The Authenticity Advantage: How Runbin Dong’s Scale Social AI Helps Small Businesses Shine
Podcast - FTC to Focus on Deceptive AI Claims: Compliance Management Strategies
Upping Your Game: Crowd - Sourcing Risk Management Intelligence with AI
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Episode 373 -- Christian Focacci on Current Developments in AI and Risk Management
Work This Way: A Labor & Employment Law Podcast | Episode 48: Opportunities & Risks with Artificial Intelligence in HR with Chingwei Shieh of GE Power
Meet Phil Leslie, Cornerstone Research's New Chief Technology and Innovation Officer
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Compliance and AI: Revolutionizing Risk Management with John Byrne
Evolving AI Legislation: Federal Policies, Task Forces, and Proposed Laws — The Good Bot Podcast
Regulatory Ramblings: Episode 69 - Human Intelligence vs. Machine Judgment with Nigel Morris-Cotterill and Patrick Dransfield
Early Returns Podcast - Oliver Roberts: AI and the Law, and an Education
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
Compliance Tip Of the Day: Using AI to Transform Whistleblower Response
JONES DAY TALKS®: Women in IP – AI and Copyright Law Need-to-Knows
The FinReg Frontier: AI and Machine Learning in Consumer Finance — The Consumer Finance Podcast
Key Discovery Points: AI Says AI Will Replace Paralegals… But Not So Fast!
Compliance and AI: Ali Khan on Implementing AI Risk Management Systems
In boardrooms, C-suites, and conference rooms across the country, the rapid pace of AI innovation is capturing the imagination of business leaders. Yet, amid this enthusiasm, there is a concerning trend, namely that many...more
Members of the health care and financial industries, along with other industries that hold sensitive data, are warned that a ChatGPT vulnerability is being actively exploited by threat actors to attack security flaws in AI...more
Cybersecurity in 2025 will continue to face escalating challenges from AI-driven threats, geopolitical tensions, and increased regulatory scrutiny. Organizations must adapt to sophisticated cyberattacks fueled by AI,...more
Soon after the Chinese generative artificial intelligence (AI) company DeepSeek emerged to compete with ChatGPT and Gemini, it was forced offline when “large-scale malicious attacks” targeted its servers. Speculation points...more
Today’s interconnected world presents significant challenges for managing cross-border e-discovery and data breach investigations. These processes—critical for legal proceedings and cybersecurity—are often complicated by...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more
Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more
I always watch what the federal government requires of its employees’ use of technology to get a feel for risks and what is coming down the pike from a regulatory standpoint—this has been going on for years. That’s why I was...more
Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more
In a world of ever increasing attacks, this session will discuss modern techniques for mitigating the biggest cost drivers should your company suffer a breach. We will facilitate a collaborative discussion on the different...more
Efforts to Address the Lack of Federal Data Privacy Legislation in the U.S. Have Continued - The need for federal data privacy legislation was reiterated in the House Energy and Commerce Committee’s Subcommittee on...more
CYBERSECURITY - Patch Adobe ColdFusion Vulnerabilities Being Exploited in the Wild ASAP - Adobe has issued alerts on three vulnerabilities affecting its ColdFusion product. The first alert, issued on July 11, 2023,...more
While new forms of artificial intelligence and machine-learning systems, or AI, have garnered headlines in the mainstream press, many companies are evaluating its use in their businesses. Perhaps to a greater extent than with...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more