News & Analysis as of

Data Breach Cybersecurity Electronically Stored Information

Purpose Legal

Proactive Steps for Protecting your Intellectual Property (IP) and Trade Secrets

Purpose Legal on

We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more

Purpose Legal

Understanding the Basics of eDiscovery Processing

Purpose Legal on

In today’s digital world, the way we handle information has transformed dramatically. With this transformation, eDiscovery has become an essential part of legal proceedings and investigations. Whether you’re involved in a...more

Association of Certified E-Discovery...

[Webinar] What Does CISA and NIST Say About Forensic Investigations During a Breach? - November 7th, 10:00 am PST

In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

EDRM - Electronic Discovery Reference Model

[Webinar] Unlocking the Power of ROPA: Why It Matters, Latest Privacy Trends, and How It Protects Your Business - August 20th,...

Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing emphasis on data transparency, it's essential to stay ahead...more

Association of Certified E-Discovery...

[Webinar] Stay ahead of the latest privacy trends: Unlocking the power of ROPA - September 10th, 10:00 am PDT

Why it matters and how it protects your business - Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing...more

EDRM - Electronic Discovery Reference Model

[Webinar] How Legal Must Mitigate Risk in Today's Dangerous and Changing Data Landscape - May 23rd, 1:00 pm - 2:00 pm ET

One of the biggest challenges facing in-house legal teams is the ever-changing data landscape. The amount of structured and unstructured data has exploded over the last five years making legal and privacy activities more...more

Association of Certified E-Discovery...

[Webinar] Navigating the Cybersecurity Landscape: Insights from Legal and Insurance Experts - May 14th, 9:00 am - 10:00 am PDT

In today's digital world, organizations are increasingly vulnerable to a wide variety of cyber threats that can wreak havoc on their operations, jeopardize the security of confidential information, negatively impact...more

Carlton Fields

No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns

Carlton Fields on

Dr. Diana Burley has nearly 30 years of experience leading digital transformations and driving cross-sector education, research, and strategic innovation. As American University’s chief research and innovation officer, she is...more

Association of Certified E-Discovery...

[Webinar] Data Mining 2.0: How WatchtowerAI Transforms Incident Response - December 6th, 1:00 pm - 2:00 pm EST

In today’s digital landscape, organizations face a constant threat of cybersecurity incidents. Identifying sensitive information and promptly notifying relevant parties during an incident is a daunting challenge. The current...more

Reveal

[Webinar] Declutter Your Data: Strategies for Efficient Data Retention & Risk Reduction - October 25th, 1:00 pm - 2:00 pm ET

Reveal on

In an era where data is often referred to as the “new oil,” an abundance of it can lead to unexpected challenges. Back in 2012, IDC estimated that information workers spent an average of 9.4 hours per week simply sifting...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Association of Certified E-Discovery...

Cyber Incident Response and eDiscovery Are Not One in the Same: Understanding the Key Differences and Associated Risks

With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more

HaystackID

[Webinar] Proper Hygiene Matters: Three Cybersecurity, Privacy, and Data Protection Challenges and Solutions - March 15th, 12:00...

HaystackID on

From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more

EDRM - Electronic Discovery Reference Model

[Webinar] NIST CSF 2.0 – Back to the Future - March 7th, 1:00 pm - 2:15 pm ET

GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more

Association of Certified E-Discovery...

[Webinar] Data Breach Review: Best Practices and Top Technology Considerations - December 2nd, 1:00 pm - 2:00 pm EST

There’s no denying that data breaches are a major concern for organizations of all sizes, 2021 saw 1,860 data breaches occur (a record high), and 81% of those involved sensitive information like social security numbers and...more

EDRM - Electronic Discovery Reference Model

[Webinar] Cyber Sidebar: The NIST Cybersecurity Framework Applied to the Legal Profession - November 15th, 1:00 pm - 2:15 pm ET

The legal profession is under constant threat of cyberattacks and breaches. Cybersecurity challenges exist in many contexts but the legal profession is particularly vulnerable due to its federated environment and disparate...more

Association of Certified E-Discovery...

[Webinar] Information Governance and Cyber Security Breach Review: Best Practices - August 10th, 1:00 pm - 2:00 pm EDT

The best practice approach to effectively handling a data security incident starts with a proactive response plan. But when the inevitable occurs, will your plan stand up to the test? Join our panel of experts as they discuss...more

EDRM - Electronic Discovery Reference Model

Ransomware Reduces Costa Rica to Pen and Paper

This story has been covered across cybersecurity media, but it’s so big I’m surprised it hasn’t been covered even more, by mainstream media. A ransomware attack by the Conti ransomware group has left the Costa Rican...more

TransPerfect Legal

Changing the Automotive Narrative: Hacking Concerns & Wireless Communication Interfaces

TransPerfect Legal on

The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more

Reveal

Identifying and Protecting Data Within Your Organization is a Moving Target

Reveal on

Organizations have a lot to contend with regarding their data these days. Data is more sensitive than ever, due to ever-changing data privacy laws. Yet, it’s also under siege more than ever with an increasing number of...more

Association of Certified E-Discovery...

[Webinar] Data Privacy for eDiscovery Pros: Strategy and Execution - March 17th, 1:00 pm - 2:00 pm EDT

This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more

Association of Certified E-Discovery...

[Webinar] Data Breach Response -- Technologies, Techniques and Technicalities - February 17th, 1:00 pm - 2:00 pm EST

The retention of prolific sensitive, personal electronic information has essentially become a responsibility inherent in the conduct of modern business. From the maintenance of medical records by a healthcare provider to the...more

Association of Certified E-Discovery...

[Webinar] Ten Recent Cybersecurity and Data Breach Trends You Need to Know - January 12th, 1:00 pm - 2:00 pm EST

It seems there is another high-profile data breach just about every day that results in issues for organizations ranging from compromised personal data of customers to millions of dollars lost in sanctions or judgments to...more

Association of Certified E-Discovery...

[Webinar] The Intersection of eDiscovery and Data Security Incidents - November 30th, 1:00 pm - 2:00 pm EST

The Coronavirus pandemic is moving more organizations to remote working models. This enhances the potential trajectory for data security incidents and other information exfiltration to increase dramatically. The number of...more

56 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide