News & Analysis as of

Information Management Cybersecurity

HaystackID

[Webinar] 6 AI Workflows to Enhance ESI Discovery - September 18th, 11:00 am CDT

HaystackID on

Legal professionals in cybersecurity, information governance, and eDiscovery face escalating data volumes, data security challenges, high eDiscovery costs, and information management inefficiencies. With AI-enabled workflows,...more

Houston Harbaugh, P.C.

The CrowdStrike® Global Tech Outage

Houston Harbaugh, P.C. on

On Friday July 19, 2024, CrowdStrike® Holdings, one of the largest cybersecurity technology companies in the world, announced that a faulty software update caused a global computer outage which ultimately disrupted many...more

Guidepost Solutions LLC

Lines of Authority: The Critical Need for Role Clarity in Information Security Compliance

Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more

Holland & Knight LLP

La SFC publica proyecto de norma sobre la realización de operaciones con código QR en Colombia

Holland & Knight LLP on

La Superintendencia Financiera de Colombia (SFC) publicó para comentarios el Proyecto de Norma No. 03 de 2023, mediante el cual pretende impartir instrucciones con el objetivo de promover la realización de operaciones que...more

Ankura

Data Management Strategies for Banking and Financial Services Organizations

Ankura on

Competent management of business information is a challenge for organizations across industries, but banking and financial services organizations face heightened information governance challenges that require dedicated...more

Hogan Lovells

Protecting the Workforce and Information in a Global Landscape: A Legal Review

Hogan Lovells on

Organizations around the world face substantial and increasing cybersecurity-related threats to operations, reputation, and the bottom line. Cyber risk profiles are changing, particularly in light of the increase in agile...more

Opportune LLP

ETRM & CTRM Software Selection In The Digital Era

Opportune LLP on

Here are four tips to choosing the right ETRM or CTRM system to transform your business today and provide the agility to respond to the demands of the future....more

Jackson Lewis P.C.

Biden Administration Issues Cybersecurity Executive Order Following Colonial Pipeline Cyberattack

Jackson Lewis P.C. on

On May 12, 2021, the Biden Administration issued an Executive Order on “Improving the Nation’s Cybersecurity” (EO). The EO was in the works prior to the Colonial Pipeline cyberattack, reportedly a ransomware incident that...more

American Conference Institute (ACI)

[Virtual Event] Crown Corporate Governance Annual Conference - January 19th - 20th, 10:15 am - 6:00 pm EST

Practical Strategies for Board Oversight of Government-Owned Entities and Agencies. The CI’s 16th Annual Conference on Crown Corporate Governance returns in a completely interactive virtual format to help you navigate a...more

Hogan Lovells

Hogan Lovells Asia Pacific Data Protection and Cyber Security Guide 2020

Hogan Lovells on

It is no overstatement to say that 2019 saw a torrid pace of development of Asia-Pacific region data protection and cybersecurity laws. Such was the rate and complexity of change that it is not straightforward to distil...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2020 #3

Robinson & Cole LLP on

FBI Warns of Retaliatory Cyber-Attack from Iran - The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This...more

Robinson+Cole Data Privacy + Security Insider

FBI Warns of Retaliatory Cyber-Attack from Iran

The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This follows the warning last week by the Department of...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - December 2019

In this month's edition of our Privacy & Cybersecurity Update, we take a look at guidance on artificial intelligence released by the U.K. Information Commissioner's Office and the Turing Institute, as well as guidance...more

Stinson - Government Contracting Matters

DoD Issues Revised Draft Cyber Security Model Certification to Address Levels 1 Through 3

Previously we reported on the Department of Defense (‘DoD”) efforts to develop a Cybersecurity Maturity Model Certification (“CMMC”) program to verify the status of contractor cybersecurity and compliance. The CMMC program...more

McDermott Will & Emery

[Event] Privacy & Cybersecurity Risk Management Series: Insights on Cybersecurity and Data Privacy - June 18th, New York, NY

McDermott Will & Emery on

Information is one of your company’s most valuable assets. It is critical to remain vigilant to protect against the latest cybersecurity threats and to comply with expansive privacy obligations. Join us in New York City for...more

Nutter McClennen & Fish LLP

How to Structure Your Organization’s Cybersecurity Management

Q: Who in a company is vital for cybersecurity management? Seth Berman: Cybersecurity is everyone’s responsibility. The board and senior management must set the priorities and shape the culture, but even the lowest-level...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

Dickinson Wright

Navigating the Cyber Liability Storm - Part II

Dickinson Wright on

Franchisors are facing a precarious three-way intersection of increased accountability and regulation over consumer privacy, the growing volume and sophistication of cyber-attacks on consumer data, and the expanding...more

Davis Wright Tremaine LLP

Cloud Computing: U.S. Export Controls Reach for the Sky

Cloud computing is widespread and growing at a rapid pace in corporate information management because it generally is less expensive and more efficient than using internal corporate resources....more

The Volkov Law Group

High Anxiety: Five Basic Worries For Every Corporate Board

The Volkov Law Group on

Life is full of anxieties. We all know that. Some suffer worse anxieties than others. As I often say, anxiety comes and goes. Anxiety cannot be measured but is something that everyone experiences on their own terms....more

20 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide