News & Analysis as of

Cybersecurity Risk Mitigation Information Governance

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Lighthouse

A Less is More Strategy for Data Risk Mitigation

Lighthouse on

With new collaboration features, AI tools, and work technology developing at a dizzying pace, we know that the volume of data organizations must manage will only increase faster. What are the risks and costs involved with...more

U.S. Legal Support

Data Privacy Needs & Trends in Litigation Support

U.S. Legal Support on

One of the most important trends in our 2024 survey was the rising importance of data privacy in litigation support. Increased adoption of virtual legal technology and innovative technologies like Artificial Intelligence (AI)...more

Foley & Lardner LLP

The Intersection of Agentic AI and Emerging Legal Frameworks

Foley & Lardner LLP on

The evolution of artificial intelligence (AI) has introduced systems capable of making autonomous decisions, known as agentic AI. While generative AI essentially “creates” – providing content such as text, images, etc. –...more

HaystackID

Rising HSR Transactions Highlight M&A Recovery and Emerging Challenges

HaystackID on

The intersection of economic indicators and Hart-Scott-Rodino (HSR) transaction trends provides a detailed view of the evolving mergers and acquisitions (M&A) environment. These insights are essential for professionals...more

Epiq

Preparing for the Full Power of AI: The Crucial Role of Information Governance

Epiq on

As organizations increasingly embrace the transformative potential of Artificial Intelligence (AI), the importance of robust Information Governance (IG) policies cannot be overstated. AI, a technology that mimics human...more

EDRM - Electronic Discovery Reference Model

Cyber Diplomacy: A New Frontier in International Relations and Professional Practice

ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Association of Certified E-Discovery...

[Webinar] Mastering Information Governance: Strategies for Effective Data Management in the Evolving World of Cybersecurity - June...

Join us for an insightful webinar that will delve into the critical aspects of information governance and data management in the rapidly evolving field of cybersecurity. As organizations face escalating cyber threats, the...more

Womble Bond Dickinson

[Webinar] Innovation Interchange Summit: The Power Of Cross-Industry Insight - May 16th, 11:00 am - 4:00 pm ET

Womble Bond Dickinson on

Powerful ideas emerge when you look at something through a completely different lens. And when two parties come together to share those unique perspectives? That’s when the magic happens. Womble Bond Dickinson’s virtual...more

Epiq

Data Breaches up 72% From Record High: Cyber Incident Readiness Must be Top of Mind

Epiq on

“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more

HaystackID

Cooperation Standards in Government Investigations: Practical Tips

HaystackID on

Editor’s Note: From time to time, ComplexDiscovery highlights publicly available or privately purchasable announcements, content updates, and research from cyber, data, and legal discovery providers, research organizations,...more

Epiq

How Thinking Outside Silos Helps Risk Management and Cyber Threat Response

Epiq on

The term “risk” gets tossed around constantly in the corporate world. But who is responsible for defining and managing risk? This answer is not black and white, as risk type and appetite will look different for every...more

Association of Certified E-Discovery...

[Webinar] Product Showcase: Mitigate Growing Data Risks with a Legal GRC Strategy - June 23rd, 1:00 pm - 2:00 pm EDT

According to the 2021 ACC CLO Survey, the top three risks troubling CLO's are: cybersecurity, compliance, and data privacy. All these risks have one thing in common - data. Legal teams must effectively and defensibly manage...more

TransPerfect Legal

The Colonial Pipeline Ransomware: Know Where Your Key Data Lives, Decrease Your Threat Footprint

TransPerfect Legal on

The Colonial Pipeline ransomware attack was the largest in the energy sector to date, and with cybercrimes up 100% from 2019 to 2020 this is only the beginning for 2021. Many organizations are taking on a digital...more

American Conference Institute (ACI)

[Virtual Event] Crown Corporate Governance Annual Conference - January 19th - 20th, 10:15 am - 6:00 pm EST

Practical Strategies for Board Oversight of Government-Owned Entities and Agencies. The CI’s 16th Annual Conference on Crown Corporate Governance returns in a completely interactive virtual format to help you navigate a...more

Association of Certified E-Discovery...

[Webinar] E-Discovery Is Changing: Understanding the Impact of Legal GRC on E-Discovery - November 25th, 2:00 pm - 3:00 pm GMT

According to Exterro's recent 2020 Corporate Legal Leaders Report, 7-in-10 Legal Departments are now managing their data related problems by sharing technology to manage litigation, data privacy, compliance, and cybersecurity...more

Faegre Drinker Biddle & Reath LLP

Emerging Cyber-Security Threats for 2020: The Rise of Disruptionware and High-Impact Ransomware Attacks

Disruptionware is defined by the Institute for Critical Infrastructure Technology (ICIT) as a new and “emerging category of malware designed to suspend operations within a victim organization through the compromise of the...more

A&O Shearman

Privacy and Cybersecurity Checklist When Designing a Family Office

A&O Shearman on

As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide