Data… the Good, the Bad and the Soon to be Regulated
Privacy and Data Protection Issues for Employees in the COVID-19 Environment
Sitting with the C-Suite: The Importance of a Cohesive eDiscovery Team
Legal professionals in cybersecurity, information governance, and eDiscovery face escalating data volumes, data security challenges, high eDiscovery costs, and information management inefficiencies. With AI-enabled workflows,...more
On Friday July 19, 2024, CrowdStrike® Holdings, one of the largest cybersecurity technology companies in the world, announced that a faulty software update caused a global computer outage which ultimately disrupted many...more
Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more
La Superintendencia Financiera de Colombia (SFC) publicó para comentarios el Proyecto de Norma No. 03 de 2023, mediante el cual pretende impartir instrucciones con el objetivo de promover la realización de operaciones que...more
Competent management of business information is a challenge for organizations across industries, but banking and financial services organizations face heightened information governance challenges that require dedicated...more
Organizations around the world face substantial and increasing cybersecurity-related threats to operations, reputation, and the bottom line. Cyber risk profiles are changing, particularly in light of the increase in agile...more
Here are four tips to choosing the right ETRM or CTRM system to transform your business today and provide the agility to respond to the demands of the future....more
On May 12, 2021, the Biden Administration issued an Executive Order on “Improving the Nation’s Cybersecurity” (EO). The EO was in the works prior to the Colonial Pipeline cyberattack, reportedly a ransomware incident that...more
Practical Strategies for Board Oversight of Government-Owned Entities and Agencies. The CI’s 16th Annual Conference on Crown Corporate Governance returns in a completely interactive virtual format to help you navigate a...more
It is no overstatement to say that 2019 saw a torrid pace of development of Asia-Pacific region data protection and cybersecurity laws. Such was the rate and complexity of change that it is not straightforward to distil...more
FBI Warns of Retaliatory Cyber-Attack from Iran - The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This...more
The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This follows the warning last week by the Department of...more
In this month's edition of our Privacy & Cybersecurity Update, we take a look at guidance on artificial intelligence released by the U.K. Information Commissioner's Office and the Turing Institute, as well as guidance...more
Previously we reported on the Department of Defense (‘DoD”) efforts to develop a Cybersecurity Maturity Model Certification (“CMMC”) program to verify the status of contractor cybersecurity and compliance. The CMMC program...more
Information is one of your company’s most valuable assets. It is critical to remain vigilant to protect against the latest cybersecurity threats and to comply with expansive privacy obligations. Join us in New York City for...more
Q: Who in a company is vital for cybersecurity management? Seth Berman: Cybersecurity is everyone’s responsibility. The board and senior management must set the priorities and shape the culture, but even the lowest-level...more
Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more
Franchisors are facing a precarious three-way intersection of increased accountability and regulation over consumer privacy, the growing volume and sophistication of cyber-attacks on consumer data, and the expanding...more
Cloud computing is widespread and growing at a rapid pace in corporate information management because it generally is less expensive and more efficient than using internal corporate resources....more
Life is full of anxieties. We all know that. Some suffer worse anxieties than others. As I often say, anxiety comes and goes. Anxiety cannot be measured but is something that everyone experiences on their own terms....more