Legal AI in Practice: Firm Governance, Build vs. Buy Decisions, and Vendor Due Diligence — The Good Bot Podcast
AI Risks and Realities for Nonprofits: Traps for the Unwary and Tips for Avoiding Them
Guide to Maryland's New Data Privacy Laws for Business Owners
Compliance Tip of the Day - 10 Lessons for the Compliance Professional on Fighting Fraud, Waste and Abuse
Episode 385 -- Five Strategies to Mitigate a New Risk Environment
Episode 384 -- Third-Party Risks and Sanctions
Great Woman in Compliance: Building Strategic and Effective Risk Assessments
Innovation in Compliance: Gaurav Kapoor on Risk Management and the Role of AI in GRC
Episode 30 - Inaugural Episode with Ian Sherr: Compliance Week’s Insights and Reflections from June to July 2025
Compliance Tip of the Day: Internal Controls for Third Parties
Upping Your Game: Harnessing AI to Revolutionize Third-Party Risk Management
Compliance Tip of the Day: Terminating Third Parties
FCPA Compliance Report: Upping Your Game in Compliance
Episode 368 — LRN Issues New Report Highlighting Growing Gap in Compliance Program Performance
FCPA Compliance Report: From Compliance to Commercial Value: Removing Friction with AI
Episode 364 -- Five Strategies to Mitigate a New Risk Environment
The Privacy Insider Podcast Episode 12: Compliance Is Good Business: Getting Beyond Fines with Tom Fox of Compliance Podcast Network
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Episode 360 -- Natalie Druckman from Certa on AI-Enhanced Third-Party Risk Management
Compliance Tip of the Day: Using AI to Manage 3rd Party Risk
On January 28, 2026, the Federal Bureau of Investigation (FBI) announced the launch of Operation Winter SHIELD, a coordinated initiative designed to promote adoption of core defensive measures that are shown to mitigate...more
Le 17 novembre 2025, la commissaire à l’information et à la protection de la vie privée de l’Ontario (la « CIPVP de l’Ontario ») et l’Office of the Information and Privacy Commissioner de l’Alberta (l’« OIPC de l’Alberta »)...more
The new AVOID Act is reshaping file handling overnight, making early investigation and rapid third party action not just smart, but essential. Join Goldberg Segalla partners Jessica Erickson, Ryan Mahoney, and attorneys...more
BaFin published its yearly update on its report regarding Risks in BaFin’s Focus, accompanied by a press release. The report identifies the following six top risks for financial institutions, arising from: (i) significant...more
Over 100,000 people just gave an AI assistant root access to their computers. That assistant can now talk to other AI assistants on a social network humans cannot post to....more
Bribery and corruption are illegal. What does that mean in practice? Various countries have enacted laws to combat corruption, including India's Prevention of Corruption Act, the UK Bribery Act of 2010, and the Canadian...more
AI-enabled interviewing tools have emerged as a common solution for the administrative burdens associated with hiring. These tools improve efficiency, streamline operations, allow you to consider more candidates without...more
Property and casualty insurers manage high volumes of regulated, document-driven communications, including policies, endorsements, billing statements, and legally required notices, that must be produced and delivered...more
Unlock the keys to effective compliance auditing & monitoring - Take a deep dive into auditing and monitoring, an important two-pronged approach to compliance program assessment and a core component of an effective...more
The UK operational resilience requirements for the Financial Services and Markets Act (FSMA) came into force in March 2025. Yet, many firms are still scrambling to demonstrate that they can keep critical services running...more
From my perspective, hopefully a reasonable one, there is a little too much AI-Risk Hype. Not to belittle the experts or ignore potential risk concerns but this is getting a little carried away....more
Canadian Institute's 10th Annual Canadian Forum on Global Economic Sanctions brings together leading regulators, enforcement officials, compliance professionals, and top decision-makers....more
The construction industry faces unique cybersecurity challenges that distinguish it from other sectors. With complex payment structures, multiple stakeholders, and extensive use of mobile technology on job sites, construction...more
Ransomware attacks continue to evolve in sophistication, disrupting operations and commanding the urgent attention of regulators, law enforcement and government agencies....more
When discussing the litigation challenges deepfake technology poses, one typically thinks of difficulties protecting individual privacy rights, complications prosecuting anonymous actors, the lack of law regulating deepfake...more
Geopolitics and supply chain risk have emerged as top concerns for Chief Legal Officers. These factors are shaping strategic plans and competitive advantage as well as day-to-day operations. ...more
In this episode of The Good Bot, Brett Mason sits down with Leigh Zeiser, director of AI and automation at Troutman Pepper Locke, to unpack how the firm operationalizes AI responsibly. They discuss the firm's AI portfolio —...more
The German Financial Supervisory Authority ("BaFin") has issued non-binding guidance ("Guidance") clarifying how financial institutions should manage Information and Communication Technology ("ICT") risks arising from...more
Our Privacy, Cyber & Data Strategy Team examines the profound implications of the evolution of AI-driven cyberattacks and offers practical steps general counsel can take to proactively defend against them....more
Connect with senior legal and compliance leaders later this month at ACI’s 19th Forum on the FCPA & Global Anti-Corruption Houston. Learn directly from enforcement officials, pressure-test your compliance approach with...more
Europe’s gateway to the cosmos has stumbled on terrestrial ground, reminding the global research community that the most advanced engineering ambitions remain tethered to fragile digital infrastructures. On December 30, 2025,...more
A third-party data breach occurs when malicious actors compromise a vendor, supplier, contractor, or other organization to gain access to sensitive information or systems of the victim’s customers, clients, or business...more
Threat actors had another banner year in 2025. As we head into 2026, looking back on the five top security threats of 2025 may inform our strategy and budgeting for 2026 to prepare for the continued onslaught of attacks....more
Financial regulators including the Securities and Exchange Commission (“SEC”) continued to focus on data protection and cybersecurity issues throughout 2025....more
OFAC’s December 2025 settlement with Exodus Movement, Inc. puts U.S. Web 3.0 infrastructure providers on notice that sanctions compliance controls are mandatory....more