A Less is More Strategy for Data Risk Mitigation
AGG Talks: Cross-Border Business Podcast - Episode 26: U.S. Enforcement Trends Targeting Foreign Pharmaceutical and Medical Device Manufacturers
Key Discovery Points: Even AI Experts Can Get Faked Out
PilieroMazza Annual Review: What DOJ’s 2024 FCA Report Means for Government Contractors
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 223: Cybersecurity and Privacy Risks with Healthcare Vendors with Brandon Robinson of Maynard Nexsen
Government Contracts and New Mandates Executive Orders and Cost Recovery Strategies Explained
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Consumer Finance Monitor Podcast Episode: Regulating Bank Reputation Risk
4 Key Takeaways | AI in Precision Agriculture Legal Risks and Mitigation
The Duty to Cooperate Under a Liability Policy
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Preparing for CMS Staffing Mandates — Assisted Living and the Law Podcast
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare Industry with Brandon Robinson of Maynard Nexsen
Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Why Retailers and Merchants Should Pay Attention to the CFPB - The Consumer Finance Podcast
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
Fraud Risks at Nonprofit Organizations - Part 1
False Claims Act Insights - If Everything Matters, Nothing Does: Parsing Materiality in FCA Disputes
The purpose of this paper is to show how the failure to monitor for and prevent off-channel communications poses risk to traditional depository institutions that are not subject to the jurisdiction of securities-law...more
While most entities that are subject to the HIPAA Security Rule spend considerable time and effort ensuring that they have implemented appropriate administrate and technical safeguards to protect the health information that...more
Social media usage remains ubiquitous in 2024, and a recent trend sees the increased use of social media by employees to document their experiences with layoffs and disciplinary actions in the workplace. ...more
The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more
95% of all corporate investigations include message and conversation data as key evidence. When gathering this crucial data from employees’ mobile phones, are you having to ship equipment or struggling with lengthy support...more
The transformation to a work from home/work from anywhere model has become the new normal and even after the pandemic ends, many expect that model to continue. This accelerated transition has forced companies to embrace...more
Our increasingly connected world presents tremendous opportunities for employers as well as considerable confusion and risk. Should you Google a job applicant? Allowing employees to use their own mobile devices for work...more
Just how many counts of fraud attacks occurred in the first quarter of 2018? These results from ThreatMetrix uncovered some alarmingly high numbers, including...more
Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more
You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more
In the first known case involving a wireless provider, a cardiology service provider agreed to pay a $2.5 million settlement based on the impermissible disclosure of unsecured electronic protected health information (ePHI)....more
Employees use their smartphones as a key tool for accessing information during a work day – especially when outside the office and traveling on business. While smartphones, tablets, laptops and other devices may increase...more
An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more
As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more