News & Analysis as of

Cybersecurity Data Protection Discovery

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
HaystackID

[EDRM Workshop Transcript] Managing Data Overload and Complexity in Catastrophic Events

HaystackID on

Editor’s Note: Managing data effectively can make the difference between success and failure in high-pressure situations, such as natural disasters and international investigations. A recent EDRM workshop provided a rare...more

EDRM - Electronic Discovery Reference Model

Private LLMs vs. RAG Systems? Choosing the Right AI Strategy for Your Legal Organization

As law firms and legal departments race to leverage artificial intelligence for competitive advantage, many are contemplating the development of private Large Language Models (LLMs) trained on their work product. While the...more

Purpose Legal

What is the Chain of Suspicion?

Purpose Legal on

Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more

EDRM - Electronic Discovery Reference Model

Implications of the €310 Million LinkedIn Fine for GDPR Compliance

ComplexDiscovery’s Editor’s Note: This recent €310 million fine imposed on LinkedIn by Ireland’s Data Protection Commission (DPC) marks a powerful moment in GDPR enforcement, underlining the regulatory rigor facing global...more

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

EDRM - Electronic Discovery Reference Model

Cyber Diplomacy: A New Frontier in International Relations and Professional Practice

ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more

EDRM - Electronic Discovery Reference Model

Illumination Zone: Episode 159 | Shawn Belovich of HaystackID sits down with Kaylee & Mary

In the fifteenth episode of EDRM Trusted Partner, HaystackID’s podcast series, Shawn Belovich, Senior Vice President - Digital Forensics & Cyber Incident Response for HaystackID sits down with Kaylee and Mary to talk about...more

EDRM - Electronic Discovery Reference Model

Secure Design: A Matter of Responsibility and Diligence

Cybersecurity is one of the biggest challenges facing contemporary society. With the advancement of digital technologies and the ever-increasing dependence on information systems to perform the most diverse activities, the...more

Jones Day

Federal Court Grants the SEC Limited Access to the Identities of Law Firm Clients Impacted by a Cyberattack

Jones Day on

In Short - The Situation: Following a cyberattack on a law firm's systems, the Securities and Exchange Commission ("SEC") subpoenaed the firm for information, including the identity of clients whose information may have...more

Reveal

The best data retention policy template to get you started (Updated)

Reveal on

Editor’s note: This post was originally published in October 2020 and has been updated for accuracy and comprehensiveness. They say more is better. And that’s true in many cases, but not when we’re talking about a stockpile...more

HaystackID

[Webinar] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories - August 30th,...

HaystackID on

In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more

Association of Certified E-Discovery...

Cyber Incident Response and eDiscovery Are Not One in the Same: Understanding the Key Differences and Associated Risks

With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more

HaystackID

[Webinar] Proper Hygiene Matters: Three Cybersecurity, Privacy, and Data Protection Challenges and Solutions - March 15th, 12:00...

HaystackID on

From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more

EDRM - Electronic Discovery Reference Model

Legal Departments Have More on Their Plates in 2023

Every year, the Association of Corporate Counsel (ACC) conducts an in-depth survey of chief legal officers (CLOs) and general counsel (GC) at major US and global organizations. The 2023 ACC CLO Survey, sponsored by Exterro,...more

EDRM - Electronic Discovery Reference Model

Cyber Risk Management Chronicles, Episode V - Cyber Fundamentals: Tabletop Exercises

Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program.  The efficacy of a program is only theoretical until thorough testing is conducted.  One of...more

EDRM - Electronic Discovery Reference Model

Cyber Fundamentals: Cybersecurity as Part of Risk Management - Cyber Risk Management Chronicles, Episode II

Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more

EDRM - Electronic Discovery Reference Model

[Webinar] Managing Data Related Procedures Inside Corporate! - September 27th, 1:00 pm - 2:15 pm ET

Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more

Jenner & Block

Privilege Newsletter: Fitting Consultants Within the Attorney-Client Privilege and Work Product Protection – Cyber Breach...

Jenner & Block on

Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more

Reveal

Go Build Bridges: Sharing Ideas at Legalweek

Reveal on

I'm still elated to see the return to in-person events - there is so much to share now that we're getting back together. Earlier this month, I returned to the stage at Legalweek to share ideas with the brilliant Linn Freedman...more

Association of Certified E-Discovery...

[Webinar] Data Privacy for eDiscovery Pros: Strategy and Execution - March 17th, 1:00 pm - 2:00 pm EDT

This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more

Association of Certified E-Discovery...

What’s Coming for Legal Departments in 2022?

Corporate legal departments have seen some significant changes over the past couple of years. The ongoing explosion of data volumes and rapid adoption of new communications technologies have made e-discovery operations more...more

Association of Certified E-Discovery...

Data Protection and Cybersecurity Today

Ari Kaplan recently spoke with Kenya Parrish-Dixon, a member of the ACEDS Global Advisory Board and the General Counsel and Chief Operating Officer for Empire Technologies Risk Management Group, a cybersecurity, information...more

HaystackID

Wisdom From The Women Leading The Cybersecurity Industry, With Jenny Hamilton of HaystackID

HaystackID on

Editor’s Note: As part of the interview series called Wisdom From The Women Leading The Cybersecurity Industry, author, interviewer, and CEO of Data443 Risk Mitigation, Inc., Jason Remillard, recently shared the following...more

Association of Certified E-Discovery...

E-Discovery Gold Nuggets

Offering tips to help legal professionals with e-discovery, Daniel Gold’s “E-Discovery Gold Nuggets” highlight the newest legal technology lessons and challenges. Originally a series of short video clips on LinkedIn, ACEDS is...more

Proskauer - Minding Your Business

Lessons from Wengui v. Clark Hill: Structuring a Two Track Cyber Investigation

As the D.C. District Court in Wengui v. Clark Hill recently commented, “[m]alicious cyberattacks have unfortunately become a routine part of our modern digital world. So have the lawsuits that follow them….” The court’s...more

44 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide