Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
How International Companies Can Prepare for July 9 Tariffs
The Dark Patterns Behind Corporate Scandals
Current Regulatory, Legislative, and Litigation Developments on ADA Website Accessibility for Consumer Finance Digital Platforms — The Consumer Finance Podcast
Hospice Insights Podcast - Election Inspection: Be Proactive to Avoid Costly Election Statement Denials
Compliance into the Weeds: Boeing’s New Safety Initiatives and Compliance Reforms
Compliance Tip of the Day: COSO Objective 3 – Control Activities
Legal Shifts in 2025 Put Employer Non-Compete Strategies at Risk - Employment Law This Week® - Spilling Secrets Podcast
Summer Strategies for Work Success
Upping Your Game: Crowd - Sourcing Risk Management Intelligence with AI
Compliance Tip of the Day: COSO Objective 2 - Risk Assessment
Daily Compliance News: June 24, 2025, The Questions, Questions, and More Questions Edition
Adventures in Compliance: The Sign of Four – Holmes Revealed: Communication and Training Insights
Compliance Tip of the Day – COSO Objective 1 – Control Environment
#Risk New York Speaker Series – Bridging the Gap: Effective Risk Communication in Compliance with Rob Clark, Jr.
FCPA Compliance Report: Fraud Risk Management - Insights and Experiences with Peter Schablik
Daily Compliance News: June 23, 2025, The Is Walmart Cool Edition
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
The Classification of Gasoline & Gasoline Fumes as a Carcinogen: Considerations for Corporate Executives & Attorneys
Understanding the DOJ's Recent Corporate Enforcement Policy Changes
Two AI heavyweights step into the ring: ChatGPT 4o, the reigning champion of fluency and speed, and the new challenger, ChatGPT 4.5, boasting an upgraded intellect and sharper wit. But which one is truly the best? To find...more
In 2025, technology holds a well-established place in the legal profession. And even though there are headlines about emerging tech itself being on trial, the pros of Artificial Intelligence (AI), Machine Learning (ML), and...more
Is AI too expensive for document review? Read about the key issues raised in the current debates about the ROI of AI, including initial setup costs and quality control, and how you can assess the technology’s value for you....more
Generative AI is quickly transforming many industries—including legal services. Many of us are already using (or at least experimenting with) Generative AI, with impressive results. Allow me to introduce the next leg in our...more
As law firms and legal departments race to leverage artificial intelligence for competitive advantage, many are contemplating the development of private Large Language Models (LLMs) trained on their work product. While the...more
As we step into 2025, the legal tech landscape continues to evolve rapidly, shaped by advancements in artificial intelligence, shifts in communication tools, and an increasing focus on governance and compliance. Last year, we...more
In the early days of first-generation AI models, legal industry technology providers did not frequently encounter the question, “Where do my models live?” The assumption has always been that the models live where the data...more
Amid the tidal wave of technological innovation, the legal industry finds itself grappling with an essential question: how can it transform the overwhelming chaos of digital data into a wellspring of actionable insights? The...more
The integration of artificial intelligence (“AI”) into legal practice is no longer a future prospect. It’s a reality that many attorneys are facing today. As law firms and legal departments begin to adopt AI tools to enhance...more
Introduction - The year 2024 marked a pivotal time in artificial intelligence, where aspirations transformed into concrete achievements, cautions became more urgent, and the distinction between human and machine began to...more
At TransPerfect Legal's fifth annual Antitrust Clearance and Merger Enforcement Conference (ACME), hosted by the TransPerfect Legal Antitrust Practice Group, industry experts gathered to discuss evolving regulatory changes....more
In today’s fast-paced business environment, efficient contract lifecycle management (CLM) is essential for maintaining operational integrity and ensuring compliance. At the heart of effective CLM implementations lies data...more
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
Cybersecurity is one of the biggest challenges facing contemporary society. With the advancement of digital technologies and the ever-increasing dependence on information systems to perform the most diverse activities, the...more
Join us for an exciting online event that explores the challenges and risks associated with the new work from home reality in the professional services industry. Discover how professionals are adapting to remote work and...more
Join us for an exciting in-person event at Covington & Burling LLP, New York Times Building, 8th Avenue, New York, NY 10018, USA. Discover the new reality of professional services work from home and the associated risks....more
In a landmark move towards the regulation of generative AI technologies, the White House brokered eight “commitments” with industry giants Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI. The discussions,...more
In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more
Legal professionals often play a crucial role in advising organizations on information governance matters, particularly when it relates to legal and regulatory compliance, data privacy, and risk management. They may provide...more
Let’s talk about the “New Cybersecurity Triad.” We’re all pretty familiar with the venerable C-I-A Triad whereby secure data exhibits the characteristics of Confidentiality, Integrity, and Availability. But today’s...more
Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program. The efficacy of a program is only theoretical until thorough testing is conducted. One of...more
Businesses are facing more uncertainty around talent and employee management than ever before. Whether it’s challenges around working from home, employee burnout, the “Great Resignation,” or the threat of recession-fueled...more
As the corporate workplace continues to evolve—encompassing hybrid work environments, bring your own device policies, and cloud-based storage—companies are well-advised to consider areas of increased vulnerability and whether...more
Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more
A New Approach to Security in the WFH (home) and WFC (cloud) Era - In the Middle Ages, kings and other nobles secured their fiefdoms with a high-walled castle and a moat. The moat was designed to make it difficult for...more