News & Analysis as of

Data Breach Information Governance Compliance

BakerHostetler

Data Governance: Practical Considerations for a Reasonable Security Program

BakerHostetler on

Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization’s network. The threat actor provides a file tree and sample files to substantiate its claim....more

Clark Hill PLC

It’s a New Year and a Good Time for a Cybersecurity Checkup

Clark Hill PLC on

2024 was another active year in cybersecurity, with high-profile vulnerabilities and data breaches, and government and private sector responses to them. Examples include pervasive ransomware attacks targeting the healthcare,...more

HaystackID

Rising HSR Transactions Highlight M&A Recovery and Emerging Challenges

HaystackID on

The intersection of economic indicators and Hart-Scott-Rodino (HSR) transaction trends provides a detailed view of the evolving mergers and acquisitions (M&A) environment. These insights are essential for professionals...more

Reveal

A Corporate Lawyer's Guide To Data Privacy & Data Protection

Reveal on

Privacy laws bring substantial compliance challenges for every organization that collects, processes, stores, and transfers personal data anywhere in the world. For legal departments, compliance professionals and internal...more

HaystackID

[Webcast Transcript] Mastering M365: Strategies for Streamlined Records Management and its Impact on eDiscovery

HaystackID on

Editor’s Note: In the rapidly accelerating landscape of digital information management, the intersection of legal technology and records management is becoming increasingly important in light of increased data types and...more

Epiq

Moving Information Governance to the Driver’s Seat to Accelerate Cyber Breach Response

Epiq on

Information Governance often takes a back seat to other organizational initiatives. But why is this the case? The list of reasons is long and varied. Not knowing where to start or how to build strategic approaches to...more

HaystackID

Cybersecurity Experts Urge Responsible AI Adoption, Not Overreliance

HaystackID on

Editor’s Note: This article covers valuable insights on artificial intelligence’s (AI) evolving role in cybersecurity and incident response shared during an expert panel discussion. As cybersecurity, information governance,...more

Reveal

Information Governance 101: Everything You Need to Know To Get Started in 2023

Reveal on

Information governance (IG) plays an increasingly significant role of the way corporations do business. But what do organizations do with all their data? Where do they store it—and is it secure, well organized, and...more

Array

Cybersecurity and eDiscovery: What you need to know about your vendor

Array on

Baker McKenzie recently released their sixth annual edition of ‘The Year Ahead: Global Disputes Forecast’ in which senior legal and risk leaders share what they expect to see in the coming year. From an overarching...more

HaystackID

[Webcast Transcript] Data Mining in Incident Response: Managing Risk and Spend through an Effective Evidence-Based Approach

HaystackID on

Editor’s Note: On August 31, 2022, HaystackID shared an educational webcast on the topic of data mining in data breach incident response. As data mining has increasingly become one of the largest expenses during a cyber...more

The Volkov Law Group

It is 2019 . . . Do You Know Where Your Data Is?

The Volkov Law Group on

We are living in a rapidly changing world (trite, I know) where companies have to focus on data privacy and security for a variety of reasons. Consumers and constituents are concerned about the safety and privacy of personal...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide