No Password Required: The Motorcycle-Riding Founder of Cyversity Who Values Mentorship and Inclusivity Above All Else
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Episode 7: Top three things that will mitigate the most common types of cloud breaches (with John Grange)
Industry Implications of EO on Improving the Nation’s Cybersecurity
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Sitting with the C-Suite: In-House Counsel - Key Questions to Ask Your Law Firms about Technology
Sitting with the C-Suite: The Future of Legal Tech
Sitting with the C-Suite: Advice for Legal Technology Entrepreneurs
Sitting with the C-Suite: Alma Asay's Path to Legal Technology
Sitting with the C-Suite: Legal Industry Technology Adoption
Sitting with the C-Suite: Servient – What’s Next
In the ever-evolving world of cybersecurity, even organizations that meet stringent security standards can be victims of sophisticated cyberattacks. A notable example of this is the December 8, 2024 cybersecurity incident...more
NIS2 (Network and Information Systems Directive 2) is the updated version of the NIS Directive, which the EU first introduced in 2016. The original NIS Directive aimed to enhance cybersecurity across member states by...more
In light of recent cyberattacks targeting the federal government and United States supply chains, President Biden’s administration has released an Executive Order (the “Order”) in an attempt to modernize and enhance the...more
Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more
Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more
Efficiency, scalability, speed, increased cost savings, and advanced security for highly sensitive data remain in high demand by users of eDiscovery services. To meet that demand, cloud technology promised several of those...more
While organizations have increasingly embraced cloud computing as a solution to their data management and other needs, they do so in an environment of heightened risks. Attacks on cloud providers are increasing, which makes...more
Please join Epiq and Microsoft Canada for an interactive roundtable discussion on the impact of digital transformation, compliance, data protection and Information Governance in Canada's Healthcare Sector. This 60-minute...more
Participate in thoughtful discussions with Epiq and Microsoft Canada on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft Canada would like to personally invite you to join a...more
Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more
We are living in the age of data and big data, where everyone wants to collect as much information as possible. The ability to analyze and monetize such information is a key strategy and selling point for many businesses. ...more
In February 2014 the U.S. National Institute of Standards in Technology (‘NIST’) published the ?rst NIST Cybersecurity Framework, responding to an Executive Order on improving critical infrastructure cybersecurity issued by...more
I have negotiated hundreds of SaaS agreements for dozens of software companies and I always hated when the company on the other side was a healthcare provider. Invariably, they would bring up Protected Health Information...more