Back to School: 3 Essential Employee Trainings
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
Safeguard your Business: Dinsmore's Craig Horbus on Combatting the Rising Threat of ACH Fraud
The Privacy Insider Podcast Episode 4: Don't Be Evil: In the Hot Seat of Data Privacy, Part 1
It's Time to Think About Data Mapping Differently
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Preventative Medicine: Health Care AI Privacy and Cybersecurity — The Good Bot Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Navigating State Privacy Laws: A Conversation with Oregon & Texas Regulators about Privacy Enforcement
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
Navigating State Privacy Laws
Like few topics before it, generative artificial intelligence (GenAI) has dominated discussions in many C-suites over the last year. Boards are playing a crucial role in both encouraging management to accelerate the pace of...more
Is your business in compliance with every law, rule, and regulation that it should be? If you can’t confidently say yes, it’s time for a compliance risk assessment. And even if you could confidently say yes six months ago,...more
Corporations must innovate and set themselves apart from their competition to achieve long-term success, but they cannot act with reckless abandon in doing so. Rather, they must strategically plan their moves to proactively...more
The modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information / data security and privacy evolve at the speed of the technical...more
Whether or not Elon Musk’s recent acquisition of Twitter is a good thing or bad thing for the future of social media (Twitter accepts buyout, giving Elon Musk total control of the company – The Verge), one aspect of social...more
Patrick Tracey and Doug Radigan will be the speakers for the webinar “A Brave New World: Corporate Policies & Procedures Post-COVID” presented by the Association of Corporate Counsel (ACC) Northeast. Recent experience, as...more
Corporate legal teams and the companies they serve are being forced to face the tough new realities of data privacy regulation. By confronting the hard truths of data privacy today, though, they can avoid even harder lessons...more
Sharing limited personal information with retailers has its benefits, including targeted ads, discounts, incentives, and coupons. But at what cost? Do the risks of disclosing your personal information to retailers outweigh...more
Uber went big on Thursday. Unfortunately, for everyone (including fans of cinnamon gum and oversized gingers) it was Big Red, as the ride-hailing company posted a $5.2 billion loss for Q2—its largest ever since it began...more
Joseph Hall once said, “A reputation once broken may possibly be repaired, but the world will always keep their eyes on the spot where the crack was”. In 2019 we like to think there is a filter for everything, but what about...more
Fifty-six percent of law school admissions officers say they look at an applicant’s social media profile to learn more about them, according to a survey by Kaplan Test Prep of 117 law schools. Ninety-one percent of law...more
In an effort to phase out what many in the security world believe are threats to the cybersecurity posture of governmental agencies and private entities alike, John Quinn, the Chief Information Officer of the State of...more
Data breaches are crisis moments that business must prepare for in many ways: not just in taking steps at prevention, but also mitigating losses, arranging for business continuity, complying with legal and regulatory...more
In this issue: - THE THREE C’S — CONFIDENCE, CREDIBILITY AND COST - WHO CONDUCTS THE INVESTIGATION? - SCOPE OF THE INVESTIGATION - MINDSET AT THE OUTSET OF AN INVESTIGATION - THE NEED FOR SPEED ...more