Guidepost in Motion: Off The Chain Part 2 Innovations and Best Practices in Crypto and Blockchain
Cyberside Chats: Don’t silo your risk from legal (with Ingrid Rodriguez)
Digging Deeper Episode 10: Misguided or Misconduct? Understanding Bad Behavior in the Corporate World
M365 in 5 – Part 7: Teams Audio/Video (A/V) Conferencing
M365 in 5 – Part 6: Teams Channels – The virtual collaboration workspace
M365 in 5 – Part 5: Teams Chats – Modern communications
M365 in 5 – Part 4: Teams – An introduction to collaboration
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Sitting with the C-Suite: Differentiating Through Client Service
Sitting with the C-Suite: Culture Integration in a Remote Work Environment
Sitting with the C-Suite: HaystackID and NightOwl Merger Overview
Sitting with the C-Suite: Managing through Challenging Times? Focus on the Key Three
Nota Bene Episode 91: China Q3 Check In - Trade Wars, GDP Growth, Pandemic Comparatives, and Hong Kong with Michael Zhang
Sitting with the C-Suite: COVID 19 Impact – Four Sectors of Change for the Legal Industry
Sitting with the C-Suite: Legal Industry Technology Adoption
Sitting with the C-Suite: Trial Prep as a Launchpad for Services
Sitting with the C-Suite: eDiscovery Observations – Historical Lookback to 1990s and 2000s
Sitting with the C-Suite: Servient – What’s Next
As 2025 progresses, one thing is clear—GDPR enforcement is not slowing down. In fact, regulators across Europe are intensifying their scrutiny, handing out significant fines and even warning executives of potential personal...more
Cybersecurity is integral to protecting sensitive information, ensuring regulatory compliance, managing financial risks, maintaining reputation, ensuring business continuity, gaining a competitive advantage, adapting to...more
The role of Chief Compliance Officers (CCOs) has evolved beyond risk mitigation into a critical strategic function. Today, CCOs are the stewards of regulatory compliance and strategic partners of the C-suite, shaping...more
Cybersecurity success depends on more than just technology. As we’ve seen in part one and part two of this series on cybersecurity risk, the costs of a cyber attack are high – and bad actors always look for the easiest entry...more
Over the past few months, the OIG shorts series focused on structuring and implementing a comprehensive and effective ethics and compliance program. Many times, this requires a mindset shift from a checking-the-box mentality...more
The House Committee on Energy & Commerce reported out the American Data Privacy and Protection Act (ADPPA) last week and it is now eligible for a full House vote. If passed by Congress and signed by the President, the ADPPA...more
Over the past few months, there have been numerous developments in U.S. and international privacy law. In the United States, Colorado and Virginia passed consumer privacy laws, and California voters passed a substantial...more
The Colorado legislature just passed the Colorado Privacy Act (CPA). Once signed by the Governor, Colorado will become just the third state – after California and Virginia – to enact broad consumer data privacy legislation....more
Through Aerospace & Defense Insights, we share with you the top legal and political issues affecting the aerospace and defense (A&D) industry. Our A&D industry team monitors the latest developments to help our clients stay in...more
Join Reed Smith’s Anthony Diana and Trevor Satnick, with John Holliday from Lighthouse, in a conversation about OneDrive for Business and how organizations can use it for personal document storage, such as giving other users...more
CYBERSECURITY - C-Suite + Managers Pose Higher Security Risk to Organizations - You executives and managers who are in my age group (that is, you didn’t grow up with mobile devices and computers) listen up. According to...more
You executives and managers who are in my age group (that is, you didn’t grow up with mobile devices and computers) listen up. According to several studies, you pose a higher security risk to your organization than the...more
Shook Weighs in on Updated CCPA Regulations - In response to extensive public comment, the California Attorney General’s office released modified draft regulations under the CCPA on February 7. Shook has provided initial...more
FINRA held its bi-annual Cybersecurity Conference in January and recently published five take-away real-world experiences from the conference...more
On January 6, 2020, Andrew Smith, Director of the Federal Trade Commission (FTC) Bureau of Consumer Protection, announced three significant improvements to the FTC’s approach to data security enforcement cases....more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
The FTC recently summarized three major changes it made to its orders in data security cases. In a blog signaling these changes, the FTC Indicated that some of the things it has been requiring of companies in 2019 are here to...more
Synopsis: On January 6, 2020, Andrew Smith, director of the Federal Trade Commission’s Bureau of Consumer Protection, outlined in a blog post the agency’s new approach to data security orders. The agency implemented this...more
We continue to try to alert our clients about the changing threat landscape in cybersecurity. We keep saying how the threats are becoming more and more sophisticated and more and more frequent, and that companies must...more
On September 15, 2015, the Security and Exchange Commission’s Office of Compliance Inspections and Examinations (“OCIE”) issued a Risk Alert to provide additional information on the areas of focus for its second round of...more
NFA links NFA’s supervisory requirements with its proposed requirements mandating that NFA Members have information systems security programs. The National Futures Association (NFA) has proposed cybersecurity...more
A new survey released by Raytheon and websense, called “Study-Why Executives Lack Security Posture Confidence While Knowing that the Metrics They Use to Gauge it are Ineffective” “reveals that confidence in [executives’]...more
After a summer that saw major data breaches at the Office of Personnel Management and UCLA Health System, this fall is a great time to take your organization back to school on HIPAA compliance and data security. Here are...more
In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more
With data breaches, cyberterrorism and governmental enforcement of the protection of privacy on the rise, corporations are facing an increased likelihood of claims, legal proceedings and costs. Without a proper understanding...more