News & Analysis as of

Risk Mitigation Data Security Data Protection

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #434 – Use of GenAI Tools Escaping Corporate Policies

According to a new LayerX report, most users are logging into GenAI tools through personal accounts that are not supported or tracked by an organization’s single sign on policy. These logins to AI SaaS applications are...more

Harris Beach Murtha PLLC

AI-Powered Video Game Advertising: Regulatory and IP Challenges

AI is coming for digital advertising in video games. AI-driven technologies now enable the integration of dynamic, personalized advertisements within gaming environments, enhancing player engagement and offering lucrative...more

Mitratech Holdings, Inc

Building an HR Tech Stack for Consulting Firms

The need for an effective HR Tech Stack in consulting has never been more critical. With firms competing for top talent, having a well-structured and efficient HR system can make a huge difference....more

Baker Botts L.L.P.

What is DeepSeek, and why does it matter?

Baker Botts L.L.P. on

Everyone seems to be talking about DeepSeek, and its latest AI technologies. But what is DeepSeek? What has it produced? And why is everyone talking about them? This client update is intended to provide some of the basic...more

The Volkov Law Group

Embracing Generative AI — The Current Risk Profile (Part II of II)

The Volkov Law Group on

When evaluating AI risks, legal, ethics and compliance professionals need to divide the question into two — first, what are risks from legal, ethics and compliance internal use of AI? and second, what are business risks from...more

Integreon

On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response

Integreon on

Cyber breach costs are skyrocketing, and it is crucial for both insureds and insurers to stay on top of cyber incident response. ?? Ensure your incident response plan is robust ?? Avoid the volatile costs of dealing with...more

Mayer Brown

Communications in a Cyber Incident – Guidance

Mayer Brown on

The UK National Cyber Security Centre has published guidance on effective communications in a cyber incident. While targeted at organisations generally, rather than explicitly at pension scheme trustees, the guidance contains...more

Maynard Nexsen

Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare...

Maynard Nexsen on

For episode 211, Heather and Lauren are joined by their colleague Brandon Robinson, who heads up Maynard Nexsen’s Data Privacy and Cybersecurity team. Brandon shares his wealth of knowledge on cybersecurity best practices for...more

Wiley Rein LLP

[Webinar] Best Practices in Cyber Preparedness - October 23rd, 12:00 pm - 1:00 pm EDT

Wiley Rein LLP on

We invite you to join us for an insightful webinar on Best Practices in Cyber Preparedness for Government Contractors and Critical Infrastructure Operators on Wednesday, October 23, 2024, from 12:00 p.m. – 1:00 p.m. EDT....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #415 – It’s National Cybersecurity Awareness Month!

October is always a busy month for cybersecurity professionals. For the past 21 years, October has been an especially busy month for me as it is Cybersecurity Awareness Month. This means lots of employee education and...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #404 – July is Military Consumer Month Helpful Tips for Those in Service + Thank You

July is Military Consumer Month. This month, we celebrate democracy and the past service of our veterans and those presently in service for protecting us and our democracy. Thank you so very much....more

Robinson+Cole Data Privacy + Security Insider

HC3 Issues Threat Reports on Qilin + MoveIt

The Health Sector Cybersecurity Coordination Center (HC3) provides timely updates to the health care sector on cybersecurity threats and mitigation. In the last several weeks, HC3 has issued two alerts worth paying close...more

Pillsbury - Global Sourcing Practice

The UK Government Announces Ambitious Proposals to Improve Software Security and Resilience

In light of the increasing organizational use of and reliance on software and the concerns raised regarding the malicious use of the same, the UK Government has published a response to its call for views on software...more

EDRM - Electronic Discovery Reference Model

Enhancing Security in Law Firms: The Imperative of Multi-Factor Authentication

In today’s digital age landscape, where 27% of law firms experience security breaches, protecting sensitive client information is paramount for legal professionals. With cyber threats becoming more sophisticated, relying...more

Kennedys

[Webinar] Days of reckoning: How to prepare for, respond to, and recover from ransomware and other cyberattacks - June 27th, 2:00...

Kennedys on

Kennedys and Booz Allen Hamilton are delighted to invite you to our 3 hour webinar on Thursday, June 27, 2024. This half-day seminar features three presentations: Clear and present danger, In the war room, and The fallout....more

Kennedys

[Webinar] Ransom-ready: Navigating recovery, remediation and legalities - June 4th, 11:00 am - 12:00 pm EST

Kennedys on

Kennedys and CYPFER are delighted to invite you to our 60 minute webinar on Tuesday, June 4, 2024. We will explore the practical and legal implications involved in navigating a ransomware event, and how decision-making in a...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

K2 Integrity

World Password Day: Security Through Long, Unique Passwords

K2 Integrity on

Today is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. Given the large number of...more

Womble Bond Dickinson

[Webinar] Innovation Interchange Summit: The Power Of Cross-Industry Insight - May 16th, 11:00 am - 4:00 pm ET

Womble Bond Dickinson on

Powerful ideas emerge when you look at something through a completely different lens. And when two parties come together to share those unique perspectives? That’s when the magic happens. Womble Bond Dickinson’s virtual...more

Robinson+Cole Data Privacy + Security Insider

New Threat: Scattered Spider International Coalition of Hackers

Cyber adversaries in China and Russia continue to be a formidable threat to U.S. based companies. In the past, scams might be detected because a word was misspelled or the context didn’t make sense. Now, with the help of...more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Clark Hill PLC

[Webinar] Navigating Risk After the Change Healthcare Cyberattack: Strategies for Effective Healthcare Third Party Risk Management...

Clark Hill PLC on

In an increasingly interconnected healthcare landscape, third party relationships play a critical role in operations, but they also introduce significant risk. To address this challenge, our webinar delves into the...more

Fisher Phillips

Deepfake Scammers Steal $25 Million From Company: 5 Ways You Can Avoid Being Victim to Latest AI Nightmare

Fisher Phillips on

A group of scammers recently used deepfake technology – now readily available to just about anyone – to trick a finance employee into paying them over $25 million of corporate funds. This might be one of the world’s biggest...more

BakerHostetler

HHS Publishes ‘Voluntary’ Healthcare Cybersecurity Performance Goals in Record Time but Leaves Questions Unanswered

BakerHostetler on

As previously reported in this blog, on Dec. 6, 2023, the Department of Health and Human Services (HHS or the Department) released a “concept paper,” which laid out its vision of future action regarding healthcare...more

178 Results
 / 
View per page
Page: of 8

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide