News & Analysis as of

Risk Mitigation Chief Technology Officer (CTO)

NAVEX

[Webinar] Risk and Process Management Framework: Lessons Learned in Getting Started – Featuring Forrester - June 20th, 10:00 am PT

NAVEX on

Getting a successful risk management program off the ground can be daunting for even the most intrepid information security professionals. It doesn’t have to be rocket science. In this webinar, we’ll explore with guest...more

Pillsbury Winthrop Shaw Pittman LLP

SEC’s Heightened Scrutiny of Rule 10b5-1 Plans and Final Rulemaking Focus Is on Insiders Rather than Issuers

The SEC seeks to regulate trading through internal compliance processes. The SEC settled insider trading charges in relation to misuse of a Rule 10b5-1 plan established in the name of a British Virgin Islands entity owned...more

Fisher Phillips

Security Breached – Tips for Mitigating and Protecting Private Information from Inside and Outside Threats

Fisher Phillips on

If you’re going to demote or terminate your in-house tech expert, you should plan that event very carefully. Our firm is now helping a client with damage control and data recovery upon discovering – a week after their...more

Foley Hoag LLP - Security, Privacy and the...

Cybersecurity, Corporate Governance, and Risk Management: Best Practices

As litigators, we help clients resolve conflicts that have matured into disputes. In the realm of cybersecurity, we defend claims brought by private parties or governmental entities against companies facing the fallout from...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide