News & Analysis as of

Data Security Employee Training

Ankura

The Importance of Culture in an Effective Cybersecurity Program

Ankura on

While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more

Conn Maciel Carey LLP

Best Practices to Safeguard Your Company’s Trade Secrets — Case Study

Conn Maciel Carey LLP on

The number one risk for trade secrets exfiltration is from insider threats—employees, contractors, or even executives with access to sensitive information who either intentionally or accidentally compromise it. Sometimes it’s...more

Schwabe, Williamson & Wyatt PC

Employees using free or unauthorized AI tools at work?

The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more

Ward and Smith, P.A.

Preventing Trade Secret Theft: Proactive Strategies for In-House Counsel

Ward and Smith, P.A. on

Ed. Note: This is the last in a series of articles taken from Gavin Parsons' CLE presentation for the North Carolina Bar Association's Antitrust and Complex Business Dispute CLE Program presented on Thursday, January 30,...more

K2 Integrity

World Password Day: Increasing Security in Two Steps

K2 Integrity on

May 1 is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. It’s a time for...more

Ankura

Generative AI Risks: Legal and Compliance Insights - Part 2

Ankura on

The Bottomline: Five Practical Steps for Generative AI Risk Management - As the first line of defense, employees within business operations must own and manage risks related to the business, including risks resulting from...more

Fisher Phillips

Protecting Trade Secrets in the Life Sciences Industry: 8 Steps to Prevent Corporate Espionage and Theft

Fisher Phillips on

Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more

Alston & Bird

Cybersecurity Controls: What Do Regulators Expect Nowadays?

Alston & Bird on

Our Privacy, Cyber & Data Strategy Team highlights the increasingly specific cybersecurity controls identified by regulators, explains why these enhanced cybersecurity controls have become the focus of regulators, and shares...more

Mitratech Holdings, Inc

Building an HR Tech Stack for Consulting Firms

The need for an effective HR Tech Stack in consulting has never been more critical. With firms competing for top talent, having a well-structured and efficient HR system can make a huge difference....more

Mitratech Holdings, Inc

Red Flags In Your Vendor’s Business Continuity Plan

Ensure your vendors are crisis-ready by recognizing these key indicators of weak continuity planning. The interconnected nature of modern business means that your vendors’ operational resilience can, and frequently does,...more

Mitratech Holdings, Inc

5 Human Resources Initiatives (And How You Can Make Them A Reality)

With the end of the year coming soon, many in HR are thinking about how they can impact their workforce next year – and the planning starts now! Stuck on what human resources initiatives will make a real impact? We can help!...more

Constangy, Brooks, Smith & Prophete, LLP

Data Privacy Day Checklist: Top 10 ways to protect your organization's data

Tomorrow is International Data Privacy Day, so a happy day to all! More seriously, data privacy concerns and legislation continue to rapidly increase. It has been estimated that by the end of 2024 more than 75 percent of...more

Foley & Lardner LLP

New Artificial Intelligence (AI) Regulations and Potential Fiduciary Implications

Foley & Lardner LLP on

Fiduciaries should be aware of recent developments involving AI, including emerging and recent state law changes, increased state and federal government interest in regulating AI, and the role of AI in ERISA litigation. While...more

Constangy, Brooks, Smith & Prophete, LLP

Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025

Happy New Year! As we kick off 2025, now is the perfect time to commit to making changes that benefit your organization, like better protecting your sensitive data. In this episode of Constangy Clips, Cyber Team vice chair...more

Mitratech Holdings, Inc

Building An HR Tech Stack for Higher Education

Mitratech Holdings, Inc on

The need for an effective HR Tech Stack in higher education has never been more critical. With more families looking at college costs, having a great staff can make a huge difference....more

Mitratech Holdings, Inc

How to Successfully Implement a 2025 Return to Office Strategy

Mitratech Holdings, Inc on

As we approach 2025, the world of work continues to shift back to the old ways. But will they work anymore? As many organizations transition back to the office, there are difficulties. Most of those problems come within the...more

Pagefreezer

4 Questions Your Compliance Team Will Ask Before Implementing an Enterprise Collaboration Tool

Pagefreezer on

From access control to data retention, if you are trying implement a new enterprise collaboration or internal chat platform, your compliance team will have critical questions that must be addressed to avoid potential legal...more

K2 Integrity

Cybersecurity Awareness Month: Creating and Managing Long, Unique Passwords

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online...more

Alston & Bird

AI vs. AI: Recent Developments in the Cyber Landscape

Alston & Bird on

The ubiquity of artificial intelligence (AI) has heightened companies’ exposure to cyberattacks of increasingly greater sophistication. Our Privacy, Cyber & Data Strategy Team explores how businesses can enhance their...more

Mitratech Holdings, Inc

Navigating the Digital Landscape of Employee Verification

Tired of the constant I-9 updates? Wondering about Virtual I-9 verification? HR professionals have been on a wild ride lately. From new forms to stricter deadlines, the USCIS seems to have a never-ending supply of changes....more

Foley Hoag LLP - Security, Privacy and the...

The Health Sector Cybersecurity Coordination Center’s September 19 Threat Briefing on Healthcare Technology Security

As healthcare technology continues to evolve, so does the need for robust compliance strategies to safeguard patient information and ensure the integrity of medical devices. In a joint September 19, 2024 presentation, the...more

Harris Beach Murtha PLLC

What to Include in Your Company’s Internal Generative AI Use Policy

As generative artificial intelligence continues to revolutionize business operations across industries, it has become imperative for companies to establish robust internal policies governing its use by employees. This alert...more

Ankura

Headwinds in the Retail Labor Market: Navigating the Future of Workforce Dynamics in Retail - Part 7

Ankura on

The retail labor market is facing significant challenges due to shifts in consumer behavior, technological advancements, and economic uncertainties. Retailers must adapt to changing skill requirements, integrate new...more

Foley & Lardner LLP

Learn About Data Privacy and How to Navigate the Information Security Regulatory Landscape

Foley & Lardner LLP on

Insights for this month’s article are provided by ARDA members Gregory Szewczyk, partner at Ballard Spahr Practice Leader of the firm’s Privacy and Data Security Group, and Aaron Tantleff, partner in Foley & Lardner’s...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

123 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide