News & Analysis as of

Cybersecurity Electronically Stored Information Data Protection

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Purpose Legal

Proactive Steps for Protecting your Intellectual Property (IP) and Trade Secrets

Purpose Legal on

We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more

Ankura

Ensuring Data Security and Confidentiality During E-Discovery

Ankura on

In the high-stakes world of legal due diligence, the security and confidentiality of sensitive information are paramount. With the increasing volume of electronically stored information (ESI) and the complexity of modern...more

HaystackID

[EDRM Workshop Transcript] Managing Data Overload and Complexity in Catastrophic Events

HaystackID on

Editor’s Note: Managing data effectively can make the difference between success and failure in high-pressure situations, such as natural disasters and international investigations. A recent EDRM workshop provided a rare...more

EDRM - Electronic Discovery Reference Model

Private LLMs vs. RAG Systems? Choosing the Right AI Strategy for Your Legal Organization

As law firms and legal departments race to leverage artificial intelligence for competitive advantage, many are contemplating the development of private Large Language Models (LLMs) trained on their work product. While the...more

Purpose Legal

What is the Chain of Suspicion?

Purpose Legal on

Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more

EDRM - Electronic Discovery Reference Model

Implications of the €310 Million LinkedIn Fine for GDPR Compliance

ComplexDiscovery’s Editor’s Note: This recent €310 million fine imposed on LinkedIn by Ireland’s Data Protection Commission (DPC) marks a powerful moment in GDPR enforcement, underlining the regulatory rigor facing global...more

Association of Certified E-Discovery...

[Webinar] What Does CISA and NIST Say About Forensic Investigations During a Breach? - November 7th, 10:00 am PST

In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more

Epiq

Preparing for the Full Power of AI: The Crucial Role of Information Governance

Epiq on

As organizations increasingly embrace the transformative potential of Artificial Intelligence (AI), the importance of robust Information Governance (IG) policies cannot be overstated. AI, a technology that mimics human...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Perkins Coie

Cybersecurity for Lawyers: A Series

Perkins Coie on

If you are an attorney covering cybersecurity, not only do you have to stay on top of ever-evolving legal obligations and risks, you have to be able to speak competently with your technical counterparts....more

EDRM - Electronic Discovery Reference Model

[Webinar] Unlocking the Power of ROPA: Why It Matters, Latest Privacy Trends, and How It Protects Your Business - August 20th,...

Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing emphasis on data transparency, it's essential to stay ahead...more

Association of Certified E-Discovery...

[Webinar] Stay ahead of the latest privacy trends: Unlocking the power of ROPA - September 10th, 10:00 am PDT

Why it matters and how it protects your business - Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing...more

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

EDRM - Electronic Discovery Reference Model

Cyber Diplomacy: A New Frontier in International Relations and Professional Practice

ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more

Association of Certified E-Discovery...

[Webinar] Navigating the Cybersecurity Landscape: Insights from Legal and Insurance Experts - May 14th, 9:00 am - 10:00 am PDT

In today's digital world, organizations are increasingly vulnerable to a wide variety of cyber threats that can wreak havoc on their operations, jeopardize the security of confidential information, negatively impact...more

EDRM - Electronic Discovery Reference Model

Illumination Zone: Episode 159 | Shawn Belovich of HaystackID sits down with Kaylee & Mary

In the fifteenth episode of EDRM Trusted Partner, HaystackID’s podcast series, Shawn Belovich, Senior Vice President - Digital Forensics & Cyber Incident Response for HaystackID sits down with Kaylee and Mary to talk about...more

Carlton Fields

No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns

Carlton Fields on

Dr. Diana Burley has nearly 30 years of experience leading digital transformations and driving cross-sector education, research, and strategic innovation. As American University’s chief research and innovation officer, she is...more

EDRM - Electronic Discovery Reference Model

Secure Design: A Matter of Responsibility and Diligence

Cybersecurity is one of the biggest challenges facing contemporary society. With the advancement of digital technologies and the ever-increasing dependence on information systems to perform the most diverse activities, the...more

HaystackID

[Webinar] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories - August 30th,...

HaystackID on

In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Association of Certified E-Discovery...

Cyber Incident Response and eDiscovery Are Not One in the Same: Understanding the Key Differences and Associated Risks

With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more

HaystackID

[Webinar] Proper Hygiene Matters: Three Cybersecurity, Privacy, and Data Protection Challenges and Solutions - March 15th, 12:00...

HaystackID on

From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more

EDRM - Electronic Discovery Reference Model

Legal Departments Have More on Their Plates in 2023

Every year, the Association of Corporate Counsel (ACC) conducts an in-depth survey of chief legal officers (CLOs) and general counsel (GC) at major US and global organizations. The 2023 ACC CLO Survey, sponsored by Exterro,...more

EDRM - Electronic Discovery Reference Model

[Webinar] NIST CSF 2.0 – Back to the Future - March 7th, 1:00 pm - 2:15 pm ET

GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more

EDRM - Electronic Discovery Reference Model

Cyber Risk Management Chronicles, Episode V - Cyber Fundamentals: Tabletop Exercises

Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program.  The efficacy of a program is only theoretical until thorough testing is conducted.  One of...more

72 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide