations lean on them for...more

Davis Wright Tremaine LLP

NSA Issues Cybersecurity Guidance and Best Practices for AI Systems

The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more

Jackson Lewis P.C.

Different Country, Same Challenges: Lessons from a Breach That Could Have Been Prevented

Jackson Lewis P.C. on

A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more

Braumiller Law Group, PLLC

Hot Topics in International Trade - June 2025 - CTPAT: An Anchor for Weathering the Trade Storms

A few weeks ago, at the Trade and Cargo Security Summit, held in New Orleans, we learned that CBP (Customs and Border Protection) WAS NOT going to discuss the current administration’s policy during the conference. (Cue the...more

Farella Braun + Martel LLP

Fraud Risks in Nonprofit Organizations: Learning From Real-Life Case Studies

The Washington Post (2013) found that one-sixth of all embezzlement cases in the U.S. involve nonprofit and religious organizations, ranking just behind the financial sector. This statistic is jarring but not entirely...more

Poyner Spruill LLP

The Sovereign Citizen Movement and Potential Impacts on Lending Institutions

Poyner Spruill LLP on

The “Sovereign Citizen Movement” is a term used to describe the growing number of individuals who deny the authority and / or legitimacy of the U.S. government. While the “SovCit” movement originated decades ago, there...more

Integreon

Navigating the Multilingual Maze: Document Review in Cross-Border Litigation and Regulatory Investigations

Integreon on

As cross-border litigation and regulatory investigations become increasingly common, document review professionals and providers are frequently tasked with reviewing documents spanning multiple languages....more

McDonnell Boehnen Hulbert & Berghoff LLP

AI Hallucination in Legal Cases Remain a Problem

One would think an artificial intelligence company would be sensitized to the risk of AI hallucination in legal citations. One would be wrong. In Concord Music Group, Inc. v. Anthropic PBC, Magistrate Judge Susan Van Keulen...more

Herbert Smith Freehills Kramer

Handy client guide to privilege

We have published a client guide to legal professional privilege under English law. This guide comprises: A decision tree: intended as a quick reference to help determine which documents can legitimately be withheld on...more

Katten Muchin Rosenman LLP

CFTC Staff Reminds Registered Exchanges and Clearinghouses to Evaluate and Calibrate Their Volatility Control Mechanisms

The Commodity Futures Training Commission’s (“CFTC”) Division of Market Oversight and Division of Clearing and Risk issued an advisory (the “Staff Advisory”) reminding designated contract markets (“DCMs”) and derivatives...more

Jaburg Wilk

Routine is the Enemy of Awe and Innovation

Jaburg Wilk on

All of us have been conditioned to worship at the altar of efficiency. I’ve watched countless people try to optimize their schedules down to the minute, transforming their professional lives into a series of predictable...more

Amundsen Davis LLC

Actual vs. Apparent Authority: Limiting Business Liability From Unauthorized Employee Actions

Amundsen Davis LLC on

As a business grows and adds new members to the team, it can be difficult to identify what role each person plays and their level of authority. While some have the ability to make important decisions on behalf of the...more

Fox Rothschild LLP

Best Practices for Securing Data Used to Train and Operate AI Systems

Fox Rothschild LLP on

The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more

Husch Blackwell LLP

Clinical Trial Audit Readiness: A Step-by-Step Guide for Research Sites

Husch Blackwell LLP on

Audit preparedness is essential for every clinical research site. By operationalizing compliance in your daily procedures, you can effectively mitigate risk and ensure smooth inspections. Start by thoroughly educating key...more

American Conference Institute (ACI)

[Virtual Conference] 19th Annual BIG FOUR Pharmaceutical Pricing Boot Camp - June 23rd - 24th, 9:00 am - 5:30 pm EDT

Attend ACI's 19th Annual BIG FOUR Pharmaceutical Pricing Boot Camp for an intensive online bootcamp that will provide you with a thorough understanding of essential government contracting processes and pricing concepts for...more

American Conference Institute (ACI)

[Event] International Conference on Anti-Corruption - June 17th - 18th, London, United Kingdom

Cross-jurisdiction cooperation in the fight against international corruption and bribery is intensifying. The UK’s Serious Fraud Office (SFO), France’s National Financial Prosecutor’s Office (PNF), and Switzerland’s Office of...more

Alston & Bird

UK Publishes Software Security Code

Alston & Bird on

Cyber security supply chain risks are growing, and attacks on vendors and other third parties cause severe disruption to businesses. For example, in recent years we have seen many incidents that have involved threat actors...more

Ankura

The Importance of Culture in an Effective Cybersecurity Program

Ankura on

While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more

Conn Maciel Carey LLP

Best Practices to Safeguard Your Company’s Trade Secrets — Case Study

Conn Maciel Carey LLP on

The number one risk for trade secrets exfiltration is from insider threats—employees, contractors, or even executives with access to sensitive information who either intentionally or accidentally compromise it. Sometimes it’s...more

Thomas Fox - Compliance Evangelist

Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance

Welcome to “Compliance Tip of the Day,” the podcast where we bring you daily insights and practical advice on navigating the ever-evolving landscape of compliance and regulatory requirements. Whether you’re a seasoned...more

Thomas Fox - Compliance Evangelist

Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe

Innovation comes in many areas, and compliance professionals need to be ready for it and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning...more

EDRM - Electronic Discovery Reference Model

[Webinar] Down the Rabbit Hole: Navigating IP Theft Investigations - May 29th, 1:00 pm - 2:15 pm ET

Step into Wonderland and ensure you’re equipped to handle intellectual property theft investigations by seeing the entire picture of what’s on employee’s devices — even deleted data. Take a Curious Stroll Through the...more

Ankura

Zero Trust Architecture Best Practices

Ankura on

As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more

BakerHostetler

AI Audit Best Practices for Building User and Global Trust

BakerHostetler on

Artificial intelligence (AI) as a field encapsulates machine learning, deep learning and generative AI. As the impact of these technologies continues to grow, industry leaders and regulators have been grappling with how to...more

Osano

A Guide to Data Privacy in Healthcare: Compliance and Best Practices

Osano on

Healthcare is a very personal experience. In order to receive the best care, individuals must share the most intimate details about themselves. For this reason, trust between patients and healthcare providers is crucial. Data...more

825 Results
 / 
View per page
Page: of 33

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide