In-House Essentials
- Tech Meets Legal
- Cyber Leadership
- Employment
- Operations
Dec. 16, 2020
AI for Compliance: Building a Model
Nov. 11, 2020
AI for Compliance: Foundations
Jun. 17, 2020
The Current State and Future of AI Regulation
Mar. 11, 2020
The Keys to Encryption: Legal and Regulatory Framework
Dec. 11, 2019
How to Handle E.U. Data Subject Access Requests
Nov. 13, 2019
AI for Fund Managers and Beyond: Government Guidance
Jul. 31, 2019
Takeaways From the U.K. ICO’s FaceApp Warning
Jul. 10, 2019
Can GDPR Hinder AI Made in Europe?
May 15, 2019
What Does It Mean to Be Technologically Competent?
Mar. 13, 2019
Mitigating the Risks of Open-Source Software
Oct. 17, 2018
Risks and Rewards of Bluetooth Technology
Oct. 17, 2018
Regulating AI: U.S., E.U. and Industry Laws and Guidance
Feb. 14, 2018
Using Technology to Comply With the GDPR
Oct. 25, 2017
How to Outsource Vulnerability Assessments to Hackers
Sep. 13, 2017
Negotiating an Effective Cloud Service Agreement
May 31, 2017
Advice on Incorporating Cybersecurity in eDiscovery
May 17, 2017
Tracking Data and Maximizing Its Potential
May 11, 2016
Privacy Concerns in a Cashless Society
Jun. 17, 2015
The Advantages of Sending Data Up to the Cloud
Apr. 8, 2015
Ten Actions for Effective Data Risk Management
Apr. 14, 2021
Advice From CISOs on How to Succeed in the Role
Jan. 13, 2021
Cybersecurity Resolutions for 2021
Dec. 16, 2020
AI for Compliance: Building a Model
Nov. 11, 2020
AI for Compliance: Foundations
Jun. 10, 2020
How Compliance Departments Are Responding to COVID‑19
Feb. 26, 2020
Eleven Key Components of an Effective Privacy Program
Feb. 12, 2020
Compliance Records Are a Strategic Gold Mine
Jan. 29, 2020
30 Creative Ideas for Compliance Messaging
Dec. 11, 2019
How to Handle E.U. Data Subject Access Requests
Sep. 11, 2019
Using “Red-Teaming” to Test and Improve Cyber Defenses
Jul. 17, 2019
How to Establish an Efficient Incident Response Plan
Jul. 17, 2019
Maine Enacts Sweeping Broadband Customer Privacy Law
May 29, 2019
Keeping CISOs and the C-Suite Off the Witness Stand
Apr. 3, 2019
FCA Evaluates Firms’ Cyber Resilience
Feb. 20, 2019
Fixing the Chinks in Companies’ Cyber Armor: Executives
Dec. 19, 2018
Interim Response Lessons From the Marriott Breach
Nov. 7, 2018
How GoDaddy Built an Effective Privacy Program
Nov. 8, 2017
Managing Data Privacy Across Multiple Jurisdictions
Jul. 26, 2017
How the CCO Can Use SEC Guidance to Tackle Cyber Threats
Jul. 20, 2016
Challenges Facing Chief Privacy Officers
Feb. 17, 2021
A Fake Zoom Invite Hack: Eight More Lessons
Feb. 10, 2021
A Fake Zoom Invite Hack: What Happened and Three Lessons
Jan. 13, 2021
Checklist for IoT Security Audits
Jan. 13, 2021
Cybersecurity Resolutions for 2021
Nov. 4, 2020
A Guided Tour of Enterprise IoT Device Hazards
Sep. 23, 2020
Identifying and Preventing Ransomware Attacks
Sep. 9, 2020
Action Steps to Respond to Ransomware Attacks
Jul. 8, 2020
Privacy Compliant Return-to-Work Checklist
Jun. 10, 2020
How Compliance Departments Are Responding to COVID‑19
Apr. 8, 2020
Wide-Ranging Lessons From Notable Breaches in Q1
Apr. 1, 2020
Investigation Strategies During Social Distancing
Feb. 19, 2020
Preparing for and Responding to Ransomware Attacks
Jan. 29, 2020
30 Creative Ideas for Compliance Messaging
Jan. 15, 2020
How Compliance and HR Can Work Together
Oct. 23, 2019
CFTC Issues $1.5-Million Fine After Phishing Attack
Jul. 31, 2019
Takeaways From the U.K. ICO’s FaceApp Warning
Feb. 20, 2019
Fixing the Chinks in Companies’ Cyber Armor: Executives
Jan. 16, 2019
Key Cyber Threats and Targets for 2019
Oct. 17, 2018
Risks and Rewards of Bluetooth Technology
Jan. 11, 2017
FTC Priorities for 2017 and Beyond
Jan. 11, 2017
Ten Cybersecurity Priorities for 2017
Sep. 21, 2016
Staying Cybersecure Without Mobile Device Management
Aug. 24, 2016
Cybersecurity Due Diligence in M&A Is No Longer Optional
Jul. 20, 2016
Using Data Analytics to Combat Internal Cyber Threats
Apr. 14, 2021
Advice From CISOs on How to Succeed in the Role
Jan. 20, 2021
Privacy Resolutions for 2021
Jan. 13, 2021
Cybersecurity Resolutions for 2021
Dec. 16, 2020
AI for Compliance: Building a Model
Nov. 11, 2020
AI for Compliance: Foundations
Jul. 29, 2020
Remote Forensic Data Collection Steps Into the Spotlight
Apr. 1, 2020
When Do Force Majeure Clauses Excuse Performance?
Apr. 1, 2020
Investigation Strategies During Social Distancing
Feb. 26, 2020
Eleven Key Components of an Effective Privacy Program
Feb. 12, 2020
Compliance Records Are a Strategic Gold Mine
Jan. 29, 2020
30 Creative Ideas for Compliance Messaging
Jan. 15, 2020
How Compliance and HR Can Work Together
Dec. 11, 2019
How to Handle E.U. Data Subject Access Requests
Dec. 11, 2019
Not Just GDPR: Examining the Other European Privacy Laws
Nov. 13, 2019
AI for Fund Managers and Beyond: Government Guidance
Oct. 2, 2019
Preserving Customer Goodwill After a Breach
Jul. 17, 2019
Maine Enacts Sweeping Broadband Customer Privacy Law
May 15, 2019
What Does It Mean to Be Technologically Competent?
Jan. 9, 2019
Ten Cyber and Privacy Resolutions for the New Year
Dec. 19, 2018
Ten Steps for Effective Crisis Communications
Nov. 7, 2018
How GoDaddy Built an Effective Privacy Program
Mar. 14, 2018
How Will the GDPR Affect Due Diligence?
Jan. 17, 2018
Ten Cybersecurity Resolutions for 2018
Dec. 6, 2017
Gathering and Analyzing Compliance Data
Nov. 8, 2017
Managing Data Privacy Across Multiple Jurisdictions
Jul. 26, 2017
How the CCO Can Use SEC Guidance to Tackle Cyber Threats
Jun. 14, 2017
How Internal Audit Can Improve Cybersecurity
May 31, 2017
Advice on Incorporating Cybersecurity in eDiscovery
May 3, 2017
Compliance Implications of Brexit
Apr. 19, 2017
How to Ensure Cyber Risks Do Not Derail an IPO
Jan. 11, 2017
Ten Cybersecurity Priorities for 2017
Jul. 20, 2016
Challenges Facing Chief Privacy Officers
Jun. 8, 2016
Minimizing Class Action Risk in Breach Response
Feb. 17, 2016
Cybersecurity Preparedness Is Now a Business Requirement
Apr. 8, 2015
Ten Actions for Effective Data Risk Management
Most-Read Articles
-
Apr. 14, 2021
AI Compliance Playbook: Traditional Risk Controls for Cutting-Edge Algorithms -
Mar. 17, 2021
Privacy and Security Provisions in Vendor Agreements: Assessing the Risks -
Mar. 31, 2021
How Do You Put a System of Controls in Place When Your Target Keeps Moving? -
Mar. 24, 2021
Recommended Data Strategies As Google Swears Off Web Tracking -
Apr. 7, 2021
Behind the Scenes: California AG’s Non-Public CCPA Inquiries
Cybersecurity Resolutions for 2021
In this quick take video, we talk about some of our cybersecurity resolutions for 2021.
H&M’s Data Protection Fine
In this short video, we discuss Germany’s highest GDPR fine so far in a case against H&M relating to their mishandling of sensitive employee data. The full article on the case is here.
Summer 2020 Editorial Update
Register here to view the complimentary recording or here for an audio version.
CCPA and Third Parties
Editor-in-Chief Rebecca Hughes Parker discusses the California Attorney General’s final CCPA regulations and their effect on contracts with vendors in this video.