The Privacy Insider Podcast Ep. 7: David, Goliath, and Data Privacy Part II: Max Schrems
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
Navigating Emerging Privacy Issues in Financial Services — The Consumer Finance Podcast
The Privacy Insider Podcast Episode 4: Don't Be Evil: In the Hot Seat of Data Privacy, Part 1
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Preventative Medicine: Health Care AI Privacy and Cybersecurity – Part 1 — The Good Bot Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
AGG Talks: Women in Tech Law - Episode 1: Charting the Course: Women Trailblazing in Cybersecurity and Crisis Governance
[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
When I reflect on the relationship that our firm has with our clients, I’m most proud of the fact that you can always count on us. That often means defending complex litigation, steering you through regulatory threats,...more
On October 11th, our Data, Privacy and Security team hosted the 10th Annual Cybersecurity & Privacy Summit. We were delighted to be joined by about 100 clients, colleagues, and friends in-person at our Atlanta office, with...more
To set the stage, it is important we review the current privacy and cybersecurity landscape. New privacy laws and regulations are emerging at both the state and federal levels, not to mention internationally, imposing...more
Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more
Marita A. Makinen, Chair of the firm’s Mergers & Acquisitions practice and co-Chair of the Transactions & Advisory Group, and Ken Fishkin, CISSP, CIPP/US, CIPM, CIPT, Manager of Information Security at Lowenstein Sandler,...more
Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of data. ...more
Join us to discuss effective approaches to managing due diligence on privacy and cybersecurity issues across transactions. Companies considering acquisitions or joint ventures will need to engage in effective management of...more
On this episode of CyberSide Chats, Epiq’s CISO Jerich Beason, and this week’s co-host Whitney McCollum are joined by Stefanie Drysdale to discuss M&A. They discuss the process of evaluating a target company’s cybersecurity...more
CYBERSECURITY & DATA PRIVACY - Virginia Governor Signs Nation’s Second State Consumer Privacy Bill - The Washington Post reported that Governor Ralph Northam signed data privacy legislation into law, making Virginia the...more
Hot on the heels of the £20 million fine issued to British Airways, the Information Commissioner’s Office (“ICO“) has issued Marriott International Inc. (“Marriott“) with a long-awaited penalty notice for its failure to...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
We are excited to bring the healthcare compliance sessions and updates to you as an interactive, online experience. Watch, listen, and ask questions. Each hour, attendees will be able to select from four concurrent sessions....more
Now that DOD has released the final version of the Cybersecurity Maturity Model Certification (CMMC) guidelines, all contractors that work directly or indirectly on Department of Defense (DOD) contracts should be preparing to...more
In today’s technology-driven business world, organizations are more vulnerable than ever to cybersecurity threats such as data and privacy breaches. As a result, in the context of M&A transactions, assessing the cybersecurity...more
The Need for Cyber Due Diligence in M&A Transactions - As technology continues to advance, allowing more companies to collect, share, and use data, privacy and cybersecurity due diligence in the M&A context becomes even more...more
Key Takeaways - - The proposed £183 million and £99.2 million fines against British Airways and Marriott, respectively, by the UK’s ICO emphasise: - The need for companies to maintain appropriate data protection practices...more
Cybersecurity and protection of sensitive data from external and insider threats are critical for federal contractors across all industries and in all market positions. Each significant data breach or cyber incident and...more
Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more
Identifying threats and improving network and supply chain security has been an ongoing effort by Congress and the Department of Defense (DoD) for the past several years. Congress has included multiple provisions in the...more
• DoD and other government agencies will scrutinize contractors’ supply chain security plans and programs from proposal submission to contract closeout. • The 2019 NDAA as approved by Congress and DHS initiatives highlight...more
- MoneyGram and Ant Financial mutually terminate $1.2 billion proposed merger - CFIUS’s concerns focused on cyber and information security - Scrutiny of buyers’ information security processes is likely to increase On...more
Almost all parties are required to exchange personal data as part of a merger and acquisition transaction. With data breaches on the rise, any buyer in a M&A transaction cannot afford to ignore privacy and data security...more
In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more