The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
A Less is More Strategy for Data Risk Mitigation
AGG Talks: Cross-Border Business Podcast - Episode 26: U.S. Enforcement Trends Targeting Foreign Pharmaceutical and Medical Device Manufacturers
Key Discovery Points: Even AI Experts Can Get Faked Out
PilieroMazza Annual Review: What DOJ’s 2024 FCA Report Means for Government Contractors
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 223: Cybersecurity and Privacy Risks with Healthcare Vendors with Brandon Robinson of Maynard Nexsen
Government Contracts and New Mandates Executive Orders and Cost Recovery Strategies Explained
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Consumer Finance Monitor Podcast Episode: Regulating Bank Reputation Risk
4 Key Takeaways | AI in Precision Agriculture Legal Risks and Mitigation
The Duty to Cooperate Under a Liability Policy
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Preparing for CMS Staffing Mandates — Assisted Living and the Law Podcast
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare Industry with Brandon Robinson of Maynard Nexsen
Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Why Retailers and Merchants Should Pay Attention to the CFPB - The Consumer Finance Podcast
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
Fraud Risks at Nonprofit Organizations - Part 1
Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more
The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more
On October 30, 2023, the SEC filed a litigated complaint against SolarWinds, a software development company, and Timothy Brown, its chief information security officer (CISO). The SEC alleges that from October 2018, when...more
Engaging third-party providers for technology transactions involves a certain level of cybersecurity risk. In fact, most companies have been through a third-party incident. In this episode, partners Justin Herring and Adam...more
Before a deal closes on a merger or acquisition, due diligence investigation will ensue to confirm goal alignment and identify any obstacles present. There are several integral components of this process such as identifying...more
According to the 2022 State of Ransomware Report issued recently by Sophos, it surveyed 5,600 IT professionals from 31 countries, including professionals in the health care sector. Those professionals in the health care...more
The Cybersecurity & Infrastructure Security Agency, the Federal Bureau of Investigation, and the National Security Agency recently issued two joint alerts to critical infrastructure entities—one addressing BlackMatter...more
The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more
Fourth of July Data Breach - The latest in a recent string of high profile and wide-reaching cyber-attacks occurred over the fourth of July weekend. A criminal hacking enterprise known as REvil targeted information technology...more
Steptoe & Johnson PLLC and Exclamation Labs invite you to a joint webcast to help institutions mitigate cybersecurity issues and identity governance risks. Our panel of technology and legal professionals will discuss: -...more
Standard, everyday appliances like dishwashers and ovens, and necessary devices such as lights and thermostats, are increasingly likely to be Wi-Fi enabled, allowing them to send and receive data. These objects are widely...more
Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more
Disruptionware is defined by the Institute for Critical Infrastructure Technology (ICIT) as a new and “emerging category of malware designed to suspend operations within a victim organization through the compromise of the...more
Practical steps to address cybersecurity threats—what you should do when heightened tension in the Middle East or other events increase the threat of cybersecurity incidents. - When news events or business initiatives turn...more
This is the fifth blog post in a series analyzing the 2019 National Defense Authorization Act (NDAA) as signed into law on Aug. 13, 2018. Stay tuned for more blog posts covering additional topics in the near future from...more
A boom in automobile technology and connectivity in 2018 further boosted expectations of consumers regarding the integration and functionality of their devices and vehicles. Automobile manufacturers have responded by...more
For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more
• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more
Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more
I had the pleasure of moderating an excellent panel at the Advanced Cyber Security Center’s annual conference on November 4. The panel’s topic for discussion was “What is Reasonable in Cybersecurity: Responsibility and...more
A timely new resource for business executives, technology professionals, and lawyers alike is the newly-published Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers from the New York...more
Big data, data analytics, talent analytics, HR analytics, people analytics. There are many names to describe the use of data science in human resources, and as the list grows, the promise of this technology continues to...more