No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Podcast: Interoperability: Health Care's Next Disruptor Is openEHR - Diagnosing Health Care
Podcast: Interoperability: A New Vision Through openEHR - Diagnosing Health Care
Podcast–Interoperability: How Far We’ve Come and Where We’re Going - Diagnosing Health Care
Interview With Ayesha Minhaj, Google - Digital Planning Podcast
Inside Privacy Law: The Regulation of Personal Data
Oklahoma: Changing Data Privacy as We Know It?
M365 in 5 – Part 7: Teams Audio/Video (A/V) Conferencing
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
Healthcare Tech: How Are Licensing Agreements Bridging the Industry Divide?
Compliance Perspectives: The Ethics of Data
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
From NC State to Changing the State of Health Information Networks, with Medicom Technologies’ Malcolm Benitz
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Global privacy in the age of COVID-19
Compliance Perspectives: Permissible Disclosures under HIPAA, Especially in the Time of COVID-19
Compliance Perspectives: COVID-19 and GDPR
Jones Day Presents: Antitrust, Collusion, and Blockchains
[WEBINAR] Laying the Foundation for Maximizing Benefits Around Emerging Technologies
As we prepare to close the books on another eventful year in the cyber and privacy space, Wiley’s cyber insurance team is already making predictions for 2025. Q: So, let’s get right into it – based on your experience this...more
Business Email Compromise (BEC) has become a significant threat to organizations of all sizes, often resulting in hefty financial losses, operational disruptions, and reputational damage. Learn from HaystackID’s seasoned...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
The massive SolarWinds security breach, which affected not only the private sector, but federal, state and local governments, has caused some to question whether to share data with the government. On Friday, December 18, the...more
CYBERSECURITY - The GEO Group Hit with Ransomware Attack - The GEO Group, Inc. (GEO), a publicly-held company located in Boca Raton, Florida, announced on November 3, 2020, that it is beginning to notify individuals...more
CYBERSECURITY - Chinese and Russian Hackers Targeting COVID-19 Vaccine Makers in U.S. Crosshairs - Last week, authorities from the United States, the United Kingdom and Canada accused a well-known hacker group tied to...more
Proposed Modifications to HIPAA Regulations under Consideration - On December 14, 2018, HHS issued its Request for Information on Modifying HIPAA Rules to Improve Coordinated Care as part of its Regulatory Sprint to...more
Cybercriminals have launched a new campaign that not only requires the victim to pay a ransom to have their data decrypted, but when the victim is directed to a PayPal account to pay the ransom and get the decryption key to...more
TCM Bank, a subsidiary of ICBA Bancard Inc., notified some 10,000 credit card applicants in the past week that their names, addresses, dates of birth, and Social Security numbers were compromised between March 2017 and the...more
Just days after the summit between the U.S. and North Korea, the Federal Bureau of Investigation (FBI) and the Department of Homeland Security issued a warning about a malicious malware, a Trojan malware variant known as...more
On November 24, 2017, image-sharing website Imgur disclosed that email addresses and passwords of 1.7 million users were stolen in a 2014 hack on the company. Imgur became aware of the breach on November 23, 2017 when a...more
Michigan Governor Rick Snyder has signed into law the Cyber Civilian Corps Act, which established the Michigan Cyber Civilian Corps, dubbed MiC3. The corps has been in existence for three years but not statutorily deployed. ...more
The Cybersecurity Act of 2015 became law on December 18, 2015. It’s the biggest piece of cybersecurity legislation passed by Congress in recent years. It authorizes and protects certain information-sharing for cybersecurity...more
Student data privacy is the “it” issue right now in edtech, as evidenced by a recent special Student Data Privacy Report (free registration required) issued by Education Week. Education Week prefaces the report with a fact...more
After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more
Many of the nation's leading cyber, data and privacy experts convened Friday at a White House Summit at Stanford University to discuss ways to improve our nation's cybersecurity. During the summit, President Obama signed an...more
Pepper partners Gregory J. Nowak and Angelo A. Stio III discussed data privacy and cybersecurity issues for investment funds during a recent webinar for West LegalEdcenter. This podcast is a recording of their session. ...more
On October 2, 2014, the U.S. Department of Justice announced that a cyber intelligence data-sharing platform known as TruSTAR, developed by CyberPoint International, LLC, passed antitrust muster. The TruSTAR platform allows...more
The Senate Intelligence Committee on June 8th voted 12-3 to approve a cybersecurity bill authored by Senate Intelligence Committee Chairman Dianne Feinstein (D-CA) and Vice Chairman Saxby Chambliss (R-GA). S. 2588, the...more