AI Legislation: The Statewide Spotlight - Regulatory Oversight Podcast
Podcast - Who Owns Your DNA? Lessons Learned from 23andMe
AI Legislation: The Statewide Spotlight — The Consumer Finance Podcast
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
The Next FCRA Frontier: Identity Theft and CFPB Updates — FCRA Focus Podcast
Episode 366 -- DOJ Issues Data Security Program Requirements
The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
AI in Employment: Navigating the Legal Landscape with Lessons from I, Robot — The Good Bot Podcast
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Innovations in Compliance: Data Collection & Cybersecurity with ModeOne’s Matt Rasmussen and Ryan Frye
Fintech Focus Podcast | Responding to a Cyber Attack – Key Considerations for GCs and CISOs
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
What is the CCF?
AI in Employment: Navigating the Legal Landscape with Lessons from I, Robot — Hiring to Firing Podcast
A Less is More Strategy for Data Risk Mitigation
Auditing Your Hotline and Case Management System
Compliance and AI: Ali Khan on Implementing AI Risk Management Systems
Weathering the 2025 Whirlwind: How to Keep Calm & Carry On
No Password Required Podcast: Chief Product Officer at ThreatLocker and Advocate of Buc-ee’s, Mascots, and Buc-ee Mascots
Compliance Tip of the Day: AI for Whistleblower Anonymity
Cyber risk has grown demonstrably in frequency and severity in the past 10 years—and, in tandem, the cyber insurance policy has grown in breadth and complexity. This past year, a record number of organizations fell victim to...more
For community associations, this is especially important as these organizations often manage large amounts of PII of homeowners and residents (e.g., name, address, phone number, etc.), including certain categories of...more
In today's digital age, the cyber threat landscape is changing faster than ever before. As businesses and individuals increasingly rely on technology, understanding the complexities of cyber insurance has never been more...more
The 2014 Home Depot data breach was one of the more notorious cyberattacks. A decade later, litigation over that incident continues. The Sixth Circuit recently decided whether an electronic data exclusion cleared insurers...more
As AI technologies like ChatGPT and other generative AI tools have gained prominence, our clients have started raising questions about their insurance coverage. Among the most frequently asked are: These questions highlight...more
In our annual Cyber Looking Ahead Guide, we share key insurance market themes that emerged in 2024 and offer our predictions for 2025. Here are the trends we examine in the Guide: We also explore some pressing topics we...more
Over the last decade, one of the most common gripes I’ve heard about cyber insurance is that policies “don’t pay out.” Cyber coverage is often perceived as being illusory and riddled with “gotcha” clauses. This isn’t the...more
Cyberattacks are affecting every company and sector. Meanwhile, the regulatory landscape is intensifying as the SEC continues to enforce the cyber-risk management disclosure rules. Every day presents a new compliance and...more
Cyberattacks and technology disruptions in healthcare don’t just cost organizations financially — they can threaten patient safety and put organizational reputations at risk. How ready is your organization for a potential...more
Cybercrime is at an all-time high, with just the cybercrime insurance industry alone expecting to grow from $8 billion globally in 2020 to $20 billion by 2025.1 Although cyber liability insurance policies now exist to help...more
Cyber liability insurance is becoming more ubiquitous, more unpredictable, and in some cases more confusing than ever, which makes understanding your risk even more critical in 2022. Join Woodruff Sawyer experts Dan Burke,...more
Please join us for the 20th Annual Legal Malpractice & Risk Management (LMRM) Conference—An All New Virtual Experience for three half-days of practical and engaging online programming focused on current and important...more
There are showers, there are squalls, and there are storms. The growth in cybersecurity attacks in Australia, as in much of the world, is a storm and Australian companies need to batten down the hatches. In the period from 1...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
A dispute between parties, or in the middle of a security incident, is not the best time to determine whether you have sufficient contractual provisions in place with a customer or vendor....more
The Federal Financial Institutions Examination Council (FFIEC) has issued a joint statement emphasizing the need for lenders and servicers to include cyber insurance in their risk management program. Although the FFIEC did...more
I travel around helping businesses, both large and small, work on assessing their cybersecurity risks and implement measures to protect data, reduce risk and comply with applicable state and federal laws. In doing so, it is...more
Takeaways - Companies that suffer cyberattacks can expect not sympathy but scrutiny from legal authorities. - D&O insurance can cover not only litigation but also investigation costs. - Strategic negotiation of...more
A timely new resource for business executives, technology professionals, and lawyers alike is the newly-published Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers from the New York...more