When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
Back to School: 3 Essential Employee Trainings
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
Safeguard your Business: Dinsmore's Craig Horbus on Combatting the Rising Threat of ACH Fraud
The Privacy Insider Podcast Episode 4: Don't Be Evil: In the Hot Seat of Data Privacy, Part 1
It's Time to Think About Data Mapping Differently
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Preventative Medicine: Health Care AI Privacy and Cybersecurity — The Good Bot Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Navigating State Privacy Laws: A Conversation with Oregon & Texas Regulators about Privacy Enforcement
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
Organizations face increasingly sophisticated threats that can compromise data and disrupt business operations. This presentation will explore the role that digital forensics plays in an effective incident response plan using...more
The digital forensics landscape in the private sector is witnessing a metamorphosis. The relentless growth and diversification of data necessitates a paradigm shift in how organizations approach investigations. Fragmented...more
‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more
In the fifteenth episode of EDRM Trusted Partner, HaystackID’s podcast series, Shawn Belovich, Senior Vice President - Digital Forensics & Cyber Incident Response for HaystackID sits down with Kaylee and Mary to talk about...more
I. The Phenomenon of Instant Messaging- Evolution and Proliferation- From basic platforms like IRC and AIM to globally dominant apps such as WhatsApp and Telegram, instant messaging (IM) has witnessed a radical...more
Another district court just ordered the defendant in a data breach class action to turn over the forensic report it believed was entirely protected from disclosure by the attorney-client privilege and work product doctrine....more
Canadian Institute’s 11th Annual Law of Policing Conference, returns this year, in a fully virtual and interactive format where experts will delve into legislative updates, precedent-setting cases, police liability and the...more
Wrongdoing thrives in times of crisis. Some companies will be undone by the commercial effects of COVID-19. Others may survive only to be undone by groups or individuals acting without requisite integrity. There will be...more
Cellphones are an essential part of our daily lives, and our frequent usage has produced large amounts of personal data. It is unavoidable that some of this data — be it email, text message or even GPS location data — may be...more