Episode 373 -- Christian Focacci on Current Developments in AI and Risk Management
Law School Toolbox Podcast Episode 507: What Do I Need to Do Before the First Day of Law School? (1L Summer Series)
Meet Phil Leslie, Cornerstone Research's New Chief Technology and Innovation Officer
London Partner Roberta Downey Wired for Disputes: Tech, Infrastructure, and the New Frontier of Risk
Law School Toolbox Podcast Episode 505: Breaking ADHD Barriers with the Help of AI (w/Lindsay Scola)
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
(Podcast) The Briefing: No CTRL-ALT-DEL For the Server Test
Compliance Tip of the Day – Role of Chatbots in Compliance
5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
(Podcast) The Briefing: The Future of TV? A 2025 Digital Media Trends Analysis
The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
Great Women in Compliance: Creating Space to Speak Up: The Story Behind Psst.org
JONES DAY TALKS®: Women in IP – AI and Copyright Law Need-to-Knows
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Compliance into the Weeds: The Role of Compliance Going Forward
A Less is More Strategy for Data Risk Mitigation
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Investment Opportunities in Italy's Tech Market
The AI Shakeup: New Tech Innovations and the Future of Corporate Law
Regulatory Ramblings: Episode 44 - The Dangers of Non-Technically Trained Lawyers Advising on Technological Matters with Ronald Yu and Donald Day
Last month, Paul Hastings sponsored the Cybersecurity Law Workshop at the Spring Privacy & Security Forum held at George Washington University in Washington, D.C. The Cybersecurity Law Workshop featured three panels of...more
When assessing cybersecurity risk in your organization, it is important to understand your users and their behavior. A new study by Keepnet sheds light on new hire behavior concerning phishing susceptibility. According to its...more
Working on the go has become a necessity for many, but it should never come at the expense of confidentiality. Julie Savarino explains....more
Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more
Disruption, volatility, and uncertainty aren’t new operating conditions by any means. But the assumptions that have long driven corporate thinking—the role of government, geopolitical norms, and consistency in US policies as...more
The Cross Market Operational Resilience Group's (CMORG) AI Taskforce has released its AI Baseline Guidance Review (dated January 2025), accompanied by a press release. The CMORG AI Taskforce conducted a baseline review of...more
The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more
During the 2024 legislative session, the Colorado General Assembly passed Senate Bill 24-205, which is known as the Colorado Artificial Intelligence Act (CAIA). This law will take effect on February 1, 2026, and requires...more
On this episode, we sit down with Mariana Padilla, CEO and co-founder of HACKERverse.ai — an AI-driven platform transforming how cybersecurity solutions are tested and purchased. From her early days in education and...more
After years of regulatory uncertainty, the Trump administration has signaled a new approach to digital assets, including by establishing a working group focused on digital assets and nominating crypto-friendly chairs to the...more
SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more
Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more
Foreign nationals visiting the United States, and even returning U.S. citizens and other legal residents (with valid visas), face increasing digital privacy risks and potential entry challenges when arriving at U.S. ports of...more
On this episode, we sit down with Trevor Hilligoss, director of security research and the research and innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership...more
WhatsApp users should update the application for vulnerability CVE-2025-30401, which Meta recently patched when WhatsApp was released for Windows version 2.2450.6....more
On March 28, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR) on RESURGE malware, which is associated with the product Ivanti Connect Secure....more
The Historical Context of Technological Revolutions - “I think that human beings have gotten as far as we've gotten because of our adaptability, our ability to adapt, and our ability to dovetail our technologies - our brains...more
Even the strongest IT/DR plans can fail if they aren’t proactive about avoiding these common mistakes. When systems go down, business grinds to a halt. Downtime leads to $9,000 in losses per minute on average, damaged...more
With new collaboration features, AI tools, and work technology developing at a dizzying pace, we know that the volume of data organizations must manage will only increase faster. What are the risks and costs involved with...more
In this podcast, the hosts discuss the importance of managing third-party risk for financial institutions. They highlight how institutions rely on external providers for technological innovation and operational support, but...more
Cryptocurrency isn’t just for tech startups and X (formerly Twitter) enthusiasts anymore. Mainstream corporations are increasingly forced to consider Bitcoin—the undisputed “king” of crypto—and other investments into digital...more
2025 is here, and so is FINRA’s 2025 Annual Regulatory Oversight Report (Report). On January 28, 2025, FINRA published the Report, which provides firms with insight into FINRA’s findings from recent observations and...more
Kilpatrick's Steve Borgman and Jordan Glassman recently presented on the various generative AI technologies available, with an emphasis on large language models such as ChatGPT (and others that are similar), at Kilpatrick’s...more
Artificial Intelligence has rapidly moved from theoretical to transformational, profoundly changing how businesses operate across industries. While the benefits of AI, particularly Generative AI (genAI), are monumental, these...more
In the final days of the Biden Administration, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued a notice of proposed rulemaking (NPRM) to modify the Security Rule under the Health...more