Rethinking Records Retention
Compliance into the Weeds: Unsexy Keys to Data Analytics for Compliance Programs
A Less is More Strategy for Data Risk Mitigation
Data Retention and Document Holds
Fintech Focus Podcast | Navigating IT and Security Risks in Fintechs in Light of Impending DORA Deadline
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
eDiscovery Needs Digital Forensics for a Mobile World
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
eDiscovery Tips: Helpful Questions to Ask Your Clients
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Managing Large Scale Review Efficiency: Tips From a GC
Record Retention and Information Governance
Review Analytics for a New Era
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 114: Joe Dickinson, Cybersecurity Attorney Nexsen Pruet
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Innovation in Compliance - Episode 224 - Leveraging Communications as an Asset with Robert Cruz
Modernize your Information Governance: Building a Framework for Success
ComplexDiscovery Editor’s Note: Strategic transactions in the U.S. are holding steady, even as economic pressures mount. The latest Hart-Scott-Rodino (HSR) filing data through May 2025 reveals not a retreat, but a...more
Background Note: The Hart-Scott-Rodino (HSR) Act established the Premerger Notification Program, requiring certain mergers and acquisitions to be reported to the Federal Trade Commission (FTC) and the Department of Justice...more
Editor’s Note: This comprehensive report explores the intricate relationship between economic trends, Hart-Scott-Rodino (HSR) transaction activities, and their implications for professionals in cybersecurity, information...more