News & Analysis as of

e-Discovery Professionals Electronically Stored Information Cyber Threats

Association of Certified E-Discovery...

[Webinar] Remote Mobile Discovery: Your Secret Weapon Against Malicious Insiders - April 16th, 10:00 am PDT

Malicious insiders are the silent threats lurking within organizations—employees, contractors, or partners with privileged access who can cause devastating data breaches. With the rise of remote work and mobile-first business...more

Purpose Legal

The Role of Digital Forensics Expert Witnesses

Purpose Legal on

In the digital age, the courtroom has evolved. It’s no longer just about physical evidence and eyewitness accounts. Today, digital evidence plays a crucial role in many legal proceedings. Enter the digital forensics expert...more

EDRM - Electronic Discovery Reference Model

From Moscow to Pyongyang: Cyber Threats Revealed by Sandra Joyce at the Tallinn Digital Summit

ComplexDiscovery Editor’s Note: Sandra Joyce’s keynote at the Tallinn Digital Summit 2024 offers a vital look into the shifting dynamics of the cyber threat landscape. As an annual gathering of leaders from the digitally...more

EDRM - Electronic Discovery Reference Model

From Sextortion to Financial Scams: The Expanding Reach of Deepfakes

ComplexDiscovery’s Editor’s Note: Deepfake technology represents one of the most pressing challenges for cybersecurity and governance professionals today....more

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

EDRM - Electronic Discovery Reference Model

Cyber Diplomacy: A New Frontier in International Relations and Professional Practice

ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more

EDRM - Electronic Discovery Reference Model

Enhancing Security in Law Firms: The Imperative of Multi-Factor Authentication

In today’s digital age landscape, where 27% of law firms experience security breaches, protecting sensitive client information is paramount for legal professionals. With cyber threats becoming more sophisticated, relying...more

Association of Certified E-Discovery...

[Webinar] The New Professional Services Work from Home Reality and Risks - November 6th, 9:00 am - 10:30 am PST

Join us for an exciting online event that explores the challenges and risks associated with the new work from home reality in the professional services industry. Discover how professionals are adapting to remote work and...more

Association of Certified E-Discovery...

[Event] The New Professional Services Work from Home Reality and Risks - November 6th, New York, NY

Join us for an exciting in-person event at Covington & Burling LLP, New York Times Building, 8th Avenue, New York, NY 10018, USA. Discover the new reality of professional services work from home and the associated risks....more

Association of Certified E-Discovery...

Cyber Incident Response and eDiscovery Are Not One in the Same: Understanding the Key Differences and Associated Risks

With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more

EDRM - Electronic Discovery Reference Model

[Webinar] NIST CSF 2.0 – Back to the Future - March 7th, 1:00 pm - 2:15 pm ET

GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more

EDRM - Electronic Discovery Reference Model

Cyber Risk Management Chronicles, Episode V - Cyber Fundamentals: Tabletop Exercises

Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program.  The efficacy of a program is only theoretical until thorough testing is conducted.  One of...more

EDRM - Electronic Discovery Reference Model

Cyber Risk Management Chronicles, Episode III

The reality of finite resources means cybersecurity programs that attempt to ‘boil the ocean’ – protect everything at once – are destined to fail. Risk-based cybersecurity programs are the solution. With such an approach,...more

EDRM - Electronic Discovery Reference Model

Cyber Fundamentals: Cybersecurity as Part of Risk Management - Cyber Risk Management Chronicles, Episode II

Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more

Reveal

[Webinar] Legal SWOT Analysis: Identifying Opportunities & Threats for eDiscovery, Cybersecurity & Data Privacy During the...

Reveal on

What the heck is a “SWOT” analysis? And, why do you need one? A “SWOT” analysis is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats associated with an organization or a...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide