• Search for " " on Law Report Group

    HOME

    TOPICS

    ABOUT US

  • |
  • Home
  • Topics A-Z
  • Regulations & Enforcement
  • Data Security
  • Data Privacy
  • In-House Essentials
  • Checklists
  • Events
  • About Us
  • Subscribe

In-House Essentials

  • Tech Meets Legal
  • Cyber Leadership
  • Employment
  • Operations

Mar. 22, 2023

Managing Legal Issues Arising From Use of ChatGPT and Generative AI: Industry Considerations and Practical Compliance Measures

Mar. 15, 2023

Managing Legal Issues Arising From Use of ChatGPT and Generative AI: E.U. and U.S. Privacy Law Considerations

Mar. 8, 2023

Best Practices to Combat Surge of Unwanted Data Scraping

Mar. 1, 2023

Getting Used to Zero Trust? Meet Zero Copy

Feb. 22, 2023

IAB Unveils Multistate Contract to Satisfy 2023 Laws’ Curbs on Targeted Ads

Feb. 15, 2023

Impact of Emerging Technologies on Financial Crime Risk Management

Feb. 8, 2023

AI Governance Gets Real: Core Compliance Strategies

Feb. 8, 2023

How to Comply With the CPRA’s Data Minimization Standards

Feb. 1, 2023

Key Privacy Issues for 2023

Feb. 1, 2023

AI Governance Gets Real: Tips From a Chat Platform on Building a Program

Dec. 14, 2022

Recent FTC Cases Highlight Evolving Regulatory Expectations in the Use of Multi-Factor Authentication

Nov. 9, 2022

Privacy and Security Considerations of Blockchain Technology

Oct. 26, 2022

Takeaways From the New Push for a Federal AI Law

Oct. 12, 2022

Metaverse IRL: Are Companies Overlooking the Privacy Risks of NFTs and Crypto Wallets?

Oct. 5, 2022

Metaverse IRL: Grappling With Biometric Data and Privacy Notices in VR Headsets

Sep. 21, 2022

Metaverse IRL: Tackling Privacy Amid the Rampant Hype and Burst of Deals

Sep. 21, 2022

Trio of Settled Enforcement Actions Highlights SEC Concerns About Identity Theft Policies and Procedures

Sep. 14, 2022

Compliance Survey Finds Data Management Challenges, Rising Costs and Increasing Uptake of RegTech

Sep. 07, 2022

Four Steps to Secure Open-Source Software After CSRB’s Log4j Investigation

Aug. 10, 2022

Protecting Against Crypto Theft

Jul. 13, 2022

New AI Rules: Five Compliance Takeaways

Jun. 29, 2022

Navigating the Intersection of Digital Assets and AML

Jun. 22, 2022

New AI Rules: States Require Notice and Records, Feds Urge Monitoring and Vetting

Jun. 15, 2022

New AI Rules: NYC First to Mandate Audit

May 18, 2022

Navigating the Intersection of Blockchain and Data Privacy Laws

May 11, 2022

The Evolving Crypto Regulatory Climate

May 4, 2022

Cybersecurity and Privacy Teams Join to Create Data Governance Councils

Apr. 13, 2022

California AG Opinion Hands Companies New Tasks for AI, Data Maps, Marketing

Apr. 6, 2022

How to Measure Whether Your Company Is Ready to Catch Lots of Phish

Mar. 30, 2022

As Email Scams Surge, Training Lessons From 115 Million Phishing Messages

Mar. 16, 2022

How Combining Approaches to Data Analytics Can Yield Powerful Insights

Mar. 16, 2022

Securing Emerging Technologies Without Hampering Innovation: Government Initiatives and How Companies Can Adapt

Mar. 9, 2022

Securing Emerging Technologies Without Hampering Innovation: Private Sector Challenges

Mar. 2, 2022

Blockchain Recordkeeping Stirs Privacy Concerns

Feb. 16, 2022

AB InBev’s C2CRIGHT Initiative: Using Split Learning to Protect Privacy While Working Together

Feb. 9, 2022

AB InBev’s C2CRIGHT Initiative: Can Companies Work Together to Prevent Corruption?

Jan. 19, 2022

Privacy Resolutions for 2022

Jan. 19, 2022

Privacy and Security Due Diligence in M&A Transactions: Going Beyond the Questionnaire

Jan. 5, 2022

Using Technology to Build in Data Governance for Improved Security and Privacy

Jan. 5, 2022

Compliance Checklist for AI and Machine Learning

Dec. 15, 2021

Understanding Differential Privacy

Dec. 8, 2021

Privacy Tech Products Hold Promise but Sector Faces Hurdles

Dec. 01, 2021

Using Technology and Outsourcing to Enhance Compliance Programs and Manage Conflicts of Interest

Nov. 3, 2021

Checklist for Building an Identity-Centric Cybersecurity Framework

Oct. 27, 2021

IOSCO Issues Final Guidance on AI and Machine Learning

Oct. 6, 2021

Lessons From HPE’s Anti-Corruption Purchase Order Analytics on the Role for Humans in Data Interpretation

Oct. 6, 2021

Fund Managers Must Ensure Adequate Security Measures Under Safeguards Rule or Risk SEC Enforcement Action

Oct. 6, 2021

How to Build Insider Risk Programs to Satisfy Global Employee Privacy Laws

Sep. 22, 2021

Examining the Intersection of Voiceprints and Data Privacy Laws

Sep. 15, 2021

Essential Technology Contract Elements

Aug. 11, 2021

Evaluating Privacy and Cybersecurity Risks In Emerging Technology Transactions: Biometrics, Fintech and Cryptocurrency

Aug. 11, 2021

Using RegTech for Compliance Efforts and Potential Benefits of Emerging Technologies

Aug. 4, 2021

The Evolution, Status and Future of RegTech in the Private Funds Industry

Aug. 4, 2021

Evaluating Privacy and Cybersecurity Risks in Emerging Technology Transactions: Artificial Intelligence and EdTech

Jul. 21, 2021

Understanding Common Hacking Techniques and Forensic Analysis

Jun. 30, 2021

Using RegTech to Enhance Compliance

Jun. 16, 2021

The Impact of Recent Legislative and Litigation Trends on Commercial Use of De-Identified Data

Jun. 2, 2021

AI Compliance Playbook: Adapting the Three Lines Framework for AI Innovations

May 19, 2021

Negotiating Reps, Warranties and Remedies in Technology Contracts

May 12, 2021

How Law Firms Can Prevent, Detect, and Respond to Ransomware Attacks

May 12, 2021

How Three Companies Embarked on AI Compliance Journeys

Apr. 28, 2021

AI Compliance Playbook: Understanding Algorithm Audits

Apr. 21, 2021

AI Compliance Playbook: Seven Questions to Ask Before Regulators or Reporters Do

Apr. 14, 2021

AI Compliance Playbook: Traditional Risk Controls for Cutting-Edge Algorithms

Apr. 7, 2021

Did Clubhouse Sacrifice Privacy for Innovation? How to Find the Balance 

Mar. 31, 2021

Managing Vendor Contracts From the Data Controller's Perspective

Mar. 24, 2021

Digital Identity Management in a Post-Pandemic World: A Framework for Identity-Centric Cybersecurity

Mar. 17, 2021

Digital Identity Management in a Post-Pandemic World: SolarWinds, Zero Trust and the Challenges Ahead

Mar. 10, 2021

AI for Compliance: Five Workarounds for Asymmetric Data Sets

Jan. 27, 2021

The Potential Legal Implications of Web Scraping for Market Research

Jan. 20, 2021

eDiscovery in Multi-Jurisdictional Investigations: Preparing to Play Multi-Level Chess

Dec. 16, 2020

AI for Compliance: Building a Model

Dec. 9, 2020

Strategies for Managing the Intersection of Cybersecurity and New Technologies

Nov. 18, 2020

Show Me the Data: How to Conduct Audits for Data Minimization

Nov. 11, 2020

AI for Compliance: Foundations

Nov. 11, 2020

The Intelligent Workplace in the Age of a Pandemic: Six Privacy and Security Safeguards

Nov. 4, 2020

Vulnerability Management: Increasing Communication to Prevent Problems From Hiding in Plain Sight

Oct. 28, 2020

Vulnerability Management: Understanding the Risks of External Scanning

Oct. 28, 2020

The Intelligent Workplace in the Age of a Pandemic: Balancing Innovation and Risk

Oct. 14, 2020

Vulnerability Management: What You Don’t Know From Your External Scans Can Be Used Against You

Sep. 9, 2020

IOSCO Offers Six Risk Mitigation Measures for AI and Machine Learning

Aug. 5, 2020

How to Achieve Trustworthy AI Using the European Commission’s Final Assessment List

Jul. 15, 2020

Back to the Table: CCPA Regulations Spark New Wave of Service-Provider Negotiations

Jul. 8, 2020

Getting Board Buy-In for Edge Cybersecurity Initiatives Post COVID‑19

Jun. 24, 2020

Balancing Privacy Rights and Innovation in Digital Contact Tracing

Jun. 17, 2020

The Current State and Future of AI Regulation

Jun. 10, 2020

After Capital One Ruling, How Will Companies Protect Forensic Reports?

May 20, 2020

Did Adtech Fix Its CCPA Problem? IAB’s GC Discusses New Contract for Data Sales

May 13, 2020

NIST Privacy Framework: Privacy Controls for an Era of Digital Transformation

Mar. 18, 2020

The Keys to Encryption: Effective Policies, Legal’s Role and Third Parties

Mar. 11, 2020

The Keys to Encryption: Legal and Regulatory Framework

Mar. 4, 2020

The Keys to Encryption: Uses and Implementation Challenges

Feb. 19, 2020

Best Practices for Using Alternative Data: Mitigating Regulatory Risks

Feb. 12, 2020

Best Practices for Using Alternative Data: Collection and Provider Management

Feb. 5, 2020

The Rise of Facial Recognition Technology: Mitigating Risk

Feb. 5, 2020

Defining, Implementing and Documenting “Reasonable Security”

Jan. 29, 2020

The Rise of Facial Recognition Technology: Mapping the Legal Framework

Jan. 22, 2020

The Rise of Facial Recognition Technology: Uses and Risks

Jan. 8, 2020

How eBay and PayPal Use Key Performance Indicators to Evaluate and Improve Privacy Programs

Dec. 11, 2019

How to Handle E.U. Data Subject Access Requests

Dec. 11, 2019

Allocating Risk in Cloud Computing Relationships: Key Legal Issues

Dec. 4, 2019

Allocating Risk in Cloud Computing Relationships: Spectrum of Offerings

Nov. 20, 2019

AI for Fund Managers and Beyond: How to Automate the Legal Department and Maintain Privacy

Nov. 13, 2019

AI for Fund Managers and Beyond: Government Guidance

Nov. 6, 2019

AI for Fund Managers and Beyond: How to Use It to Streamline Operations

Oct. 30, 2019

Reconciling Technology Development, Security and the Lawyer’s Role

Oct. 2, 2019

CCPA Close-Up: Review of Amendments and How to Prepare for Compliance

Sep. 25, 2019

Strategies and Tactics for Conducting an Effective Tabletop Exercise (Part Two of Two)

Jul. 31, 2019

Takeaways From the U.K. ICO’s FaceApp Warning

Jul. 10, 2019

Can GDPR Hinder AI Made in Europe?

Jun. 19, 2019

Tips From Lockheed and Groupon on Developing GC-CISO Partnerships to Improve Security and Incident Response

Jun. 12, 2019

There Really Isn’t a Quarterback: Uber and Equifax Executives Share Insights on Incident Response Best Practices and the Lawyer’s Role

Jun. 5, 2019

FINRA RegTech Conference Reviews AI, RegTech Adoption and Compliance Challenges (Part Two of Two)

May 29, 2019

FINRA RegTech Conference Examines Digital Identification, Suspicious Activity Reporting and Machine Learning

May 22, 2019

Court Reconsiders November 2018 Order and Issues Preliminary Injunction Against ICO

May 15, 2019

What Does It Mean to Be Technologically Competent?

May 8, 2019

Understanding Regulatory Technology: Current Uses and Deployment Considerations

May 1, 2019

Understanding Regulatory Technology: Tools, Challenges and Regulators’ Views

Apr. 10, 2019

Insights From a Former SEC Counsel on Regulating Digital Assets

Mar. 27, 2019

Navigating the Risks of Alternative Data Collection and Use

Mar. 20, 2019

Increased Post-Breach Discovery Turns Spotlight on Privilege

Mar. 13, 2019

Mitigating the Risks of Open-Source Software

Mar. 6, 2019

Benefits and Risks of Open-Source Software and How the Financial Sector Is Using It

Feb. 27, 2019

Preparing for the CCPA: Securing Buy-In and Setting the Scope

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 20, 2019

Implications of the Illinois Supreme Court’s BIPA Holding Against Six Flags

Feb. 13, 2019

Practical Ways to Incorporate Security Protection Into Supplier Agreements

Jan. 23, 2019

Illinois Federal Court Denies Standing in BIPA Claim Against Google

Jan. 16, 2019

How a New Ethics Rule and Error in Manafort Case Highlight the Importance of Lawyers’ Technology Competence

Dec. 12, 2018

Illinois Appellate Decision Creates Split on Standing to Sue Under BIPA

Dec. 5, 2018

Insights From Uber: Building Bridges Between Legal and Engineering

Nov. 28, 2018

Insights From Uber: An Inside Look at Its Privacy Team Structure and How Legal and Tech Collaborated on Its Differential Privacy Tool

Nov. 14, 2018

How Privacy Professionals Can Benefit Cybersecurity Programs: Practical Tips From Gap and Privacy Panacea

Nov. 14, 2018

A Roadmap to Preparing for and Managing a Cyber Investigation

Nov. 7, 2018

WhiteHat Report on the Software Lifecycle and Visa Bug Bounty Program Demonstrate the Need for Greater App Security

Oct. 24, 2018

California Enacts Groundbreaking IoT Law and Requires Disclosure of Bot Use

Oct. 17, 2018

Risks and Rewards of Bluetooth Technology

Oct. 17, 2018

Regulating AI: U.S., E.U. and Industry Laws and Guidance

Sep. 26, 2018

New Sidley Partner Lilya Tessler Discusses the FinTech and Blockchain Space

Sep. 26, 2018

Artificial Intelligence in Legal Practice: Potential Ethical and Liability Pitfalls

Sep. 19, 2018

Evolving Roles of Privacy and Security Professionals: Operationalizing Policies, Incident Response and Vendor Management

Sep. 12, 2018

Evolving Roles of Privacy and Security Professionals: Effective Governance and Board Reporting

Sep. 5, 2018

Evolving Roles of Privacy and Security Professionals: Examining Required Skills and Potential Convergence

Jul. 11, 2018

Is Encryption Obligatory? HHS Upholds Texas Hospital $4.3M HIPAA Fine 

Jun. 13, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Three of Three)

Jun. 6, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Two of Three)

May 30, 2018

Understanding the Intersection of Law and Artificial Intelligence

May 30, 2018

What Lawyers Need to Know About Security Techniques and Technologies to Mitigate Breach Risk (Part One of Three)

Apr. 18, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Vendors and M&A (Part Three of Three)

Apr. 11, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Assessments and Incident Response (Part Two of Three)

Mar. 28, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: It Starts With Governance (Part One of Three)

Mar. 14, 2018

FTC Enters Into Stiff Settlement With PayPal for Venmo’s Deceptive Practices, but Eases up on a 2009 Sears Order 

Feb. 14, 2018

Using Technology to Comply With the GDPR

Feb. 14, 2018

Biometric Data Protection Laws and Litigation Strategies (Part Two of Two)

Feb. 14, 2018

Virtual Currencies Present Significant Risk and Opportunity, Demanding Focus From Regulators, According to CFTC Chair

Jan. 31, 2018

Five Strategies a Privacy Attorney Uses to Bridge the Gap With Tech Teams

Jan. 31, 2018

Biometric Data Protection Laws and Litigation Strategies (Part One of Two)

Jan. 31, 2018

How to Make Data Work for You: A Conversation With a Law Firm’s Chief Data Analytics Officer and Its CISO

Jan. 17, 2018

How Blockchain Will Continue to Revolutionize the Private Funds Sector in 2018

Dec. 20, 2017

SEC Takes Aggressive Action Against Allegedly Fraudulent ICO

Dec. 6, 2017

Actions Under Biometric Privacy Laws Highlight Related Risks

Nov. 8, 2017

How to Mitigate the Risks of Open-Source Software (Part Two of Two)

Oct. 25, 2017

How to Mitigate the Risks of Open-Source Software (Part One of Two)

Oct. 25, 2017

How to Outsource Vulnerability Assessments to Hackers

Oct. 11, 2017

Practical and Ethical Data-Protection Steps for Law Firms

Oct. 11, 2017

Lessons From the Equifax Breach on How to Bolster Incident Response Planning (Part Two of Two)

Sep. 27, 2017

Lessons From the Equifax Breach on How to Bolster Incident Response Planning (Part One of Two)

Sep. 13, 2017

Unlocking Encryption: An Attorney Weighs in on Balancing Security and Practicality (Part Three of Three)

Sep. 13, 2017

Negotiating an Effective Cloud Service Agreement

Aug. 23, 2017

Unlocking Encryption: A CISO’s Perspective on Encryption As Only One Strategy (Part Two of Three)

Aug. 9, 2017

Overcoming the Challenges and Reaping the Benefits of Multi-Factor Authentication in the Financial Sector (Part Two of Two)

Aug. 9, 2017

Unlocking Encryption: A Consultant’s View on Navigating Encryption Options and Persuading Reluctant Organizations (Part One of Three)

Jul. 26, 2017

Overcoming the Challenges and Reaping the Benefits of Multi-Factor Authentication in the Financial Sector (Part One of Two)

Jul. 12, 2017

Blockchain and the Financial Services Industry: Potential Impediments to Its Eventual Adoption (Part Three of Three)

Jun. 28, 2017

How Financial Service Providers Can Use Blockchain to Improve Operations and Compliance (Part Two of Three)

Jun. 28, 2017

The Arc of the Deal: Tips for Cybersecurity Due Diligence Advisors in Mergers & Acquisitions From Beginning to End

Jun. 14, 2017

Basics of the Blockchain Technology and How the Financial Sector Is Currently Employing It (Part One of Three)

May 31, 2017

One Year Until GDPR Enforcement: Five Steps Companies Should Take Now

May 31, 2017

Advice on Incorporating Cybersecurity in eDiscovery

May 17, 2017

Tracking Data and Maximizing Its Potential

May 17, 2017

Investigative Realities: Working Effectively With Forensic Firms (Part Two of Two)

May 3, 2017

Investigative Realities: Working Effectively With Forensic Firms (Part One of Two)

Apr. 19, 2017

What In-House and Outside Counsel Need to Know About ACC’s First Model Cybersecurity Practices for Law Firms

Apr. 5, 2017

Proactive Steps to Prevent Legal Pitfalls in Bug Bounty Programs 

Mar. 22, 2017

Forensic Firms: Effective Vetting and Collaboration (Part Three of Three)

Mar. 22, 2017

How to Establish and Manage a Successful Bug Bounty Program 

Mar. 8, 2017

Forensic Firms: Key Contract Considerations and Terms (Part Two of Three)

Feb. 22, 2017

Forensic Firms: Understanding and Leveraging Their Expertise From the Start (Part One of Three)

Jan. 11, 2017

Tech Meets Legal Spotlight: Advice on Working With Information Security

Nov. 30, 2016

Exploring the New Frontier of International Regulations on Importing and Exporting Encryption Technology

Nov. 30, 2016

Tech Meets Legal Spotlight: What to Do When IT and Legal Slow the Retention of a Third-Party Vendor

Nov. 2, 2016

Guide to Getting Your Security Program Certified Under ISO 27001

Oct. 19, 2016

Finding the Best Ways to Secure Digital Transactions in a Mobile World 

Aug. 24, 2016

Fulfilling the Ethical Duty of Technology Competence for Attorneys

Aug. 3, 2016

How Cyber Stakeholders Can Speak the Same Language (Part Two of Two)

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jul. 6, 2016

Technology Leader Discusses How to Deal With the Growing Threat of Ransomware 

Jun. 22, 2016

Assistant Attorney General Leslie Caldwell Addresses the Challenges of Cross-Border Cooperation and Electronic Evidence Gathering

Jun. 8, 2016

What CISOs Want Lawyers to Understand About Cybersecurity

May 11, 2016

Privacy Concerns in a Cashless Society

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Apr. 13, 2016

Study Analyzes How Companies Can Overcome Cybersecurity Challenges and Create Business Value

Mar. 30, 2016

How Law Firms Should Strengthen Cybersecurity to Protect Themselves and Their Clients

Mar. 30, 2016

Steps for Companies to Take This Week, This Month and This Year to Meet the Challenges of International Cyberspace Governance

Oct. 28, 2015

Orrick Attorneys Explain California’s New Specific Standards for Breach Notification

Aug. 26, 2015

The Development of E-Currency and Its Potential Impact on the Future

Aug. 12, 2015

How the Hospitality Industry Confronts Cybersecurity Threats that Never Take Vacations

Aug. 12, 2015

Surveys Find Internal and Third-Party Cybersecurity Risks Among Top Executive Concerns

Jul. 29, 2015

Managing the Increased Individual Risks and Responsibilities of Compliance Officers

Jul. 15, 2015

Conflicting Views of Safety, Vulnerability and Privacy Fuel Encryption Debate

Jul. 15, 2015

The Challenge of Coordinating the Legal and Security Teams in the Current Cyber Landscape (Part Two of Two)

Jun. 17, 2015

The Advantages of Sending Data Up to the Cloud 

Jun. 17, 2015

Sample Questions for Companies to Ask to Assess Their Law Firms’ Cybersecurity Environment

Jun. 3, 2015

How Companies Are Preparing for the Imminent Liability Shift for Counterfeit Credit Cards

Jun. 3, 2015

In a Candid Conversation, FBI Director James Comey Talks About the “Evil Layer Cake” of Cybersecurity Threats (Part One of Two)

Jun. 3, 2015

Understanding and Addressing Cybersecurity Vulnerabilities at Law Firms: Strategies for Vendors, Lawyers and Clients

Apr. 8, 2015

Ten Actions for Effective Data Risk Management

Mar. 15, 2023

A Roadmap to the Final Regulations Under the CPRA

Mar. 1, 2023

Getting Used to Zero Trust? Meet Zero Copy

Feb. 15, 2023

Advice From a CISO and Lawyer on Best Practices in Information and Data Governance

Feb. 8, 2023

How to Comply With the CPRA’s Data Minimization Standards

Feb. 1, 2023

Key Privacy Issues for 2023

Jan. 11, 2023

A Ransomware Tabletop’s 360-Degree Incident Response View: Day Five Through Post-Mortem

Jan. 11, 2023

Ten Cybersecurity Resolutions for Financial Services Firms in 2023

Jan. 4, 2023

A Ransomware Tabletop’s 360-Degree Incident Response View: Days One to Four

Dec. 7, 2022

How Lawyers Can Leverage the Shifting Environment to Enhance Compliance Programs

Nov. 30, 2022

Understanding and Implementing Privacy Audits

Nov. 9, 2022

Ransomware Evolution: Growing Threats and Response Considerations

Nov. 9, 2022

Lessons From the Conviction of Uber’s Former CISO

Nov. 2, 2022

Revised Monaco Memo Affects Compensation, Clawbacks and Monitorships

Oct. 19, 2022

GM CCO Talks Data, Culture, ESG and Scope Creep

Oct. 12, 2022

How the Revised Monaco Memo Alters Deal Making and Strategy

Oct. 5, 2022

A PR Blitz as DOJ Fine-Tunes Its Corporate Enforcement Policies

Sep. 28, 2022

Using Software Bills of Materials to Bolster Security in Contracting

Sep. 21, 2022

Metaverse IRL: Tackling Privacy Amid the Rampant Hype and Burst of Deals

Sep. 21, 2022

Trio of Settled Enforcement Actions Highlights SEC Concerns About Identity Theft Policies and Procedures

Sep. 14, 2022

Robinhood Resolution a First for Cryptocurrency Enforcement in NY

Sep. 14, 2022

Compliance Survey Finds Data Management Challenges, Rising Costs and Increasing Uptake of RegTech

Sep. 07, 2022

Four Steps to Secure Open-Source Software After CSRB’s Log4j Investigation

Aug. 17, 2022

SEC Cyber Rules: How to Prepare for the New 10-K Disclosure Mandates

Aug. 10, 2022

Tips for How In-House Counsel Can Navigate Typical Ethical Dilemmas and Conflicts of Interest (Part Two of Two)

Aug. 10, 2022

SEC Cyber Rules: How to Prepare for the New 8-K Incident Mandate

Aug. 3, 2022

Importance of In-House Counsel Discerning Their Client and Managing Evolving Attorney-Client Privilege Issues (Part One of Two)

Jul. 27, 2022

Designing a Privacy Center to Build Trust and Facilitate Business Growth

Jul. 20, 2022

Corporate Compliance and Enforcement Hot Topics With IBM VP Una Dean

Jun. 1, 2022

FINRA Clarifies Stance on CCO Supervisory Liability

Jun. 1, 2022

Roadmap for Building an Efficient Global Privacy Program: Maintenance

May 18, 2022

Roadmap for Building an Efficient Global Privacy Program: Buy-In, Scalability and Outside Resources

May 11, 2022

Roadmap for Building an Efficient Global Privacy Program: Scope and Prioritization

May 4, 2022

Roadmap for Building an Efficient Global Privacy Program: Organizational Structure

May 4, 2022

Effective Use of Privacy Impact Assessments

Apr. 20, 2022

GCs Discuss Crisis Management, Investigations, Individual Accountability and ESG

Mar. 30, 2022

The Parallels and Distinctions Between Investigations and Culture Reviews

Mar. 16, 2022

How Combining Approaches to Data Analytics Can Yield Powerful Insights

Mar. 9, 2022

A Look at the NSCP’s Firm and CCO Liability Framework

Feb. 16, 2022

Evolving Career Path and Rising Compensation for CISOs

Feb. 9, 2022

Leveraging Partnerships to Operationalize Privacy Programs

Jan. 26, 2022

Personal Liability and Compliance Resourcing Are Top Concerns Among CCOs, Surveys Show

Jan. 26, 2022

More Regulators Accept New Tool to Streamline Companies’ Cyber Compliance

Jan. 19, 2022

Privacy Resolutions for 2022

Jan. 12, 2022

Cybersecurity Resolutions for 2022

Jan. 5, 2022

A Guide to Privacy Frameworks: Implementation and Maintenance

Dec. 15, 2021

A Guide to Privacy Frameworks: Finding the Best Fit

Dec. 8, 2021

Managing Compliance Scope Creep

Dec. 8, 2021

Privacy Tech Products Hold Promise but Sector Faces Hurdles

Dec. 8, 2021

A Guide to Privacy Frameworks: Examining Options

Dec. 01, 2021

Using Technology and Outsourcing to Enhance Compliance Programs and Manage Conflicts of Interest

Nov. 10, 2021

How In-House Expertise Can Help Outside Counsel

Nov. 3, 2021

In-House Insight on Handling Data Subject Access Requests Under Multiple Privacy Regimes

Oct. 27, 2021

IOSCO Issues Final Guidance on AI and Machine Learning

Oct. 20, 2021

U.K. Data Privacy Officers Discuss Challenges and Concerns

Oct. 6, 2021

How to Build Insider Risk Programs to Satisfy Global Employee Privacy Laws

Sep. 22, 2021

Jacki Cheslow on IEEE’s Remote Program Assessment

Sep. 15, 2021

Leadership Insights From CPOs at Google, J.P. Morgan and Dow Jones

Sep. 8, 2021

Imperva’s Global Data Privacy Officer Discusses Privacy by Design

Sep. 8, 2021

Electronic Communications: Useful Training Techniques and Policies and Procedures to Adopt

Aug. 18, 2021

Electronic Communications: Current Technological Landscape and Relevant Regulatory Measures

Jul. 28, 2021

Incident Response in the Financial Services Industry

Jun. 30, 2021

DOL Begins Cyber Audits to Protect U.S. Workers’ Retirement Savings

Jun. 16, 2021

Leveraging Policies and Culture: A Recipe for Success

Jun. 9, 2021

State AGs Share Breach Notification Tips and Latest Enforcement Concerns

Jun. 2, 2021

Post-COVID Compliance Strategies: Dealing With Persistent Heightened Risks

May 12, 2021

How Law Firms Can Prevent, Detect, and Respond to Ransomware Attacks

May 5, 2021

Balancing Legalese and Simplicity in Modern Privacy Policies

Apr. 28, 2021

First 100 Days As GC/CCO: Managing Daily Work, Performing Risk Assessments and Looking Ahead

Apr. 21, 2021

First 100 Days As GC/CCO: Developing Knowledge and Forging Key Relationships

Apr. 14, 2021

First 100 Days As GC/CCO: Preparing for the Role and Setting the Tone

Apr. 14, 2021

Advice From CISOs on How to Succeed in the Role

Mar. 31, 2021

How Do You Put a System of Controls in Place When Your Target Keeps Moving?

Mar. 10, 2021

AI for Compliance: Five Workarounds for Asymmetric Data Sets

Mar. 3, 2021

Preserving the Privilege for In-House Counsel: Internal Investigations and Depositions

Feb. 24, 2021

Cargill Compliance Director Discusses Putting Training Data to Work

Jan. 13, 2021

Cybersecurity Resolutions for 2021

Jan. 13, 2021

Can the Cybersecurity Industry Improve Cooperation to Beat Threats?

Jan. 6, 2021

Maintaining Privacy While Staying Competitive in an Evolving Regulatory Landscape

Jan. 6, 2021

Six Practical Tips for Building an Effective Privacy Risk Assessment Program

Dec. 16, 2020

AI for Compliance: Building a Model

Dec. 2, 2020

How CCOs Can Avoid Personal Liability for an Organization’s Compliance Failures

Nov. 18, 2020

SEC Commissioner Peirce Shares Views on Personal Liability for CCOs

Nov. 11, 2020

AI for Compliance: Foundations

Oct. 21, 2020

How Lockheed Uses Big Data to Evaluate Risk at Small Worksites

Oct. 7, 2020

Tips and New Benchmarks for Creating Effective Tabletop Exercises

Sep. 16, 2020

Twelve Steps for Engaging the Board of Directors and Implementing a Long-Term Cybersecurity Plan

Sep. 16, 2020

Four Principles Underlying Microsoft’s Compliance Analytics Program

Sep. 9, 2020

IOSCO Offers Six Risk Mitigation Measures for AI and Machine Learning

Sep. 2, 2020

Business Continuity Plans, Budgets and More: Hot Compliance Topics for Investment Advisers

Jul. 22, 2020

Majority of In-House Counsel Satisfied With Compensation, but Gender Gap Remains

Jul. 8, 2020

Getting Board Buy-In for Edge Cybersecurity Initiatives Post COVID‑19

Jun. 10, 2020

How Compliance Departments Are Responding to COVID‑19

Jun. 3, 2020

How CISOs Can Use Digital Asset Metrics to Tell a Coherent Cyber Story to the Board

May 27, 2020

Insights on Building a Compliance Program at a New Company

May 20, 2020

Did Adtech Fix Its CCPA Problem? IAB’s GC Discusses New Contract for Data Sales

May 13, 2020

NIST Privacy Framework: Privacy Controls for an Era of Digital Transformation

May 6, 2020

NIST Privacy Framework: Insights on New Tool for Managing Privacy Risks

Apr. 15, 2020

Report on CCO Liability Calls for More Regulatory Cooperation

Mar. 25, 2020

Companywide Work From Home: Six Cybersecurity Considerations

Mar. 18, 2020

The Ongoing Complexity of Vendor Risk: Top 5 Considerations for C-Level Leaders

Mar. 18, 2020

The Keys to Encryption: Effective Policies, Legal’s Role and Third Parties

Feb. 26, 2020

Tips From Ponemon/Experian Survey on Building an Incident Response Plan That Fosters Confidence

Feb. 26, 2020

Eleven Key Components of an Effective Privacy Program

Feb. 12, 2020

Compliance Records Are a Strategic Gold Mine

Feb. 5, 2020

Defining, Implementing and Documenting “Reasonable Security”

Jan. 29, 2020

30 Creative Ideas for Compliance Messaging

Jan. 8, 2020

How eBay and PayPal Use Key Performance Indicators to Evaluate and Improve Privacy Programs

Dec. 11, 2019

How to Handle E.U. Data Subject Access Requests

Nov. 20, 2019

AI for Fund Managers and Beyond: How to Automate the Legal Department and Maintain Privacy

Oct. 30, 2019

Guide to Cybersecurity Training: Assessing Effectiveness and Avoiding Pitfalls

Oct. 30, 2019

Reconciling Technology Development, Security and the Lawyer’s Role

Oct. 16, 2019

How Uber, eBay and Pitney Bowes Built Principles-Based Global Privacy Programs

Sep. 25, 2019

Hallmarks of High-Impact Compliance Programs and Compensation Trends for Compliance Officers Who Implement Them

Sep. 11, 2019

Using “Red-Teaming” to Test and Improve Cyber Defenses

Aug. 7, 2019

How Facebook’s $5-Billion FTC Settlement Is Shaping Compliance Expectations

Aug. 7, 2019

Report Shows Strategic Buy-In From Executive Leadership Is the Key Driver of Successful Risk Mitigation

Jul. 31, 2019

The Growing Role of the Chief Data Officer: Compliance and Third Parties

Jul. 24, 2019

The Growing Role of the Chief Data Officer: Reporting Structures and Budget

Jul. 24, 2019

Privacy Officers Share Best Practices for Reporting to the Board

Jul. 17, 2019

Maine Enacts Sweeping Broadband Customer Privacy Law

Jul. 17, 2019

How to Establish an Efficient Incident Response Plan

Jul. 17, 2019

The Growing Role of the Chief Data Officer: Skill Sets, Priorities and Collaboration

Jun. 19, 2019

Tips From Lockheed and Groupon on Developing GC-CISO Partnerships to Improve Security and Incident Response

Jun. 5, 2019

Irish Data Protection Commissioner Helen Dixon on Breach Notification, the Role of the DPO and a U.S. Privacy Law

May 29, 2019

Keeping CISOs and the C-Suite Off the Witness Stand

May 15, 2019

How the World’s Most Ethical Companies Are Aligning Corporate Culture and Strategy

May 8, 2019

Making the Case for Increased Privacy Budgets Using Data and Diplomacy

May 1, 2019

Fresenius and Pearson Compliance Directors Discuss Corporate Community-Building

Apr. 24, 2019

Jeopardy, Coasters and the Behavioral Clock: Compliance Leaders at Fresenius and Pearson Discuss Effective Long- and Short-Term Initiatives

Apr. 17, 2019

GPEN Report Highlights Key Areas for Data Privacy Improvement

Apr. 3, 2019

FCA Evaluates Firms’ Cyber Resilience

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness According to Experian Survey

Mar. 20, 2019

A Quick-Start Guide to Creating a Compliance Champion Program

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 20, 2019

Fixing the Chinks in Companies’ Cyber Armor: Executives

Dec. 19, 2018

Interim Response Lessons From the Marriott Breach

Dec. 5, 2018

Insights From Uber: Building Bridges Between Legal and Engineering

Nov. 28, 2018

Insights From Uber: An Inside Look at Its Privacy Team Structure and How Legal and Tech Collaborated on Its Differential Privacy Tool

Nov. 14, 2018

How Privacy Professionals Can Benefit Cybersecurity Programs: Practical Tips From Gap and Privacy Panacea

Nov. 7, 2018

How GoDaddy Built an Effective Privacy Program

Oct. 31, 2018

IAPP-EY Annual Report Finds GDPR Compliance Strides and DPO Explosion

Oct. 10, 2018

Fifteen Tips for an Effective Cybersecurity Board Presentation

Sep. 19, 2018

Evolving Roles of Privacy and Security Professionals: Operationalizing Policies, Incident Response and Vendor Management

Sep. 12, 2018

Evolving Roles of Privacy and Security Professionals: Effective Governance and Board Reporting

Sep. 5, 2018

Evolving Roles of Privacy and Security Professionals: Examining Required Skills and Potential Convergence

Aug. 15, 2018

How to Build a Cybersecurity Culture Using People, Processes and Technology

Aug. 8, 2018

Essential Cyber, Tech and Privacy M&A Due Diligence Considerations

Jun. 13, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Three of Three)

May 9, 2018

How Financial Services Firms Should Structure Their Cybersecurity Programs

May 9, 2018

Building a Customer Privacy Program: Lessons from Dupont’s Privacy Leaders

Apr. 25, 2018

Pillars of Effective Breach Detection, Response and Remediation

Apr. 11, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Assessments and Incident Response (Part Two of Three)

Mar. 28, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: It Starts With Governance (Part One of Three)

Mar. 14, 2018

How to Handle Rising Expectations for Board Cyber Education and Involvement

Feb. 14, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part Two of Two)

Jan. 31, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part One of Two)

Dec. 20, 2017

How to Make the Most of Limited Resources When Planning the Compliance Budget

Nov. 8, 2017

Managing Data Privacy Across Multiple Jurisdictions

Nov. 8, 2017

IBM Cybersecurity Counsel Offers Techniques for Speaking the Same Language as the C-Suite When Managing Cyber Risk

Oct. 25, 2017

Advice From Recruiters on How to Attract the Best and Brightest Security and Privacy Leadership

Oct. 11, 2017

How to Successfully Incorporate the Role of the Chief Technology Officer

Sep. 27, 2017

Deloitte Survey Shows Getting Skilled Cybersecurity Talent and Addressing Cyber Threats Among the Top Challenges for Financial Institutions

Aug. 23, 2017

Tips From Google, Chase and P&G Privacy Officers on Developing Strong Privacy Leadership and When to Use Outside Counsel

Jul. 26, 2017

How the CCO Can Use SEC Guidance to Tackle Cyber Threats 

Jul. 12, 2017

A Discussion With eHarmony’s GC About the Role of In-House Counsel in Cybersecurity

Jun. 28, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part Two of Two)

Jun. 28, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part Two of Two)

Jun. 14, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part One of Two)

Jun. 14, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part One of Two)

May 17, 2017

Advice From CPOs on Nurturing Privacy Programs on Any Budget

Apr. 19, 2017

What In-House and Outside Counsel Need to Know About ACC’s First Model Cybersecurity Practices for Law Firms

Apr. 5, 2017

A Discussion With Ireland’s Data Protection Commissioner Helen Dixon About GDPR Compliance Strategies (Part Two of Two)

Mar. 22, 2017

Forensic Firms: Effective Vetting and Collaboration (Part Three of Three)

Mar. 22, 2017

A Discussion With Ireland’s Data Protection Commissioner Helen Dixon About GDPR Compliance Strategies (Part One of Two)

Mar. 8, 2017

Forensic Firms: Key Contract Considerations and Terms (Part Two of Three)

Mar. 8, 2017

Preparing For Ransomware Attacks As Part of the Board’s Fiduciary Duty

Feb. 22, 2017

Strategies for In-House Counsel Responsible for Privacy and Data Security 

Feb. 22, 2017

A CSO/GC Advises on How and When to Present Cybersecurity to the Board 

Feb. 8, 2017

Getting to Know the DPO and How to Adapt Corporate Structure to Comply With GDPR Requirements for the Role (Part Two of Two)

Jan. 25, 2017

Getting to Know the DPO and Adapting Corporate Structure to Comply With the GDPR (Part One of Two)

Jan. 11, 2017

Tech Meets Legal Spotlight: Advice on Working With Information Security

Jan. 11, 2017

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part Two of Two)

Dec. 14, 2016

Advice From Compliance Officers on Getting the C-Suite to Show You the Money for Your Data Privacy Program

Dec. 14, 2016

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part One of Two)

Nov. 30, 2016

Using a Risk Assessment as a Critical Component of a Robust Cybersecurity Program (Part Two of Two)

Nov. 16, 2016

Using a Risk Assessment as a Critical Component of a Robust Cybersecurity Program (Part One of Two)

Nov. 2, 2016

Advice From Blackstone and Tiffany CISOs on Fighting Cybercrime

Oct. 19, 2016

Privacy Leaders Share Key Considerations for Incorporating a Privacy Policy in the Corporate Culture 

Sep. 21, 2016

What Private Companies Can Learn From the OPM Data Breaches

Aug. 24, 2016

How GE’s Global CPO Approaches Shifting Regulations With Dynamic Implications 

Aug. 3, 2016

How Cyber Stakeholders Can Speak the Same Language (Part Two of Two)

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jul. 20, 2016

Challenges Facing Chief Privacy Officers

Jun. 8, 2016

What CISOs Want Lawyers to Understand About Cybersecurity

Jun. 8, 2016

Eight Attributes In-House Counsel Look For in Outside Cybersecurity Counsel

May 11, 2016

Google, CVS and the FBI Share Advice on Interacting With Law Enforcement After a Breach

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Apr. 13, 2016

A Look Inside the Cybersecurity and Privacy Law Department of a Top Defense Company

Apr. 13, 2016

Study Analyzes How Companies Can Overcome Cybersecurity Challenges and Create Business Value

Mar. 30, 2016

Steps for Companies to Take This Week, This Month and This Year to Meet the Challenges of International Cyberspace Governance

Mar. 30, 2016

In-House and Outside Counsel Offer Strategies for Navigating the TCPA, Avoiding Litigation and Responding to Breaches

Feb. 3, 2016

How In-House Counsel, Management and the Board Can Collaborate to Manage Cyber Risks and Liability (Part Two of Two) 

Jan. 20, 2016

How In-House Counsel, Management and the Board Can Collaborate to Manage Cyber Risks and Liability (Part One of Two)

Jan. 20, 2016

Defining, Documenting and Measuring Compliance Program Effectiveness

Jan. 6, 2016

How the Financial Services Sector Can Meet the Cybersecurity Challenge: A Plan for Building a Cyber-Compliance Program (Part Two of Two)

Dec. 9, 2015

The Multifaceted Role of In-House Counsel in Cybersecurity 

Nov. 25, 2015

Implementing an Effective Cloud Service Provider Compliance Program

Nov. 11, 2015

Target Privilege Decision Delivers Guidance for Post-Data Breach Internal Investigations

Oct. 14, 2015

Eight Ways Compliance Officers Can Build Relationships With the “Middle”

Aug. 12, 2015

Surveys Find Internal and Third-Party Cybersecurity Risks Among Top Executive Concerns

Aug. 12, 2015

Cybersecurity 2.0: The Role of Counsel in Addressing Destructive Cyberattacks

Jul. 29, 2015

Managing the Increased Individual Risks and Responsibilities of Compliance Officers

Jul. 15, 2015

The Challenge of Coordinating the Legal and Security Teams in the Current Cyber Landscape (Part Two of Two)

Jul. 1, 2015

Coordinating Legal and Security Teams in the Current Cybersecurity Landscape (Part One of Two)

Jul. 1, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part Two of Two)

Jun. 17, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part One of Two)

May 20, 2015

Weil Gotshal Attorneys Advise on Key Ways to Anticipate and Counter Cyber Threats

May 20, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part Two of Two)

May 6, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part One of Two)

Apr. 8, 2015

How Can a Company Mitigate Cyber Risk with Cross-Departmental Decisionmaking?

Mar. 29, 2023

Use of Alternative Data Continues to Grow, Says New Survey

Mar. 22, 2023

Managing Legal Issues Arising From Use of ChatGPT and Generative AI: Industry Considerations and Practical Compliance Measures

Mar. 8, 2023

Best Practices to Combat Surge of Unwanted Data Scraping

Mar. 8, 2023

What Employers Should Know About the FTC’s Proposed Ban on Non-Compete Provisions

Mar. 8, 2023

BIPA Decisions Expand Potential Liability: What’s Next in Illinois and Other States?

Mar. 1, 2023

The Impact of New York City’s New Wage Transparency Law on Hiring

Feb. 22, 2023

Lessons From the Multinational Takedown of Hive Ransomware: Coordination and Defensive Priorities

Feb. 15, 2023

Lessons From the Multinational Takedown of Hive Ransomware: A Broad Impact

Jan. 18, 2023

Electronic Communications, Cooperation Standards and Other Emerging Trends in the SEC’s Oversight of Private Funds

Jan. 18, 2023

A Sensitive Time for Location Data: Tips to Address New Rules and Vendor Standards

Jan. 11, 2023

A Ransomware Tabletop’s 360-Degree Incident Response View: Day Five Through Post-Mortem

Jan. 4, 2023

FTC and $391-Million State AG Case Put Location Data Enforcement on the Map

Jan. 4, 2023

A Ransomware Tabletop’s 360-Degree Incident Response View: Days One to Four

Dec. 14, 2022

Taking Compliance Policies From Dense and Dry to Effective and Engaging

Nov. 30, 2022

Navigating Evolving Social Media Risks

Nov. 16, 2022

Compliance Checklist for Consumer and Employee DSARs

Nov. 16, 2022

Ransomware Evolution: Government Efforts and Cyber Insurance

Nov. 9, 2022

Ransomware Evolution: Growing Threats and Response Considerations

Nov. 2, 2022

In New Proposal, E.U. Aims to Boost Security of Connected Devices

Oct. 26, 2022

Navigating the Interplay of Breach Response and Breach Notification

Oct. 19, 2022

GM CCO Talks Data, Culture, ESG and Scope Creep

Oct. 19, 2022

Held to Ransom: How Cyberattacks Can Become a Legal and Regulatory Odyssey for a Private Investment Fund

Oct. 5, 2022

The Great Resignation: Cyber Risks in the Crypto Sector

Sep. 21, 2022

Held to Ransom: How Cyberattacks Can Become a Legal and Regulatory Odyssey for a Private Investment Fund

Sep. 14, 2022

Shaping the BIPA Landscape: Avoiding Liability

Sep. 07, 2022

Cyber Crisis Communications – “No Comment” Is Not an Option

Aug. 10, 2022

Protecting Against Crypto Theft

Aug. 3, 2022

How to Prepare for the Cybersecurity Incident Reporting for Critical Infrastructure Act

Jul. 27, 2022

Employee Data Under the CPRA: Rights Requests, Privacy Policies and Enforcement

Jul. 27, 2022

A Checklist to Help Fund Managers Assess Their Cybersecurity Programs

Jul. 20, 2022

Employee Data Under the CPRA: Key Rights and Restrictions

Jul. 13, 2022

Handling Evolving Post-Pandemic Employee Privacy Issues

Jun. 29, 2022

Navigating the Intersection of Digital Assets and AML

Jun. 15, 2022

Behavioral Science in Compliance Programs: Learning From the Data and Changing the Perspective

Jun. 8, 2022

Behavioral Science in Compliance Programs: Concepts and Examples

Jun. 1, 2022

Tesco Is Making Big Strides With Little Learning Leaps

May 25, 2022

TV Privacy: Will the TV Industry Agree to Standardize Consent on Screen?

May 25, 2022

Ransomware and Sanctions in the Time of War

May 18, 2022

TV Privacy: Can Old Remotes Handle New Consent Requirements?

Apr. 13, 2022

Advice From a CPO on Balancing Insider Threat Management and Privacy

Apr. 6, 2022

How Colonial Pipeline Changed Advice on Ransomware Preparation and Response

Apr. 6, 2022

How to Measure Whether Your Company Is Ready to Catch Lots of Phish

Mar. 30, 2022

As Email Scams Surge, Training Lessons From 115 Million Phishing Messages

Mar. 2, 2022

Prioritizing Public-Private Partnerships in an Increasingly Complex Regulatory Environment

Feb. 16, 2022

Evolving Career Path and Rising Compensation for CISOs

Jan. 26, 2022

Lessons From SolarWinds

Jan. 12, 2022

SEC Chair Gensler’s Stance on Three Key Disclosure Areas and the Role of Individual Accountability in Enforcement Actions

Jan. 12, 2022

Cybersecurity Resolutions for 2022

Jan. 12, 2022

Ten Tips to Prepare for and Navigate Ransomware Decisions

Dec. 15, 2021

To Pay or Not to Pay? Empirical Studies Show Keys to Ransomware Decisions

Dec. 01, 2021

Former SDNY Complex Frauds and Cybercrime Unit Co-Chief Discusses Prosecution Trends and Takeaways

Nov. 10, 2021

Cyber Insurance Litigation Trends Amid Rising Ransomware Attacks

Nov. 3, 2021

In-House Insight on Handling Data Subject Access Requests Under Multiple Privacy Regimes

Oct. 13, 2021

New Pressures Shift Best Practices for Ransomware Crisis Communications

Oct. 6, 2021

How to Build Insider Risk Programs to Satisfy Global Employee Privacy Laws

Sep. 29, 2021

SEC Cybersecurity Disclosure Enforcement Heats Up: Best Practices

Sep. 29, 2021

Value of Sponsors Implementing Portfolio Monitoring Models for ESG and Cybersecurity Issues

Sep. 15, 2021

Electronic Communications: Using Third Parties for Compliance, Mitigating Social Media Risks and Fulfilling Document Requests

Sep. 8, 2021

Electronic Communications: Useful Training Techniques and Policies and Procedures to Adopt

Aug. 18, 2021

Electronic Communications: Current Technological Landscape and Relevant Regulatory Measures

Aug. 18, 2021

A Look Inside Businesses’ Private Disputes Over Ransomware Costs

Aug. 18, 2021

Post-Pandemic Workplace Vaccines and Testing Policy Checklist

Jul. 21, 2021

Understanding Common Hacking Techniques and Forensic Analysis

Jul. 21, 2021

Vaccines and Testing in the Post-Pandemic Workplace: Answers to the Tough Questions

Jul. 14, 2021

Vaccines and Testing in the Post-Pandemic Workplace: Understanding the Legal Framework and Making a Balanced Plan

Jul. 14, 2021

Tips on Building Excitement for a New Code From Oerlikon Compliance Head

Jun. 30, 2021

DOL Begins Cyber Audits to Protect U.S. Workers’ Retirement Savings

Jun. 2, 2021

Post-COVID Compliance Strategies: Dealing With Persistent Heightened Risks

May 26, 2021

Task Force Leader Addresses Proposed Mandatory Reporting of Ransomware Payments

May 26, 2021

CISA and DHS Counsel Explain Cybersecurity Executive Order’s Key Provisions

May 19, 2021

Cybersecurity in a 5G World: Tackling the Challenges With Revised Strategies

May 19, 2021

Task Force Leader Discusses How to Beat Ransomware in a Year

May 12, 2021

Cybersecurity in a 5G World: Vulnerabilities and Challenges

May 12, 2021

How Law Firms Can Prevent, Detect, and Respond to Ransomware Attacks

Apr. 7, 2021

Former Twitter and eBay Counsel Talks Overblown Fears, Third-Party Data Management, and CDA Section 230

Apr. 7, 2021

Did Clubhouse Sacrifice Privacy for Innovation? How to Find the Balance 

Mar. 31, 2021

How Do You Put a System of Controls in Place When Your Target Keeps Moving?

Mar. 24, 2021

Digital Identity Management in a Post-Pandemic World: A Framework for Identity-Centric Cybersecurity

Mar. 17, 2021

Digital Identity Management in a Post-Pandemic World: SolarWinds, Zero Trust and the Challenges Ahead

Feb. 24, 2021

Cargill Compliance Director Discusses Putting Training Data to Work

Feb. 17, 2021

A Fake Zoom Invite Hack: Eight More Lessons

Feb. 10, 2021

A Fake Zoom Invite Hack: What Happened and Three Lessons

Feb. 3, 2021

Expect Continuing Regulatory Focus on Cybersecurity and Data Protection in 2021

Feb. 3, 2021

How to Prevent and Handle Disputes Over Ransomware Insurance Claims

Jan. 13, 2021

Checklist for IoT Security Audits

Jan. 13, 2021

Cybersecurity Resolutions for 2021

Dec. 16, 2020

How Will the Biden Administration’s Approach to Cybersecurity Impact the Private Sector?

Nov. 11, 2020

The Intelligent Workplace in the Age of a Pandemic: Six Privacy and Security Safeguards

Nov. 4, 2020

A Guided Tour of Enterprise IoT Device Hazards

Oct. 28, 2020

The Intelligent Workplace in the Age of a Pandemic: Balancing Innovation and Risk

Oct. 21, 2020

Steps to Take After OFAC and FinCEN’s Warnings on Ransomware Payoffs

Oct. 14, 2020

H&M’s $41M GDPR Fine Underscores Importance of Employee Data Handling

Oct. 7, 2020

How to Address Intensifying Enterprise IoT Security Risks

Sep. 23, 2020

Identifying and Preventing Ransomware Attacks

Sep. 16, 2020

How Can Your Firm Avoid Being the Next Target of a Cultural Engineering Attack?

Sep. 16, 2020

Twelve Steps for Engaging the Board of Directors and Implementing a Long-Term Cybersecurity Plan

Sep. 9, 2020

Action Steps to Respond to Ransomware Attacks

Aug. 12, 2020

Not Just TikTok: How Companies Can Mitigate Risk of Employee Social Media Use

Jul. 29, 2020

Evolution and Mitigation of Insider Cyber Threats During COVID-19

Jul. 22, 2020

Majority of In-House Counsel Satisfied With Compensation, but Gender Gap Remains

Jul. 8, 2020

Privacy Compliant Return-to-Work Checklist

Jun. 24, 2020

Balancing Privacy Rights and Innovation in Digital Contact Tracing

Jun. 10, 2020

How Compliance Departments Are Responding to COVID‑19

Jun. 3, 2020

Re-Evaluating Cybersecurity in the Remote Work Environment

Jun. 3, 2020

How CISOs Can Use Digital Asset Metrics to Tell a Coherent Cyber Story to the Board

May 27, 2020

How to Facilitate a Safe and Privacy Compliant Return to Work: Contact Tracing

May 20, 2020

How to Facilitate a Safe and Privacy Compliant Return to Work: Policies and Protocols

May 13, 2020

How to Facilitate a Safe and Privacy Compliant Return to Work: Laws and Guidance

May 6, 2020

Managing Ransomware’s Mutation Into a Public Data Breach

Apr. 29, 2020

Understanding Insider Trading Based on Data Breaches Amidst Heightened Regulatory Scrutiny

Apr. 29, 2020

The Pandemic Effect: How Compliance and Enforcement Are Evolving

Apr. 22, 2020

Morrisons Ruling Lets U.K. Employers Off the Hook for Rogue Employee Data Leaks

Apr. 8, 2020

Wide-Ranging Lessons From Notable Breaches in Q1

Apr. 8, 2020

DOJ Guidance on How Companies Should Pursue Stolen Data on the Dark Web

Apr. 1, 2020

Investigation Strategies During Social Distancing

Mar. 25, 2020

Companywide Work From Home: Six Cybersecurity Considerations

Mar. 18, 2020

Business Considerations for Responding to the Coronavirus Outbreak

Feb. 19, 2020

Preparing for and Responding to Ransomware Attacks

Jan. 29, 2020

30 Creative Ideas for Compliance Messaging

Jan. 15, 2020

When Does Social Engineering Fraud Qualify for Insurance Coverage?

Jan. 15, 2020

How Compliance and HR Can Work Together

Dec. 18, 2019

FTC Spyware Takedown Highlights Employee Monitoring Privacy Shifts

Oct. 30, 2019

Guide to Cybersecurity Training: Assessing Effectiveness and Avoiding Pitfalls

Oct. 23, 2019

Guide to Cybersecurity Training: What to Cover and Implementation Strategies

Oct. 23, 2019

CFTC Issues $1.5-Million Fine After Phishing Attack

Oct. 16, 2019

Guide to Cybersecurity Training: Program Hallmarks and Whom to Train

Oct. 9, 2019

DOJ Spotlights Emerging Issues and Protection Strategies Around Business Email Compromise Attacks

Sep. 25, 2019

Hallmarks of High-Impact Compliance Programs and Compensation Trends for Compliance Officers Who Implement Them

Sep. 25, 2019

Strategies and Tactics for Conducting an Effective Tabletop Exercise (Part Two of Two)

Aug. 7, 2019

Report Shows Strategic Buy-In From Executive Leadership Is the Key Driver of Successful Risk Mitigation

Jul. 31, 2019

Takeaways From the U.K. ICO’s FaceApp Warning

Jun. 26, 2019

Employee Privacy and Off-Duty Conduct: Balancing Company Interests Against Employee Rights

May 15, 2019

How the World’s Most Ethical Companies Are Aligning Corporate Culture and Strategy

Apr. 24, 2019

Jeopardy, Coasters and the Behavioral Clock: Compliance Leaders at Fresenius and Pearson Discuss Effective Long- and Short-Term Initiatives

Apr. 17, 2019

GPEN Report Highlights Key Areas for Data Privacy Improvement

Apr. 17, 2019

China Establishes Certification Scheme for Mobile App Operators

Apr. 10, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Five Risk-Mitigation Strategies

Apr. 3, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Understanding the Legal Landscape

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness According to Experian Survey

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 20, 2019

Fixing the Chinks in Companies’ Cyber Armor: Executives

Feb. 13, 2019

FINRA Report Addresses Common Cybersecurity Risks and Recommends Mitigation Measures

Jan. 16, 2019

Key Cyber Threats and Targets for 2019

Dec. 5, 2018

Tips from EY’s Forensics Team on Recognizing and Preventing BEC Attacks

Dec. 5, 2018

Answers to Four Critical Questions on Privilege in Internal Investigations

Oct. 24, 2018

California Enacts Groundbreaking IoT Law and Requires Disclosure of Bot Use

Oct. 17, 2018

Risks and Rewards of Bluetooth Technology

Oct. 3, 2018

Lax Privacy Policies, Security Measures and Vendor Oversight Lead to FTC Settlement for Mobile Phone Manufacturer

Sep. 5, 2018

Twenty Steps Toward Achieving an Effective Social Media Policy

Aug. 22, 2018

Protecting Against the Security Risks of Departing Employees

Aug. 15, 2018

How to Build a Cybersecurity Culture Using People, Processes and Technology

Aug. 1, 2018

Checklist for an Effective Employee Monitoring Program

Jul. 11, 2018

Ransomware Lessons From the Trenches of the MedStar Attack

Jun. 6, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Two of Three)

May 30, 2018

Understanding the Intersection of Law and Artificial Intelligence

May 16, 2018

Crafting a Multinational Employer Social Media Policy After Cambridge Analytica

Apr. 18, 2018

Ten Common Post-Breach Public Relations Failures and How to Avoid Them

Apr. 18, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Vendors and M&A (Part Three of Three)

Mar. 28, 2018

Beware of False Friends: A Hedge Fund Manager’s Guide to Social Engineering Fraud

Mar. 28, 2018

FTC Recommends Greater Transparency, Better Recordkeeping and Further Streamlining of Mobile Security Practices

Mar. 14, 2018

FTC Enters Into Stiff Settlement With PayPal for Venmo’s Deceptive Practices, but Eases up on a 2009 Sears Order 

Mar. 14, 2018

Identifying and Preparing for Ransomware Threats (Part Two of Two)

Feb. 28, 2018

Identifying and Preparing for Ransomware Threats (Part One of Two)

Feb. 14, 2018

NY AG and HHS Flex Regulatory Muscles in Recent Protected Health Information Breach Settlements

Dec. 20, 2017

Benchmarking Employee Monitoring Policies for Practical Approaches

Oct. 11, 2017

FTC Launches Stick With Security Series, Adding Detail and Guidance to Its Start With Security Guide (Part Two of Two)

Oct. 11, 2017

Creating Tomorrow’s Code, Today: Designing an Effective Mobile-First Code of Conduct

Sep. 27, 2017

New Criteria for Employee Monitoring Practices in Light of ECHR Decision

Jul. 26, 2017

Overcoming the Challenges and Reaping the Benefits of Multi-Factor Authentication in the Financial Sector (Part One of Two)

Jul. 26, 2017

What the Financial Industry Should Know to Recognize and Combat Cyber Threats (Part One of Two)

May 31, 2017

Defending Against the Rising Threat of Ransomware in the Wake of WannaCry

May 17, 2017

Executive Order on Cybersecurity Signed Amidst Massive Worldwide Ransomware Attack

Apr. 19, 2017

Goodbye to the Blame Game: Forging the Connection Between Companies and Law Enforcement in Incident Response

Apr. 19, 2017

Effective and Compliant Employee Monitoring (Part Two of Two)

Apr. 19, 2017

The Wisdom of Planning Ahead: The Duty to Preserve Backup Tapes, Mobile Devices and Instant Messages

Apr. 5, 2017

Best Practices for Mitigating Compliance Risks When Investment Advisers Use Social Media 

Apr. 5, 2017

Effective and Compliant Employee Monitoring (Part One of Two) 

Apr. 5, 2017

Multimillion-Dollar Scheme Serves As Backdrop for Lessons on Preventing and Mitigating Phishing Attacks

Mar. 22, 2017

What It Takes to Establish Compliant Social Media Policies for the Workplace

Mar. 8, 2017

Preparing For Ransomware Attacks As Part of the Board’s Fiduciary Duty

Mar. 8, 2017

A Real-Life Scenario Offers Lessons on How to Handle a Breach From the Inside

Jan. 25, 2017

Tracking Consumer Data: DAA Guidance Applies Core Principles to Cross-Device Technology

Jan. 11, 2017

FTC Priorities for 2017 and Beyond

Jan. 11, 2017

Ten Cybersecurity Priorities for 2017

Nov. 2, 2016

Advice From Blackstone and Tiffany CISOs on Fighting Cybercrime

Oct. 19, 2016

Finding the Best Ways to Secure Digital Transactions in a Mobile World 

Oct. 19, 2016

SEC Emphasizes Protecting Information From More Than Just Cyber Threats in Deutsche Bank Case

Sep. 21, 2016

Managing Data Privacy Challenges While Conducting Due Diligence and Investigations in China (Part Two of Two)

Sep. 21, 2016

Staying Cybersecure Without Mobile Device Management

Aug. 24, 2016

Cybersecurity Due Diligence in M&A Is No Longer Optional

Aug. 3, 2016

Is Pokémon Go Pushing the Bounds of Mobile App Privacy and Security?

Aug. 3, 2016

Procedures for Hedge Fund Managers to Safeguard Trade Secrets From Rogue Employees 

Jul. 20, 2016

Using Data Analytics to Combat Internal Cyber Threats

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jul. 6, 2016

Technology Leader Discusses How to Deal With the Growing Threat of Ransomware 

May 25, 2016

Do You Know Where Your Employees Are? Tackling the Privacy and Security Challenges of Remote Working Arrangements

Apr. 27, 2016

Regulators Speak Candidly About Cybersecurity Trends, Priorities and Coordination

Apr. 27, 2016

Mitigating the Risks of Using Social Media in the Workplace

Apr. 13, 2016

The Regulators’ View of Best Practices for Social Media and Mobile Apps

Mar. 30, 2016

How Law Firms Should Strengthen Cybersecurity to Protect Themselves and Their Clients

Mar. 30, 2016

Twenty Ways a Company Can Use Behavioral Psychology to Improve Compliance

Mar. 16, 2016

Designing, Implementing and Assessing an Effective Employee Cybersecurity Training Program (Part Three of Three)

Mar. 2, 2016

Designing, Implementing and Assessing an Effective Employee Cybersecurity Training Program (Part Two of Three)

Feb. 17, 2016

Designing, Implementing and Assessing an Effective Employee Cybersecurity Training Program (Part One of Three)

Feb. 17, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part Two of Two)

Feb. 3, 2016

Minimizing Breach Damage When the Rubber Hits the Road

Feb. 3, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part One of Two)

Jan. 6, 2016

Cybersecurity and Whistleblowing Converge in a New Wave of SEC Activity

Jan. 6, 2016

Keeping Up with Technology and Regulatory Changes in Online Advertising to Mitigate Risks

Dec. 9, 2015

The Multifaceted Role of In-House Counsel in Cybersecurity 

Dec. 9, 2015

Avoiding Privacy Pitfalls While Using Social Media for Internal Investigations

Nov. 11, 2015

How to Reduce Cybersecurity Risks of Bring Your Own Device Policies (Part Two of Two)

Oct. 28, 2015

Privacy and Data Security Considerations for Life Sciences and Health Technology Companies (Part Two of Two)

Oct. 14, 2015

How to Reduce the Cybersecurity Risks of Bring Your Own Device Policies (Part One of Two)

Oct. 14, 2015

Eight Ways Compliance Officers Can Build Relationships With the “Middle”

Sep. 16, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part Two of Two)  

Aug. 26, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part One of Two)

Aug. 12, 2015

Can an Employee Be Liable for Inadvertently Providing Security Details to a Fraudulent Caller?

Aug. 12, 2015

Navigating the Evolving Mobile Arena Landscape (Part Two of Two)

Jul. 29, 2015

How to Prevent and Manage Ransomware Attacks (Part Two of Two)

Jul. 29, 2015

How to Secure Evolving Mobile Technology and the Data It Collects (Part One of Two)

Jul. 15, 2015

How to Prevent and Manage Ransomware Attacks (Part One of Two)

May 6, 2015

Top Private Practitioners and Public Officials Detail Hot Topics in Cybersecurity and Best Practices for Government Investigations

Apr. 8, 2015

Strategies for Preventing and Handling Cybersecurity Threats from Employees

Mar. 1, 2023

The Impact of New York City’s New Wage Transparency Law on Hiring

Mar. 1, 2023

Getting Used to Zero Trust? Meet Zero Copy

Feb. 22, 2023

Lessons From the Multinational Takedown of Hive Ransomware: Coordination and Defensive Priorities

Feb. 15, 2023

Advice From a CISO and Lawyer on Best Practices in Information and Data Governance

Feb. 15, 2023

Lessons From the Multinational Takedown of Hive Ransomware: A Broad Impact

Feb. 15, 2023

Impact of Emerging Technologies on Financial Crime Risk Management

Feb. 8, 2023

AI Governance Gets Real: Core Compliance Strategies

Feb. 1, 2023

AI Governance Gets Real: Tips From a Chat Platform on Building a Program

Jan. 11, 2023

Ten Cybersecurity Resolutions for Financial Services Firms in 2023

Jan. 11, 2023

Something’s Gotta Give: Navigating Auditor Inquiries in Investigations (Part Two of Two)

Jan. 4, 2023

Something’s Gotta Give: Navigating Auditor Inquiries in Investigations (Part One of Two)

Dec. 14, 2022

Taking Compliance Policies From Dense and Dry to Effective and Engaging

Dec. 7, 2022

How Lawyers Can Leverage the Shifting Environment to Enhance Compliance Programs

Dec. 7, 2022

Google Settlement Shows DOJ's Increased Focus on Data Preservation

Oct. 19, 2022

A New Era of Cyber Incident Reporting and Cybersecurity Regulation: How Companies Should Prepare and Engage

Oct. 12, 2022

A New Era of Cyber Incident Reporting and Cybersecurity Regulation: Key Provisions

Oct. 5, 2022

The Great Resignation: Cyber Risks in the Crypto Sector

Sep. 28, 2022

The Increasing Threat of Supply Chain Cyberattacks: How to Avoid Being a Statistic

Sep. 28, 2022

Using Software Bills of Materials to Bolster Security in Contracting

Sep. 14, 2022

Robinhood Resolution a First for Cryptocurrency Enforcement in NY

Sep. 07, 2022

Cyber Crisis Communications – “No Comment” Is Not an Option

Sep. 07, 2022

Four Steps to Secure Open-Source Software After CSRB’s Log4j Investigation

Aug. 17, 2022

SEC Cyber Rules: How to Prepare for the New 10-K Disclosure Mandates

Aug. 10, 2022

SEC Cyber Rules: How to Prepare for the New 8-K Incident Mandate

Jul. 27, 2022

Designing a Privacy Center to Build Trust and Facilitate Business Growth

Jul. 20, 2022

Corporate Compliance and Enforcement Hot Topics With IBM VP Una Dean

Jul. 13, 2022

New AI Rules: Five Compliance Takeaways

Jul. 13, 2022

Handling Evolving Post-Pandemic Employee Privacy Issues

Jun. 22, 2022

New AI Rules: States Require Notice and Records, Feds Urge Monitoring and Vetting

Jun. 15, 2022

New AI Rules: NYC First to Mandate Audit

Jun. 15, 2022

Behavioral Science in Compliance Programs: Learning From the Data and Changing the Perspective

Jun. 8, 2022

Behavioral Science in Compliance Programs: Concepts and Examples

Jun. 1, 2022

Roadmap for Building an Efficient Global Privacy Program: Maintenance

May 18, 2022

Roadmap for Building an Efficient Global Privacy Program: Buy-In, Scalability and Outside Resources

May 18, 2022

Navigating the Intersection of Blockchain and Data Privacy Laws

May 11, 2022

Roadmap for Building an Efficient Global Privacy Program: Scope and Prioritization

May 4, 2022

Cybersecurity and Privacy Teams Join to Create Data Governance Councils

May 4, 2022

Roadmap for Building an Efficient Global Privacy Program: Organizational Structure

Apr. 20, 2022

GCs Discuss Crisis Management, Investigations, Individual Accountability and ESG

Apr. 6, 2022

How to Measure Whether Your Company Is Ready to Catch Lots of Phish

Mar. 30, 2022

The Parallels and Distinctions Between Investigations and Culture Reviews

Mar. 30, 2022

Drafting Data and Cybersecurity Provisions in Third-Party Vendor Agreements

Mar. 30, 2022

As Email Scams Surge, Training Lessons From 115 Million Phishing Messages

Mar. 16, 2022

Securing Emerging Technologies Without Hampering Innovation: Government Initiatives and How Companies Can Adapt

Mar. 9, 2022

Examining the Burdens and Benefits of a Remote Regulatory Environment

Mar. 9, 2022

Securing Emerging Technologies Without Hampering Innovation: Private Sector Challenges

Mar. 2, 2022

Prioritizing Public-Private Partnerships in an Increasingly Complex Regulatory Environment

Feb. 23, 2022

Ad Industry’s Third-Party Data Use Grew Despite Impending Cookie Shutdown

Feb. 16, 2022

Evolving Career Path and Rising Compensation for CISOs

Feb. 9, 2022

Leveraging Partnerships to Operationalize Privacy Programs

Jan. 26, 2022

Lessons From SolarWinds

Jan. 26, 2022

Personal Liability and Compliance Resourcing Are Top Concerns Among CCOs, Surveys Show

Jan. 19, 2022

Privacy Resolutions for 2022

Jan. 12, 2022

Cybersecurity Resolutions for 2022

Jan. 12, 2022

Ten Tips to Prepare for and Navigate Ransomware Decisions

Jan. 5, 2022

A Guide to Privacy Frameworks: Implementation and Maintenance

Jan. 5, 2022

Using Technology to Build in Data Governance for Improved Security and Privacy

Dec. 15, 2021

A Guide to Privacy Frameworks: Finding the Best Fit

Dec. 15, 2021

To Pay or Not to Pay? Empirical Studies Show Keys to Ransomware Decisions

Dec. 15, 2021

Understanding Differential Privacy

Dec. 8, 2021

A Guide to Privacy Frameworks: Examining Options

Dec. 8, 2021

Managing Compliance Scope Creep

Dec. 8, 2021

Privacy Tech Products Hold Promise but Sector Faces Hurdles

Nov. 17, 2021

Data Localization: Cybersecurity Challenges Abound

Nov. 17, 2021

Practical Approaches to Conducting Transfer Impact Assessments Under the GDPR

Nov. 10, 2021

How In-House Expertise Can Help Outside Counsel

Nov. 10, 2021

Data Localization: New Compliance Headaches and Costs Across the Globe

Nov. 3, 2021

Data Localization: Laws Spread and Enforcement Rises

Oct. 27, 2021

IOSCO Issues Final Guidance on AI and Machine Learning

Oct. 20, 2021

U.K. Data Privacy Officers Discuss Challenges and Concerns

Oct. 13, 2021

New Pressures Shift Best Practices for Ransomware Crisis Communications

Oct. 6, 2021

Lessons From HPE’s Anti-Corruption Purchase Order Analytics on the Role for Humans in Data Interpretation

Sep. 22, 2021

Examining the Intersection of Voiceprints and Data Privacy Laws

Sep. 8, 2021

Imperva’s Global Data Privacy Officer Discusses Privacy by Design

Jul. 14, 2021

Tips on Building Excitement for a New Code From Oerlikon Compliance Head

Jun. 23, 2021

How the NYDFS Drives Cybersecurity in the Financial Services Industry

Jun. 16, 2021

Leveraging Policies and Culture: A Recipe for Success

Jun. 9, 2021

Post-COVID Compliance Strategies: White Collar Investigations and Enforcement

Jun. 2, 2021

Post-COVID Compliance Strategies: Dealing With Persistent Heightened Risks

Jun. 2, 2021

AI Compliance Playbook: Adapting the Three Lines Framework for AI Innovations

May 26, 2021

CISA and DHS Counsel Explain Cybersecurity Executive Order’s Key Provisions

May 5, 2021

Doing More With Less: Tools for Managing Third-Party Risk With Scarce Resources

May 5, 2021

Balancing Legalese and Simplicity in Modern Privacy Policies

Apr. 28, 2021

First 100 Days As GC/CCO: Managing Daily Work, Performing Risk Assessments and Looking Ahead

Apr. 28, 2021

AI Compliance Playbook: Understanding Algorithm Audits

Apr. 28, 2021

Implementing NSA-CISA-FBI Advisory Mitigation Tactics for Vulnerabilities Exploited by Russia

Apr. 21, 2021

First 100 Days As GC/CCO: Developing Knowledge and Forging Key Relationships

Apr. 21, 2021

AI Compliance Playbook: Seven Questions to Ask Before Regulators or Reporters Do

Apr. 14, 2021

First 100 Days As GC/CCO: Preparing for the Role and Setting the Tone

Apr. 14, 2021

Advice From CISOs on How to Succeed in the Role

Apr. 14, 2021

AI Compliance Playbook: Traditional Risk Controls for Cutting-Edge Algorithms

Apr. 7, 2021

Former Twitter and eBay Counsel Talks Overblown Fears, Third-Party Data Management, and CDA Section 230

Mar. 31, 2021

How Do You Put a System of Controls in Place When Your Target Keeps Moving?

Mar. 3, 2021

Preserving the Privilege for In-House Counsel: Internal Investigations and Depositions

Feb. 24, 2021

Cargill Compliance Director Discusses Putting Training Data to Work

Feb. 17, 2021

Wray Highlights Benefits of FBI Coordination With Public and Private Sectors

Feb. 3, 2021

Expect Continuing Regulatory Focus on Cybersecurity and Data Protection in 2021

Jan. 20, 2021

eDiscovery in Multi-Jurisdictional Investigations: Preparing to Play Multi-Level Chess

Jan. 20, 2021

Privacy Resolutions for 2021

Jan. 13, 2021

Cybersecurity Resolutions for 2021

Jan. 13, 2021

Can the Cybersecurity Industry Improve Cooperation to Beat Threats?

Jan. 6, 2021

Privacy and Security Risks in International Arbitration: Managing Remote Proceedings

Jan. 6, 2021

Maintaining Privacy While Staying Competitive in an Evolving Regulatory Landscape

Jan. 6, 2021

Six Practical Tips for Building an Effective Privacy Risk Assessment Program

Dec. 16, 2020

AI for Compliance: Building a Model

Dec. 16, 2020

How Will the Biden Administration’s Approach to Cybersecurity Impact the Private Sector?

Dec. 16, 2020

Privacy and Security Risks in International Arbitration: Threats and the Information Security Protocol

Dec. 2, 2020

How CCOs Can Avoid Personal Liability for an Organization’s Compliance Failures

Nov. 11, 2020

AI for Compliance: Foundations

Oct. 21, 2020

How Lockheed Uses Big Data to Evaluate Risk at Small Worksites

Oct. 7, 2020

Tips and New Benchmarks for Creating Effective Tabletop Exercises

Sep. 16, 2020

Four Principles Underlying Microsoft’s Compliance Analytics Program

Sep. 16, 2020

Twelve Steps for Engaging the Board of Directors and Implementing a Long-Term Cybersecurity Plan

Sep. 9, 2020

IOSCO Offers Six Risk Mitigation Measures for AI and Machine Learning

Sep. 2, 2020

Business Continuity Plans, Budgets and More: Hot Compliance Topics for Investment Advisers

Aug. 5, 2020

How to Achieve Trustworthy AI Using the European Commission’s Final Assessment List

Jul. 29, 2020

Evolution and Mitigation of Insider Cyber Threats During COVID-19

Jul. 29, 2020

Remote Forensic Data Collection Steps Into the Spotlight

Jul. 22, 2020

Majority of In-House Counsel Satisfied With Compensation, but Gender Gap Remains

Jul. 22, 2020

Business Continuity Planning: Key Provisions and Third-Party Considerations

Jul. 15, 2020

Business Continuity Planning: How to Update a BCP With Lessons Learned From the Pandemic

Jul. 8, 2020

Getting Board Buy-In for Edge Cybersecurity Initiatives Post COVID‑19

Jun. 24, 2020

Perspectives From the Public and Private Sectors on Information Sharing During COVID-19

Jun. 3, 2020

How CISOs Can Use Digital Asset Metrics to Tell a Coherent Cyber Story to the Board

Jun. 3, 2020

Preserving Privilege in Audits and Internal Investigations

May 27, 2020

Insights on Building a Compliance Program at a New Company

May 13, 2020

NIST Privacy Framework: Privacy Controls for an Era of Digital Transformation

May 6, 2020

How Asset Managers and Others Can Mitigate Pandemic-Related Operational Risks and Maintain Business Continuity

May 6, 2020

NIST Privacy Framework: Insights on New Tool for Managing Privacy Risks

Apr. 29, 2020

The Pandemic Effect: How Compliance and Enforcement Are Evolving

Apr. 15, 2020

Report on CCO Liability Calls for More Regulatory Cooperation

Apr. 1, 2020

When Do Force Majeure Clauses Excuse Performance?

Apr. 1, 2020

Investigation Strategies During Social Distancing

Mar. 25, 2020

Companywide Work From Home: Six Cybersecurity Considerations

Mar. 18, 2020

Business Considerations for Responding to the Coronavirus Outbreak

Mar. 18, 2020

The Ongoing Complexity of Vendor Risk: Top 5 Considerations for C-Level Leaders

Mar. 11, 2020

NIST’s New IoT Standard: Inspiring a Wave of New Device Security Guidance

Mar. 4, 2020

NIST’s New IoT Standard: Boosting Security As States Launch Laws

Feb. 26, 2020

Eleven Key Components of an Effective Privacy Program

Feb. 26, 2020

Tips From Ponemon/Experian Survey on Building an Incident Response Plan That Fosters Confidence

Feb. 12, 2020

Compliance Records Are a Strategic Gold Mine

Feb. 5, 2020

Defining, Implementing and Documenting “Reasonable Security”

Jan. 29, 2020

30 Creative Ideas for Compliance Messaging

Jan. 15, 2020

How Compliance and HR Can Work Together

Jan. 8, 2020

How eBay and PayPal Use Key Performance Indicators to Evaluate and Improve Privacy Programs

Dec. 11, 2019

Not Just GDPR: Examining the Other European Privacy Laws 

Dec. 11, 2019

How to Handle E.U. Data Subject Access Requests

Dec. 4, 2019

U.K. and U.S. Sign First E-Evidence Pact Under the CLOUD Act: A Look at the Privacy Protections

Nov. 20, 2019

AI for Fund Managers and Beyond: How to Automate the Legal Department and Maintain Privacy

Nov. 13, 2019

AI for Fund Managers and Beyond: Government Guidance

Nov. 6, 2019

AI for Fund Managers and Beyond: How to Use It to Streamline Operations

Oct. 16, 2019

How Uber, eBay and Pitney Bowes Built Principles-Based Global Privacy Programs

Oct. 2, 2019

Preserving Customer Goodwill After a Breach

Oct. 2, 2019

CCPA Close-Up: Review of Amendments and How to Prepare for Compliance

Sep. 25, 2019

Hallmarks of High-Impact Compliance Programs and Compensation Trends for Compliance Officers Who Implement Them

Aug. 14, 2019

Report Weighs In on Understanding and Mitigating Rising Data Breach Costs

Aug. 7, 2019

Report Shows Strategic Buy-In From Executive Leadership Is the Key Driver of Successful Risk Mitigation

Aug. 7, 2019

Lessons From SDNY Ruling on How to Preserve Privileged Communications With Attorney Consultants

Jul. 31, 2019

The Growing Role of the Chief Data Officer: Compliance and Third Parties

Jul. 24, 2019

The Growing Role of the Chief Data Officer: Reporting Structures and Budget

Jul. 17, 2019

The Growing Role of the Chief Data Officer: Skill Sets, Priorities and Collaboration

Jul. 17, 2019

Maine Enacts Sweeping Broadband Customer Privacy Law

Jun. 19, 2019

Tips From Lockheed and Groupon on Developing GC-CISO Partnerships to Improve Security and Incident Response

Jun. 12, 2019

CCPA Priorities: Tackling Data Subject Rights Requests and Vendors

Jun. 5, 2019

CCPA Priorities: Turning Legislation Prep Into a Program Shift

May 22, 2019

Social Engineering, Attacks on Cloud-Based Email on the Rise, Verizon Data Breach Report Finds

May 15, 2019

What Does It Mean to Be Technologically Competent?

May 15, 2019

How the World’s Most Ethical Companies Are Aligning Corporate Culture and Strategy

May 8, 2019

Making the Case for Increased Privacy Budgets Using Data and Diplomacy

May 1, 2019

Fresenius and Pearson Compliance Directors Discuss Corporate Community-Building

Apr. 24, 2019

Jeopardy, Coasters and the Behavioral Clock: Compliance Leaders at Fresenius and Pearson Discuss Effective Long- and Short-Term Initiatives

Apr. 17, 2019

GPEN Report Highlights Key Areas for Data Privacy Improvement

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness According to Experian Survey

Mar. 20, 2019

A Quick-Start Guide to Creating a Compliance Champion Program

Mar. 6, 2019

Preparing for the CCPA: Best Practices and Understanding Enforcement

Feb. 27, 2019

Preserving Privilege in Communications Involving In-House Counsel

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 13, 2019

FINRA Report Addresses Common Cybersecurity Risks and Recommends Mitigation Measures

Jan. 16, 2019

GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part Two of Two)

Jan. 16, 2019

How a New Ethics Rule and Error in Manafort Case Highlight the Importance of Lawyers’ Technology Competence

Jan. 9, 2019

GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part One of Two)

Jan. 9, 2019

Ten Cyber and Privacy Resolutions for the New Year

Dec. 19, 2018

Ten Steps for Effective Crisis Communications

Dec. 19, 2018

Ponemon Report Cites Third-Party Risk Management Shortfalls and Offers Best Practices

Dec. 5, 2018

Answers to Four Critical Questions on Privilege in Internal Investigations

Nov. 14, 2018

How Privacy Professionals Can Benefit Cybersecurity Programs: Practical Tips From Gap and Privacy Panacea

Nov. 14, 2018

A Roadmap to Preparing for and Managing a Cyber Investigation

Nov. 7, 2018

How GoDaddy Built an Effective Privacy Program

Oct. 10, 2018

Fifteen Tips for an Effective Cybersecurity Board Presentation

Sep. 12, 2018

Information Sharing in the Private Sector: Lessons From the Financial Services Industry

Aug. 22, 2018

How to Maximize a Cybersecurity Budget in a Time of Change

Aug. 22, 2018

Protecting Against the Security Risks of Departing Employees

Aug. 15, 2018

How to Build a Cybersecurity Culture Using People, Processes and Technology

Aug. 8, 2018

Essential Cyber, Tech and Privacy M&A Due Diligence Considerations

Jul. 25, 2018

GDPR Essentials for the Financial Sector: Staying Compliant and Special Challenges (Part Three of Three)

Jul. 25, 2018

Companies Face Increasing Cost of a Data Breach and an Inability to Detect Incidents Promptly, Surveys Show

Jul. 18, 2018

GDPR Essentials for the Financial Sector: Compliance Steps (Part Two of Three)

Jul. 18, 2018

Overcoming Barriers to Cross-Border Data Flows, Contract Provisions and Other Digital Transformation Issues

Jul. 11, 2018

GDPR Essentials for the Financial Sector: Benchmarking and Assessing the Risks (Part One of Three)

Jun. 20, 2018

Managing Cyber Investigations: A CISO and In-House Counsel Discuss Best Practices for Real-Life Scenarios

Jun. 6, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Two of Three)

Jun. 6, 2018

Analyzing New and Amended State Breach Notification Laws

May 30, 2018

Understanding the Intersection of Law and Artificial Intelligence

May 9, 2018

How Financial Services Firms Should Structure Their Cybersecurity Programs

May 2, 2018

Lessons on Litigation Privilege in Internal Investigations from the U.K.’s Bilta v. Royal Bank of Scotland Case

Apr. 18, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Vendors and M&A (Part Three of Three)

Apr. 11, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Assessments and Incident Response (Part Two of Three)

Mar. 28, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: It Starts With Governance (Part One of Three)

Mar. 28, 2018

EY Global Data Analytics Survey Finds Lack of GDPR Preparedness and Need for Cross-Functional Collaboration

Mar. 14, 2018

How Will the GDPR Affect Due Diligence?

Feb. 28, 2018

Financial Firms Must Supervise Their IT Providers to Avoid CFTC Enforcement Action

Jan. 31, 2018

Five Strategies a Privacy Attorney Uses to Bridge the Gap With Tech Teams

Jan. 17, 2018

Ten Cybersecurity Resolutions for 2018

Jan. 17, 2018

NIST Program Manager Explains Pending Changes to Its Cybersecurity Framework

Dec. 20, 2017

Benchmarking Employee Monitoring Policies for Practical Approaches

Dec. 20, 2017

How to Make the Most of Limited Resources When Planning the Compliance Budget

Dec. 6, 2017

Gathering and Analyzing Compliance Data

Nov. 8, 2017

Managing Data Privacy Across Multiple Jurisdictions

Nov. 8, 2017

How to Mitigate the Risks of Open-Source Software (Part Two of Two)

Nov. 8, 2017

IBM Cybersecurity Counsel Offers Techniques for Speaking the Same Language as the C-Suite When Managing Cyber Risk

Oct. 11, 2017

FTC Launches Stick With Security Series, Adding Detail and Guidance to Its Start With Security Guide (Part Two of Two)

Sep. 27, 2017

Deloitte Survey Shows Getting Skilled Cybersecurity Talent and Addressing Cyber Threats Among the Top Challenges for Financial Institutions

Sep. 27, 2017

Audit of Websites’ Security, Privacy and Consumer Practices Reveals Deficiencies Despite Overall Progress

Aug. 23, 2017

Tips From Google, Chase and P&G Privacy Officers on Developing Strong Privacy Leadership and When to Use Outside Counsel

Aug. 23, 2017

SEC Report Cites Cybersecurity Progress Along With Gaps in Training and Compliance

Aug. 9, 2017

What the Financial Sector Should Know to Recognize and Combat Cyber Threats (Part Two of Two)

Jul. 26, 2017

How the CCO Can Use SEC Guidance to Tackle Cyber Threats 

Jul. 12, 2017

A Discussion With eHarmony’s GC About the Role of In-House Counsel in Cybersecurity

Jul. 12, 2017

How Small Businesses Can Maximize Cybersecurity Protections and Prioritize Their Spending

Jun. 28, 2017

Surveys Show Cyber Risk Remains High for Financial Services Despite Preventative Steps

Jun. 28, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part Two of Two)

Jun. 28, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part Two of Two)

Jun. 14, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part One of Two)

Jun. 14, 2017

How Internal Audit Can Improve Cybersecurity 

Jun. 14, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part One of Two)

May 31, 2017

One Year Until GDPR Enforcement: Five Steps Companies Should Take Now

May 31, 2017

Using Big Data Legally and Ethically While Leveraging Its Value (Part Two of Two)

May 31, 2017

Advice on Incorporating Cybersecurity in eDiscovery

May 31, 2017

Defending Against the Rising Threat of Ransomware in the Wake of WannaCry

May 17, 2017

Advice From CPOs on Nurturing Privacy Programs on Any Budget

May 17, 2017

Using Big Data Legally and Ethically While Leveraging Its Value (Part One of Two)

May 3, 2017

Compliance Implications of Brexit 

May 3, 2017

Infrastructure Cybersecurity Challenges: A View Through the Oil and Gas Pipeline Lens

Apr. 19, 2017

Effective and Compliant Employee Monitoring (Part Two of Two)

Apr. 19, 2017

How to Ensure Cyber Risks Do Not Derail an IPO

Apr. 5, 2017

Effective and Compliant Employee Monitoring (Part One of Two) 

Mar. 22, 2017

Forensic Firms: Effective Vetting and Collaboration (Part Three of Three)

Mar. 8, 2017

Preparing For Ransomware Attacks As Part of the Board’s Fiduciary Duty

Mar. 8, 2017

Forensic Firms: Key Contract Considerations and Terms (Part Two of Three)

Feb. 22, 2017

Forensic Firms: Understanding and Leveraging Their Expertise From the Start (Part One of Three)

Feb. 22, 2017

Strategies for In-House Counsel Responsible for Privacy and Data Security 

Feb. 8, 2017

Protecting Attorney-Client Privilege and Attorney Work Product While Cooperating With the Government: Establishing Privilege and Work Product in an Investigation (Part One of Three)

Feb. 8, 2017

Getting to Know the DPO and How to Adapt Corporate Structure to Comply With GDPR Requirements for the Role (Part Two of Two)

Jan. 25, 2017

Triaging Security Projects in the Current Legal Landscape

Jan. 25, 2017

Getting to Know the DPO and Adapting Corporate Structure to Comply With the GDPR (Part One of Two)

Jan. 11, 2017

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part Two of Two)

Jan. 11, 2017

Tech Meets Legal Spotlight: Advice on Working With Information Security

Jan. 11, 2017

Ten Cybersecurity Priorities for 2017

Dec. 14, 2016

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part One of Two)

Dec. 14, 2016

Advice From Compliance Officers on Getting the C-Suite to Show You the Money for Your Data Privacy Program

Dec. 14, 2016

Presidential Commission Recommends Ways For Public and Private Sectors to Improve Cybersecurity 

Nov. 30, 2016

Using a Risk Assessment as a Critical Component of a Robust Cybersecurity Program (Part Two of Two)

Nov. 16, 2016

WilmerHale Attorneys Explain the Evolving Cybersecurity Environment of the Energy Sector

Nov. 16, 2016

Increasing Role of Counsel Among Operational Shifts Highlighted by Cyber Risk Management Survey

Nov. 2, 2016

FBI Veteran Discusses Using Law Enforcement’s Cyber Resources to Improve Security and Obtain Board Buy-In

Nov. 2, 2016

Guide to Getting Your Security Program Certified Under ISO 27001

Oct. 5, 2016

Examining Newly Released Privacy and Security Guidance for the Fast-Driving Development of Autonomous Cars

Oct. 19, 2016

Taking Action to Refocus on Security: Conversation With a CIO 

Oct. 19, 2016

Demystifying the FTC’s Reasonableness Requirement in the Context of the NIST Cybersecurity Framework (Part One of Two)

Oct. 19, 2016

Privacy Leaders Share Key Considerations for Incorporating a Privacy Policy in the Corporate Culture 

Oct. 5, 2016

ISAO Organization Releases a Roadmap to Cyber Threat Information Sharing 

Sep. 21, 2016

Managing Data Privacy Challenges While Conducting Due Diligence and Investigations in China (Part Two of Two)

Sep. 21, 2016

Seven Overlooked Business Costs of a Cyber Breach and Strategies for Avoiding Them

Sep. 21, 2016

What Private Companies Can Learn From the OPM Data Breaches

Sep. 7, 2016

Navigating Online Identity Management’s Risks and Regulations

Sep. 7, 2016

Using Information Sharing to Combat Cyber Crime While Protecting Privacy 

Sep. 7, 2016

Understanding Data Privacy and Cybersecurity in China (Part One of Two)

Aug. 24, 2016

Fulfilling the Ethical Duty of Technology Competence for Attorneys

Aug. 24, 2016

How GE’s Global CPO Approaches Shifting Regulations With Dynamic Implications 

Aug. 3, 2016

Six State Secrets and Data Privacy Considerations in Chinese Internal Investigations 

Aug. 3, 2016

How Cyber Stakeholders Can Speak the Same Language (Part Two of Two)

Jul. 20, 2016

How the Financial Services Industry Can Manage Cyber Risk

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jul. 20, 2016

Challenges Facing Chief Privacy Officers

Jul. 6, 2016

Understanding the Far-Reaching Impact of Chinese State Secrets Laws on Data Flow 

Jul. 6, 2016

Law Enforcement on Cybersecurity Matters: Corporate Friend or Foe? (Part Two of Two)

Jun. 22, 2016

How to Avoid Common Mistakes and Manage the First 48 Hours Post-Breach

Jun. 22, 2016

Law Enforcement on Cybersecurity Matters: Corporate Friend or Foe? (Part One of Two)

Jun. 8, 2016

Minimizing Class Action Risk in Breach Response

Jun. 8, 2016

Foreign Business Chambers Sign Open Letter Against Chinese Cybersecurity Regulatory Changes

Jun. 8, 2016

Eight Attributes In-House Counsel Look For in Outside Cybersecurity Counsel

May 25, 2016

Do You Know Where Your Employees Are? Tackling the Privacy and Security Challenges of Remote Working Arrangements

May 25, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: Does Your Plan Work? (Part Three of Three)

May 11, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: Seven Key Components (Part Two of Three)

May 11, 2016

Google, CVS and the FBI Share Advice on Interacting With Law Enforcement After a Breach

Apr. 27, 2016

Regulators Speak Candidly About Cybersecurity Trends, Priorities and Coordination

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Apr. 13, 2016

Study Analyzes How Companies Can Overcome Cybersecurity Challenges and Create Business Value

Apr. 13, 2016

A Look Inside the Cybersecurity and Privacy Law Department of a Top Defense Company

Mar. 30, 2016

Steps for Companies to Take This Week, This Month and This Year to Meet the Challenges of International Cyberspace Governance

Mar. 30, 2016

Twenty Ways a Company Can Use Behavioral Psychology to Improve Compliance

Mar. 30, 2016

How Law Firms Should Strengthen Cybersecurity to Protect Themselves and Their Clients

Mar. 16, 2016

CSIS’ James Lewis Discusses Balancing Law Enforcement and Privacy

Mar. 2, 2016

Implementing a Privacy by Design Program to Protect Corporate and Consumer Information

Mar. 2, 2016

How the American Energy Industry Approaches Security and Emphasizes Information Sharing

Feb. 17, 2016

Cybersecurity Preparedness Is Now a Business Requirement

Jan. 20, 2016

Defining, Documenting and Measuring Compliance Program Effectiveness

Jan. 20, 2016

How In-House Counsel, Management and the Board Can Collaborate to Manage Cyber Risks and Liability (Part One of Two)

Jan. 6, 2016

Opportunities and Challenges of the Long-Awaited Cybersecurity Act of 2015

Jan. 6, 2016

How the Financial Services Sector Can Meet the Cybersecurity Challenge: A Plan for Building a Cyber-Compliance Program (Part Two of Two)

Dec. 9, 2015

Avoiding Privacy Pitfalls While Using Social Media for Internal Investigations

Dec. 9, 2015

The Multifaceted Role of In-House Counsel in Cybersecurity 

Dec. 9, 2015

Building a Strong Cyber Insurance Policy to Weather the Potential Storm (Part Two of Two)

Dec. 9, 2015

Proactive Steps to Protect Your Company in Anticipation of Future Data Security Litigation (Part Two of Two)

Nov. 25, 2015

Building a Strong Cyber Insurance Policy to Weather the Potential Storm (Part One of Two)

Nov. 25, 2015

Proactive Steps to Protect Your Company in Anticipation of Future Data Security Litigation (Part One of Two)

Nov. 11, 2015

What Companies Can Learn from Cybersecurity Resources in Pittsburgh

Nov. 11, 2015

Target Privilege Decision Delivers Guidance for Post-Data Breach Internal Investigations

Oct. 28, 2015

Mastercard and U.S. Bancorp Execs Share Tips for Awareness and Prevention of Mushrooming Cyber Risk (Part Two of Two)

Oct. 14, 2015

Energy Industry Demonstrates Public-Private Cybersecurity Coordination

Oct. 14, 2015

Eight Ways Compliance Officers Can Build Relationships With the “Middle”

Sep. 30, 2015

Protecting and Enforcing Trade Secrets in a Digital World

Sep. 30, 2015

Protecting the Crown Jewels Using People, Processes and Technology 

Sep. 16, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part Two of Two)  

Sep. 16, 2015

How the Legal Industry Is Sharing Information to Combat Cyber Threats

Aug. 26, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part One of Two)

Aug. 12, 2015

How the Hospitality Industry Confronts Cybersecurity Threats that Never Take Vacations

Jul. 29, 2015

Analyzing and Complying with Cyber Law from Different Vantage Points (Part Two of Two)

Jul. 29, 2015

How to Prevent and Manage Ransomware Attacks (Part Two of Two)

Jul. 1, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part Two of Two)

Jul. 1, 2015

SEC Commissioner Says Public-Private Partnership Is Key to Effective Cybersecurity

Jun. 17, 2015

In a Candid Conversation, FBI Director James Comey Discusses Cooperation among Domestic and International Cybersecurity Law Enforcement Communities (Part Two of Two)

Jun. 17, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part One of Two)

Jun. 3, 2015

Private and Public Sector Perspectives on Producing Data to the Government

Jun. 3, 2015

In a Candid Conversation, FBI Director James Comey Talks About the “Evil Layer Cake” of Cybersecurity Threats (Part One of Two)

May 20, 2015

DOJ Encourages Cyber Incident Reporting and Advance Planning with Best Practices Guidance

May 20, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part Two of Two)

May 20, 2015

Weil Gotshal Attorneys Advise on Key Ways to Anticipate and Counter Cyber Threats

May 6, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part One of Two)

Apr. 22, 2015

Shifting to Holistic Information Governance and Managing Information as an Asset

Apr. 8, 2015

How Can a Company Mitigate Cyber Risk with Cross-Departmental Decisionmaking?

Apr. 8, 2015

Ten Actions for Effective Data Risk Management

Most-Read Articles

  • Mar. 15, 2023
    Managing Legal Issues Arising From Use of ChatGPT and Generative AI: E.U. and U.S. Privacy Law Considerations
    • Artificial Intelligence
  • Mar. 22, 2023
    Managing Legal Issues Arising From Use of ChatGPT and Generative AI: Industry Considerations and Practical Compliance Measures
    • Artificial Intelligence
  • Mar. 8, 2023
    BIPA Decisions Expand Potential Liability: What’s Next in Illinois and Other States?
    • Biometrics
  • Mar. 8, 2023
    Best Practices to Combat Surge of Unwanted Data Scraping
    • Big Data
  • Feb. 1, 2023
    AI Governance Gets Real: Tips From a Chat Platform on Building a Program
    • Artificial Intelligence

Spotlight on Trailblazing Women

 In honor of International Women’s Day, some of ION Analytics' editorial teams led by women interviewed notable women in the markets and industries we cover. In this part, Jill Abitbol and Rebecca Hughes Parker shined a spotlight on notable women in compliance and hedge fund, data privacy and cybersecurity, and anti-corruption law, including Amii Barnard-Bahn, Abigail Bell, Genna Garver, Jane Horvath, Barbara Li, Amy Mushahwar, Mara Senn and Carol Widger. The interviews are here.

 


Webinar on Compliant International Data Transfers

Listen here to our discussion with our colleagues at Ethos Privacy, which took place on March 1, 2022, on how to approach international data transfer challenges. 

  • Privacy Policy
  • Terms of Use
  • About Us

© 2023 Mergermarket Limited. All rights reserved.

Sign inFree trialForgot password ×

Sorry, we do not recognise the username and password combination you have entered.

Please ensure you have typed your email address correctly and remember that passwords are case sensitive.

You are logged into a maximum of three different browsers/devices.

Please log in with one previously used and go to My Account to manage the browsers/devices you are using.

Forgotten password? Request Details


Not a user? Get a free trial

Thank you.

A reset link has been sent to the email address provided.

Please be aware that the time taken for mail to be delivered is dependent upon your Internet Service Provider. It should normally arrive within 5-15 minutes.

Request Details

Sorry, this email address is not recognised on our system




Thank you, we'll contact you about your trial