• Search for " " on Law Report Group

    HOME

    TOPICS

    ABOUT US

  • |
  • Home
  • Topics A-Z
  • Regulations & Enforcement
  • Data Security
  • Data Privacy
  • In-House Essentials
  • Checklists
  • Events
  • About Us
  • Subscribe

In-House Essentials

  • Tech Meets Legal
  • Cyber Leadership
  • Employment
  • Operations

Apr. 14, 2021

AI Compliance Playbook: Traditional Risk Controls for Cutting-Edge Algorithms

Apr. 7, 2021

Did Clubhouse Sacrifice Privacy for Innovation? How to Find the Balance 

Mar. 31, 2021

Managing Vendor Contracts From the Data Controller's Perspective

Mar. 24, 2021

Digital Identity Management in a Post-Pandemic World: A Framework for Identity-Centric Cybersecurity

Mar. 17, 2021

Digital Identity Management in a Post-Pandemic World: SolarWinds, Zero Trust and the Challenges Ahead

Mar. 10, 2021

AI for Compliance: Five Workarounds for Asymmetric Data Sets

Jan. 27, 2021

The Potential Legal Implications of Web Scraping for Market Research

Jan. 20, 2021

eDiscovery in Multi-Jurisdictional Investigations: Preparing to Play Multi-Level Chess

Dec. 16, 2020

AI for Compliance: Building a Model

Dec. 9, 2020

Strategies for Managing the Intersection of Cybersecurity and New Technologies

Nov. 18, 2020

Show Me the Data: How to Conduct Audits for Data Minimization

Nov. 11, 2020

AI for Compliance: Foundations

Nov. 11, 2020

The Intelligent Workplace in the Age of a Pandemic: Six Privacy and Security Safeguards

Nov. 4, 2020

Vulnerability Management: Increasing Communication to Prevent Problems From Hiding in Plain Sight

Oct. 28, 2020

The Intelligent Workplace in the Age of a Pandemic: Balancing Innovation and Risk

Oct. 28, 2020

Vulnerability Management: Understanding the Risks of External Scanning

Oct. 14, 2020

Vulnerability Management: What You Don’t Know From Your External Scans Can Be Used Against You

Sep. 9, 2020

IOSCO Offers Six Risk Mitigation Measures for AI and Machine Learning

Aug. 5, 2020

How to Achieve Trustworthy AI Using the European Commission’s Final Assessment List

Jul. 15, 2020

Back to the Table: CCPA Regulations Spark New Wave of Service-Provider Negotiations

Jul. 8, 2020

Getting Board Buy-In for Edge Cybersecurity Initiatives Post COVID‑19

Jun. 24, 2020

Balancing Privacy Rights and Innovation in Digital Contact Tracing

Jun. 17, 2020

The Current State and Future of AI Regulation

Jun. 10, 2020

After Capital One Ruling, How Will Companies Protect Forensic Reports?

May 20, 2020

Did Adtech Fix Its CCPA Problem? IAB’s GC Discusses New Contract for Data Sales

May 13, 2020

NIST Privacy Framework: Privacy Controls for an Era of Digital Transformation

Mar. 18, 2020

The Keys to Encryption: Effective Policies, Legal’s Role and Third Parties

Mar. 11, 2020

The Keys to Encryption: Legal and Regulatory Framework

Mar. 4, 2020

The Keys to Encryption: Uses and Implementation Challenges

Feb. 19, 2020

Best Practices for Using Alternative Data: Mitigating Regulatory Risks

Feb. 12, 2020

Best Practices for Using Alternative Data: Collection and Provider Management

Feb. 5, 2020

The Rise of Facial Recognition Technology: Mitigating Risk

Feb. 5, 2020

Defining, Implementing and Documenting “Reasonable Security”

Jan. 29, 2020

The Rise of Facial Recognition Technology: Mapping the Legal Framework

Jan. 22, 2020

The Rise of Facial Recognition Technology: Uses and Risks

Jan. 8, 2020

How eBay and PayPal Use Key Performance Indicators to Evaluate and Improve Privacy Programs

Dec. 11, 2019

Allocating Risk in Cloud Computing Relationships: Key Legal Issues

Dec. 11, 2019

How to Handle E.U. Data Subject Access Requests

Dec. 4, 2019

Allocating Risk in Cloud Computing Relationships: Spectrum of Offerings

Nov. 20, 2019

AI for Fund Managers and Beyond: How to Automate the Legal Department and Maintain Privacy

Nov. 13, 2019

AI for Fund Managers and Beyond: Government Guidance

Nov. 6, 2019

AI for Fund Managers and Beyond: How to Use It to Streamline Operations

Oct. 30, 2019

Reconciling Technology Development, Security and the Lawyer’s Role

Oct. 2, 2019

CCPA Close-Up: Review of Amendments and How to Prepare for Compliance

Sep. 25, 2019

Strategies and Tactics for Conducting an Effective Tabletop Exercise (Part Two of Two)

Jul. 31, 2019

Takeaways From the U.K. ICO’s FaceApp Warning

Jul. 10, 2019

Can GDPR Hinder AI Made in Europe?

Jun. 19, 2019

Tips From Lockheed and Groupon on Developing GC-CISO Partnerships to Improve Security and Incident Response

Jun. 12, 2019

There Really Isn’t a Quarterback: Uber and Equifax Executives Share Insights on Incident Response Best Practices and the Lawyer’s Role

Jun. 5, 2019

FINRA RegTech Conference Reviews AI, RegTech Adoption and Compliance Challenges (Part Two of Two)

May 29, 2019

FINRA RegTech Conference Examines Digital Identification, Suspicious Activity Reporting and Machine Learning

May 22, 2019

Court Reconsiders November 2018 Order and Issues Preliminary Injunction Against ICO

May 15, 2019

What Does It Mean to Be Technologically Competent?

May 8, 2019

Understanding Regulatory Technology: Current Uses and Deployment Considerations

May 1, 2019

Understanding Regulatory Technology: Tools, Challenges and Regulators’ Views

Apr. 10, 2019

Insights From a Former SEC Counsel on Regulating Digital Assets

Mar. 27, 2019

Navigating the Risks of Alternative Data Collection and Use

Mar. 20, 2019

Increased Post-Breach Discovery Turns Spotlight on Privilege

Mar. 13, 2019

Mitigating the Risks of Open-Source Software

Mar. 6, 2019

Benefits and Risks of Open-Source Software and How the Financial Sector Is Using It

Feb. 27, 2019

Preparing for the CCPA: Securing Buy-In and Setting the Scope

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 20, 2019

Implications of the Illinois Supreme Court’s BIPA Holding Against Six Flags

Feb. 13, 2019

Practical Ways to Incorporate Security Protection Into Supplier Agreements

Jan. 23, 2019

Illinois Federal Court Denies Standing in BIPA Claim Against Google

Jan. 16, 2019

How a New Ethics Rule and Error in Manafort Case Highlight the Importance of Lawyers’ Technology Competence

Dec. 12, 2018

Illinois Appellate Decision Creates Split on Standing to Sue Under BIPA

Dec. 5, 2018

Insights From Uber: Building Bridges Between Legal and Engineering

Nov. 28, 2018

Insights From Uber: An Inside Look at Its Privacy Team Structure and How Legal and Tech Collaborated on Its Differential Privacy Tool

Nov. 14, 2018

How Privacy Professionals Can Benefit Cybersecurity Programs: Practical Tips From Gap and Privacy Panacea

Nov. 14, 2018

A Roadmap to Preparing for and Managing a Cyber Investigation

Nov. 7, 2018

WhiteHat Report on the Software Lifecycle and Visa Bug Bounty Program Demonstrate the Need for Greater App Security

Oct. 24, 2018

California Enacts Groundbreaking IoT Law and Requires Disclosure of Bot Use

Oct. 17, 2018

Risks and Rewards of Bluetooth Technology

Oct. 17, 2018

Regulating AI: U.S., E.U. and Industry Laws and Guidance

Sep. 26, 2018

New Sidley Partner Lilya Tessler Discusses the FinTech and Blockchain Space

Sep. 26, 2018

Artificial Intelligence in Legal Practice: Potential Ethical and Liability Pitfalls

Sep. 19, 2018

Evolving Roles of Privacy and Security Professionals: Operationalizing Policies, Incident Response and Vendor Management

Sep. 12, 2018

Evolving Roles of Privacy and Security Professionals: Effective Governance and Board Reporting

Sep. 5, 2018

Evolving Roles of Privacy and Security Professionals: Examining Required Skills and Potential Convergence

Jul. 11, 2018

Is Encryption Obligatory? HHS Upholds Texas Hospital $4.3M HIPAA Fine 

Jun. 13, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Three of Three)

Jun. 6, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Two of Three)

May 30, 2018

What Lawyers Need to Know About Security Techniques and Technologies to Mitigate Breach Risk (Part One of Three)

May 30, 2018

Understanding the Intersection of Law and Artificial Intelligence

Apr. 18, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Vendors and M&A (Part Three of Three)

Apr. 11, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Assessments and Incident Response (Part Two of Three)

Mar. 28, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: It Starts With Governance (Part One of Three)

Mar. 14, 2018

FTC Enters Into Stiff Settlement With PayPal for Venmo’s Deceptive Practices, but Eases up on a 2009 Sears Order 

Feb. 14, 2018

Virtual Currencies Present Significant Risk and Opportunity, Demanding Focus From Regulators, According to CFTC Chair

Feb. 14, 2018

Biometric Data Protection Laws and Litigation Strategies (Part Two of Two)

Feb. 14, 2018

Using Technology to Comply With the GDPR

Jan. 31, 2018

How to Make Data Work for You: A Conversation With a Law Firm’s Chief Data Analytics Officer and Its CISO

Jan. 31, 2018

Biometric Data Protection Laws and Litigation Strategies (Part One of Two)

Jan. 31, 2018

Five Strategies a Privacy Attorney Uses to Bridge the Gap With Tech Teams

Jan. 17, 2018

How Blockchain Will Continue to Revolutionize the Private Funds Sector in 2018

Dec. 20, 2017

SEC Takes Aggressive Action Against Allegedly Fraudulent ICO

Dec. 6, 2017

Actions Under Biometric Privacy Laws Highlight Related Risks

Nov. 8, 2017

How to Mitigate the Risks of Open-Source Software (Part Two of Two)

Oct. 25, 2017

How to Mitigate the Risks of Open-Source Software (Part One of Two)

Oct. 25, 2017

How to Outsource Vulnerability Assessments to Hackers

Oct. 11, 2017

Practical and Ethical Data-Protection Steps for Law Firms

Oct. 11, 2017

Lessons From the Equifax Breach on How to Bolster Incident Response Planning (Part Two of Two)

Sep. 27, 2017

Lessons From the Equifax Breach on How to Bolster Incident Response Planning (Part One of Two)

Sep. 13, 2017

Unlocking Encryption: An Attorney Weighs in on Balancing Security and Practicality (Part Three of Three)

Sep. 13, 2017

Negotiating an Effective Cloud Service Agreement

Aug. 23, 2017

Unlocking Encryption: A CISO’s Perspective on Encryption As Only One Strategy (Part Two of Three)

Aug. 9, 2017

Overcoming the Challenges and Reaping the Benefits of Multi-Factor Authentication in the Financial Sector (Part Two of Two)

Aug. 9, 2017

Unlocking Encryption: A Consultant’s View on Navigating Encryption Options and Persuading Reluctant Organizations (Part One of Three)

Jul. 26, 2017

Overcoming the Challenges and Reaping the Benefits of Multi-Factor Authentication in the Financial Sector (Part One of Two)

Jul. 12, 2017

Blockchain and the Financial Services Industry: Potential Impediments to Its Eventual Adoption (Part Three of Three)

Jun. 28, 2017

The Arc of the Deal: Tips for Cybersecurity Due Diligence Advisors in Mergers & Acquisitions From Beginning to End

Jun. 28, 2017

How Financial Service Providers Can Use Blockchain to Improve Operations and Compliance (Part Two of Three)

Jun. 14, 2017

Basics of the Blockchain Technology and How the Financial Sector Is Currently Employing It (Part One of Three)

May 31, 2017

One Year Until GDPR Enforcement: Five Steps Companies Should Take Now

May 31, 2017

Advice on Incorporating Cybersecurity in eDiscovery

May 17, 2017

Investigative Realities: Working Effectively With Forensic Firms (Part Two of Two)

May 17, 2017

Tracking Data and Maximizing Its Potential

May 3, 2017

Investigative Realities: Working Effectively With Forensic Firms (Part One of Two)

Apr. 19, 2017

What In-House and Outside Counsel Need to Know About ACC’s First Model Cybersecurity Practices for Law Firms

Apr. 5, 2017

Proactive Steps to Prevent Legal Pitfalls in Bug Bounty Programs 

Mar. 22, 2017

How to Establish and Manage a Successful Bug Bounty Program 

Mar. 22, 2017

Forensic Firms: Effective Vetting and Collaboration (Part Three of Three)

Mar. 8, 2017

Forensic Firms: Key Contract Considerations and Terms (Part Two of Three)

Feb. 22, 2017

Forensic Firms: Understanding and Leveraging Their Expertise From the Start (Part One of Three)

Jan. 11, 2017

Tech Meets Legal Spotlight: Advice on Working With Information Security

Nov. 30, 2016

Exploring the New Frontier of International Regulations on Importing and Exporting Encryption Technology

Nov. 30, 2016

Tech Meets Legal Spotlight: What to Do When IT and Legal Slow the Retention of a Third-Party Vendor

Nov. 2, 2016

Guide to Getting Your Security Program Certified Under ISO 27001

Oct. 19, 2016

Finding the Best Ways to Secure Digital Transactions in a Mobile World 

Aug. 24, 2016

Fulfilling the Ethical Duty of Technology Competence for Attorneys

Aug. 3, 2016

How Cyber Stakeholders Can Speak the Same Language (Part Two of Two)

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jul. 6, 2016

Technology Leader Discusses How to Deal With the Growing Threat of Ransomware 

Jun. 22, 2016

Assistant Attorney General Leslie Caldwell Addresses the Challenges of Cross-Border Cooperation and Electronic Evidence Gathering

Jun. 8, 2016

What CISOs Want Lawyers to Understand About Cybersecurity

May 11, 2016

Privacy Concerns in a Cashless Society

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Apr. 13, 2016

Study Analyzes How Companies Can Overcome Cybersecurity Challenges and Create Business Value

Mar. 30, 2016

Steps for Companies to Take This Week, This Month and This Year to Meet the Challenges of International Cyberspace Governance

Mar. 30, 2016

How Law Firms Should Strengthen Cybersecurity to Protect Themselves and Their Clients

Oct. 28, 2015

Orrick Attorneys Explain California’s New Specific Standards for Breach Notification

Aug. 26, 2015

The Development of E-Currency and Its Potential Impact on the Future

Aug. 12, 2015

How the Hospitality Industry Confronts Cybersecurity Threats that Never Take Vacations

Aug. 12, 2015

Surveys Find Internal and Third-Party Cybersecurity Risks Among Top Executive Concerns

Jul. 29, 2015

Managing the Increased Individual Risks and Responsibilities of Compliance Officers

Jul. 15, 2015

The Challenge of Coordinating the Legal and Security Teams in the Current Cyber Landscape (Part Two of Two)

Jul. 15, 2015

Conflicting Views of Safety, Vulnerability and Privacy Fuel Encryption Debate

Jun. 17, 2015

Sample Questions for Companies to Ask to Assess Their Law Firms’ Cybersecurity Environment

Jun. 17, 2015

The Advantages of Sending Data Up to the Cloud 

Jun. 3, 2015

In a Candid Conversation, FBI Director James Comey Talks About the “Evil Layer Cake” of Cybersecurity Threats (Part One of Two)

Jun. 3, 2015

Understanding and Addressing Cybersecurity Vulnerabilities at Law Firms: Strategies for Vendors, Lawyers and Clients

Jun. 3, 2015

How Companies Are Preparing for the Imminent Liability Shift for Counterfeit Credit Cards

Apr. 8, 2015

Ten Actions for Effective Data Risk Management

Apr. 14, 2021

Advice From CISOs on How to Succeed in the Role

Apr. 14, 2021

First 100 Days As GC/CCO: Preparing for the Role and Setting the Tone

Mar. 31, 2021

How Do You Put a System of Controls in Place When Your Target Keeps Moving?

Mar. 10, 2021

AI for Compliance: Five Workarounds for Asymmetric Data Sets

Mar. 3, 2021

Preserving the Privilege for In-House Counsel: Internal Investigations and Depositions

Feb. 24, 2021

Cargill Compliance Director Discusses Putting Training Data to Work

Jan. 13, 2021

Cybersecurity Resolutions for 2021

Jan. 13, 2021

Can the Cybersecurity Industry Improve Cooperation to Beat Threats?

Jan. 6, 2021

Six Practical Tips for Building an Effective Privacy Risk Assessment Program

Jan. 6, 2021

Maintaining Privacy While Staying Competitive in an Evolving Regulatory Landscape

Dec. 16, 2020

AI for Compliance: Building a Model

Dec. 2, 2020

How CCOs Can Avoid Personal Liability for an Organization’s Compliance Failures

Nov. 18, 2020

SEC Commissioner Peirce Shares Views on Personal Liability for CCOs

Nov. 11, 2020

AI for Compliance: Foundations

Oct. 21, 2020

How Lockheed Uses Big Data to Evaluate Risk at Small Worksites

Oct. 7, 2020

Tips and New Benchmarks for Creating Effective Tabletop Exercises

Sep. 16, 2020

Twelve Steps for Engaging the Board of Directors and Implementing a Long-Term Cybersecurity Plan

Sep. 16, 2020

Four Principles Underlying Microsoft’s Compliance Analytics Program

Sep. 9, 2020

IOSCO Offers Six Risk Mitigation Measures for AI and Machine Learning

Sep. 2, 2020

Business Continuity Plans, Budgets and More: Hot Compliance Topics for Investment Advisers

Jul. 22, 2020

Majority of In-House Counsel Satisfied With Compensation, but Gender Gap Remains

Jul. 8, 2020

Getting Board Buy-In for Edge Cybersecurity Initiatives Post COVID‑19

Jun. 10, 2020

How Compliance Departments Are Responding to COVID‑19

Jun. 3, 2020

How CISOs Can Use Digital Asset Metrics to Tell a Coherent Cyber Story to the Board

May 27, 2020

Insights on Building a Compliance Program at a New Company

May 20, 2020

Did Adtech Fix Its CCPA Problem? IAB’s GC Discusses New Contract for Data Sales

May 13, 2020

NIST Privacy Framework: Privacy Controls for an Era of Digital Transformation

May 6, 2020

NIST Privacy Framework: Insights on New Tool for Managing Privacy Risks

Apr. 15, 2020

Report on CCO Liability Calls for More Regulatory Cooperation

Mar. 25, 2020

Companywide Work From Home: Six Cybersecurity Considerations

Mar. 18, 2020

The Ongoing Complexity of Vendor Risk: Top 5 Considerations for C-Level Leaders

Mar. 18, 2020

The Keys to Encryption: Effective Policies, Legal’s Role and Third Parties

Feb. 26, 2020

Eleven Key Components of an Effective Privacy Program

Feb. 26, 2020

Tips From Ponemon/Experian Survey on Building an Incident Response Plan That Fosters Confidence

Feb. 12, 2020

Compliance Records Are a Strategic Gold Mine

Feb. 5, 2020

Defining, Implementing and Documenting “Reasonable Security”

Jan. 29, 2020

30 Creative Ideas for Compliance Messaging

Jan. 8, 2020

How eBay and PayPal Use Key Performance Indicators to Evaluate and Improve Privacy Programs

Dec. 11, 2019

How to Handle E.U. Data Subject Access Requests

Nov. 20, 2019

AI for Fund Managers and Beyond: How to Automate the Legal Department and Maintain Privacy

Oct. 30, 2019

Reconciling Technology Development, Security and the Lawyer’s Role

Oct. 30, 2019

Guide to Cybersecurity Training: Assessing Effectiveness and Avoiding Pitfalls

Oct. 16, 2019

How Uber, eBay and Pitney Bowes Built Principles-Based Global Privacy Programs

Sep. 25, 2019

Hallmarks of High-Impact Compliance Programs and Compensation Trends for Compliance Officers Who Implement Them

Sep. 11, 2019

Using “Red-Teaming” to Test and Improve Cyber Defenses

Aug. 7, 2019

How Facebook’s $5-Billion FTC Settlement Is Shaping Compliance Expectations

Aug. 7, 2019

Report Shows Strategic Buy-In From Executive Leadership Is the Key Driver of Successful Risk Mitigation

Jul. 31, 2019

The Growing Role of the Chief Data Officer: Compliance and Third Parties

Jul. 24, 2019

The Growing Role of the Chief Data Officer: Reporting Structures and Budget

Jul. 24, 2019

Privacy Officers Share Best Practices for Reporting to the Board

Jul. 17, 2019

How to Establish an Efficient Incident Response Plan

Jul. 17, 2019

The Growing Role of the Chief Data Officer: Skill Sets, Priorities and Collaboration

Jul. 17, 2019

Maine Enacts Sweeping Broadband Customer Privacy Law

Jun. 19, 2019

Tips From Lockheed and Groupon on Developing GC-CISO Partnerships to Improve Security and Incident Response

Jun. 5, 2019

Irish Data Protection Commissioner Helen Dixon on Breach Notification, the Role of the DPO and a U.S. Privacy Law

May 29, 2019

Keeping CISOs and the C-Suite Off the Witness Stand

May 15, 2019

How the World’s Most Ethical Companies Are Aligning Corporate Culture and Strategy

May 8, 2019

Making the Case for Increased Privacy Budgets Using Data and Diplomacy

May 1, 2019

Fresenius and Pearson Compliance Directors Discuss Corporate Community-Building

Apr. 24, 2019

Jeopardy, Coasters and the Behavioral Clock: Compliance Leaders at Fresenius and Pearson Discuss Effective Long- and Short-Term Initiatives

Apr. 17, 2019

GPEN Report Highlights Key Areas for Data Privacy Improvement

Apr. 3, 2019

FCA Evaluates Firms’ Cyber Resilience

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness According to Experian Survey

Mar. 20, 2019

A Quick-Start Guide to Creating a Compliance Champion Program

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 20, 2019

Fixing the Chinks in Companies’ Cyber Armor: Executives

Dec. 19, 2018

Interim Response Lessons From the Marriott Breach

Dec. 5, 2018

Insights From Uber: Building Bridges Between Legal and Engineering

Nov. 28, 2018

Insights From Uber: An Inside Look at Its Privacy Team Structure and How Legal and Tech Collaborated on Its Differential Privacy Tool

Nov. 14, 2018

How Privacy Professionals Can Benefit Cybersecurity Programs: Practical Tips From Gap and Privacy Panacea

Nov. 7, 2018

How GoDaddy Built an Effective Privacy Program

Oct. 31, 2018

IAPP-EY Annual Report Finds GDPR Compliance Strides and DPO Explosion

Oct. 10, 2018

Fifteen Tips for an Effective Cybersecurity Board Presentation

Sep. 19, 2018

Evolving Roles of Privacy and Security Professionals: Operationalizing Policies, Incident Response and Vendor Management

Sep. 12, 2018

Evolving Roles of Privacy and Security Professionals: Effective Governance and Board Reporting

Sep. 5, 2018

Evolving Roles of Privacy and Security Professionals: Examining Required Skills and Potential Convergence

Aug. 15, 2018

How to Build a Cybersecurity Culture Using People, Processes and Technology

Aug. 8, 2018

Essential Cyber, Tech and Privacy M&A Due Diligence Considerations

Jun. 13, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Three of Three)

May 9, 2018

Building a Customer Privacy Program: Lessons from Dupont’s Privacy Leaders

May 9, 2018

How Financial Services Firms Should Structure Their Cybersecurity Programs

Apr. 25, 2018

Pillars of Effective Breach Detection, Response and Remediation

Apr. 11, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Assessments and Incident Response (Part Two of Three)

Mar. 28, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: It Starts With Governance (Part One of Three)

Mar. 14, 2018

How to Handle Rising Expectations for Board Cyber Education and Involvement

Feb. 14, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part Two of Two)

Jan. 31, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part One of Two)

Dec. 20, 2017

How to Make the Most of Limited Resources When Planning the Compliance Budget

Nov. 8, 2017

IBM Cybersecurity Counsel Offers Techniques for Speaking the Same Language as the C-Suite When Managing Cyber Risk

Nov. 8, 2017

Managing Data Privacy Across Multiple Jurisdictions

Oct. 25, 2017

Advice From Recruiters on How to Attract the Best and Brightest Security and Privacy Leadership

Oct. 11, 2017

How to Successfully Incorporate the Role of the Chief Technology Officer

Sep. 27, 2017

Deloitte Survey Shows Getting Skilled Cybersecurity Talent and Addressing Cyber Threats Among the Top Challenges for Financial Institutions

Aug. 23, 2017

Tips From Google, Chase and P&G Privacy Officers on Developing Strong Privacy Leadership and When to Use Outside Counsel

Jul. 26, 2017

How the CCO Can Use SEC Guidance to Tackle Cyber Threats 

Jul. 12, 2017

A Discussion With eHarmony’s GC About the Role of In-House Counsel in Cybersecurity

Jun. 28, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part Two of Two)

Jun. 28, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part Two of Two)

Jun. 14, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part One of Two)

Jun. 14, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part One of Two)

May 17, 2017

Advice From CPOs on Nurturing Privacy Programs on Any Budget

Apr. 19, 2017

What In-House and Outside Counsel Need to Know About ACC’s First Model Cybersecurity Practices for Law Firms

Apr. 5, 2017

A Discussion With Ireland’s Data Protection Commissioner Helen Dixon About GDPR Compliance Strategies (Part Two of Two)

Mar. 22, 2017

Forensic Firms: Effective Vetting and Collaboration (Part Three of Three)

Mar. 22, 2017

A Discussion With Ireland’s Data Protection Commissioner Helen Dixon About GDPR Compliance Strategies (Part One of Two)

Mar. 8, 2017

Preparing For Ransomware Attacks As Part of the Board’s Fiduciary Duty

Mar. 8, 2017

Forensic Firms: Key Contract Considerations and Terms (Part Two of Three)

Feb. 22, 2017

A CSO/GC Advises on How and When to Present Cybersecurity to the Board 

Feb. 22, 2017

Strategies for In-House Counsel Responsible for Privacy and Data Security 

Feb. 8, 2017

Getting to Know the DPO and How to Adapt Corporate Structure to Comply With GDPR Requirements for the Role (Part Two of Two)

Jan. 25, 2017

Getting to Know the DPO and Adapting Corporate Structure to Comply With the GDPR (Part One of Two)

Jan. 11, 2017

Tech Meets Legal Spotlight: Advice on Working With Information Security

Jan. 11, 2017

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part Two of Two)

Dec. 14, 2016

Advice From Compliance Officers on Getting the C-Suite to Show You the Money for Your Data Privacy Program

Dec. 14, 2016

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part One of Two)

Nov. 30, 2016

Using a Risk Assessment as a Critical Component of a Robust Cybersecurity Program (Part Two of Two)

Nov. 16, 2016

Using a Risk Assessment as a Critical Component of a Robust Cybersecurity Program (Part One of Two)

Nov. 2, 2016

Advice From Blackstone and Tiffany CISOs on Fighting Cybercrime

Oct. 19, 2016

Privacy Leaders Share Key Considerations for Incorporating a Privacy Policy in the Corporate Culture 

Sep. 21, 2016

What Private Companies Can Learn From the OPM Data Breaches

Aug. 24, 2016

How GE’s Global CPO Approaches Shifting Regulations With Dynamic Implications 

Aug. 3, 2016

How Cyber Stakeholders Can Speak the Same Language (Part Two of Two)

Jul. 20, 2016

Challenges Facing Chief Privacy Officers

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jun. 8, 2016

What CISOs Want Lawyers to Understand About Cybersecurity

Jun. 8, 2016

Eight Attributes In-House Counsel Look For in Outside Cybersecurity Counsel

May 11, 2016

Google, CVS and the FBI Share Advice on Interacting With Law Enforcement After a Breach

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Apr. 13, 2016

A Look Inside the Cybersecurity and Privacy Law Department of a Top Defense Company

Apr. 13, 2016

Study Analyzes How Companies Can Overcome Cybersecurity Challenges and Create Business Value

Mar. 30, 2016

In-House and Outside Counsel Offer Strategies for Navigating the TCPA, Avoiding Litigation and Responding to Breaches

Mar. 30, 2016

Steps for Companies to Take This Week, This Month and This Year to Meet the Challenges of International Cyberspace Governance

Feb. 3, 2016

How In-House Counsel, Management and the Board Can Collaborate to Manage Cyber Risks and Liability (Part Two of Two) 

Jan. 20, 2016

How In-House Counsel, Management and the Board Can Collaborate to Manage Cyber Risks and Liability (Part One of Two)

Jan. 20, 2016

Defining, Documenting and Measuring Compliance Program Effectiveness

Jan. 6, 2016

How the Financial Services Sector Can Meet the Cybersecurity Challenge: A Plan for Building a Cyber-Compliance Program (Part Two of Two)

Dec. 9, 2015

The Multifaceted Role of In-House Counsel in Cybersecurity 

Nov. 25, 2015

Implementing an Effective Cloud Service Provider Compliance Program

Nov. 11, 2015

Target Privilege Decision Delivers Guidance for Post-Data Breach Internal Investigations

Oct. 14, 2015

Eight Ways Compliance Officers Can Build Relationships With the “Middle”

Aug. 12, 2015

Cybersecurity 2.0: The Role of Counsel in Addressing Destructive Cyberattacks

Aug. 12, 2015

Surveys Find Internal and Third-Party Cybersecurity Risks Among Top Executive Concerns

Jul. 29, 2015

Managing the Increased Individual Risks and Responsibilities of Compliance Officers

Jul. 15, 2015

The Challenge of Coordinating the Legal and Security Teams in the Current Cyber Landscape (Part Two of Two)

Jul. 1, 2015

Coordinating Legal and Security Teams in the Current Cybersecurity Landscape (Part One of Two)

Jul. 1, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part Two of Two)

Jun. 17, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part One of Two)

May 20, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part Two of Two)

May 20, 2015

Weil Gotshal Attorneys Advise on Key Ways to Anticipate and Counter Cyber Threats

May 6, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part One of Two)

Apr. 8, 2015

How Can a Company Mitigate Cyber Risk with Cross-Departmental Decisionmaking?

Apr. 7, 2021

Former Twitter and eBay Counsel Talks Overblown Fears, Third-Party Data Management, and CDA Section 230

Apr. 7, 2021

Did Clubhouse Sacrifice Privacy for Innovation? How to Find the Balance 

Mar. 31, 2021

How Do You Put a System of Controls in Place When Your Target Keeps Moving?

Mar. 24, 2021

Digital Identity Management in a Post-Pandemic World: A Framework for Identity-Centric Cybersecurity

Mar. 17, 2021

Digital Identity Management in a Post-Pandemic World: SolarWinds, Zero Trust and the Challenges Ahead

Feb. 24, 2021

Cargill Compliance Director Discusses Putting Training Data to Work

Feb. 17, 2021

A Fake Zoom Invite Hack: Eight More Lessons

Feb. 10, 2021

A Fake Zoom Invite Hack: What Happened and Three Lessons

Feb. 3, 2021

Expect Continuing Regulatory Focus on Cybersecurity and Data Protection in 2021

Feb. 3, 2021

How to Prevent and Handle Disputes Over Ransomware Insurance Claims

Jan. 13, 2021

Checklist for IoT Security Audits

Jan. 13, 2021

Cybersecurity Resolutions for 2021

Dec. 16, 2020

How Will the Biden Administration’s Approach to Cybersecurity Impact the Private Sector?

Nov. 11, 2020

The Intelligent Workplace in the Age of a Pandemic: Six Privacy and Security Safeguards

Nov. 4, 2020

A Guided Tour of Enterprise IoT Device Hazards

Oct. 28, 2020

The Intelligent Workplace in the Age of a Pandemic: Balancing Innovation and Risk

Oct. 21, 2020

Steps to Take After OFAC and FinCEN’s Warnings on Ransomware Payoffs

Oct. 14, 2020

H&M’s $41M GDPR Fine Underscores Importance of Employee Data Handling

Oct. 7, 2020

How to Address Intensifying Enterprise IoT Security Risks

Sep. 23, 2020

Identifying and Preventing Ransomware Attacks

Sep. 16, 2020

How Can Your Firm Avoid Being the Next Target of a Cultural Engineering Attack?

Sep. 16, 2020

Twelve Steps for Engaging the Board of Directors and Implementing a Long-Term Cybersecurity Plan

Sep. 9, 2020

Action Steps to Respond to Ransomware Attacks

Aug. 12, 2020

Not Just TikTok: How Companies Can Mitigate Risk of Employee Social Media Use

Jul. 29, 2020

Evolution and Mitigation of Insider Cyber Threats During COVID-19

Jul. 22, 2020

Majority of In-House Counsel Satisfied With Compensation, but Gender Gap Remains

Jul. 8, 2020

Privacy Compliant Return-to-Work Checklist

Jun. 24, 2020

Balancing Privacy Rights and Innovation in Digital Contact Tracing

Jun. 10, 2020

How Compliance Departments Are Responding to COVID‑19

Jun. 3, 2020

Re-Evaluating Cybersecurity in the Remote Work Environment

Jun. 3, 2020

How CISOs Can Use Digital Asset Metrics to Tell a Coherent Cyber Story to the Board

May 27, 2020

How to Facilitate a Safe and Privacy Compliant Return to Work: Contact Tracing

May 20, 2020

How to Facilitate a Safe and Privacy Compliant Return to Work: Policies and Protocols

May 13, 2020

How to Facilitate a Safe and Privacy Compliant Return to Work: Laws and Guidance

May 6, 2020

Managing Ransomware’s Mutation Into a Public Data Breach

Apr. 29, 2020

The Pandemic Effect: How Compliance and Enforcement Are Evolving

Apr. 29, 2020

Understanding Insider Trading Based on Data Breaches Amidst Heightened Regulatory Scrutiny

Apr. 22, 2020

Morrisons Ruling Lets U.K. Employers Off the Hook for Rogue Employee Data Leaks

Apr. 8, 2020

DOJ Guidance on How Companies Should Pursue Stolen Data on the Dark Web

Apr. 8, 2020

Wide-Ranging Lessons From Notable Breaches in Q1

Apr. 1, 2020

Investigation Strategies During Social Distancing

Mar. 25, 2020

Companywide Work From Home: Six Cybersecurity Considerations

Mar. 18, 2020

Business Considerations for Responding to the Coronavirus Outbreak

Feb. 19, 2020

Preparing for and Responding to Ransomware Attacks

Jan. 29, 2020

30 Creative Ideas for Compliance Messaging

Jan. 15, 2020

When Does Social Engineering Fraud Qualify for Insurance Coverage?

Jan. 15, 2020

How Compliance and HR Can Work Together

Dec. 18, 2019

FTC Spyware Takedown Highlights Employee Monitoring Privacy Shifts

Oct. 30, 2019

Guide to Cybersecurity Training: Assessing Effectiveness and Avoiding Pitfalls

Oct. 23, 2019

CFTC Issues $1.5-Million Fine After Phishing Attack

Oct. 23, 2019

Guide to Cybersecurity Training: What to Cover and Implementation Strategies

Oct. 16, 2019

Guide to Cybersecurity Training: Program Hallmarks and Whom to Train

Oct. 9, 2019

DOJ Spotlights Emerging Issues and Protection Strategies Around Business Email Compromise Attacks

Sep. 25, 2019

Hallmarks of High-Impact Compliance Programs and Compensation Trends for Compliance Officers Who Implement Them

Sep. 25, 2019

Strategies and Tactics for Conducting an Effective Tabletop Exercise (Part Two of Two)

Aug. 7, 2019

Report Shows Strategic Buy-In From Executive Leadership Is the Key Driver of Successful Risk Mitigation

Jul. 31, 2019

Takeaways From the U.K. ICO’s FaceApp Warning

Jun. 26, 2019

Employee Privacy and Off-Duty Conduct: Balancing Company Interests Against Employee Rights

May 15, 2019

How the World’s Most Ethical Companies Are Aligning Corporate Culture and Strategy

Apr. 24, 2019

Jeopardy, Coasters and the Behavioral Clock: Compliance Leaders at Fresenius and Pearson Discuss Effective Long- and Short-Term Initiatives

Apr. 17, 2019

China Establishes Certification Scheme for Mobile App Operators

Apr. 17, 2019

GPEN Report Highlights Key Areas for Data Privacy Improvement

Apr. 10, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Five Risk-Mitigation Strategies

Apr. 3, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Understanding the Legal Landscape

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness According to Experian Survey

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 20, 2019

Fixing the Chinks in Companies’ Cyber Armor: Executives

Feb. 13, 2019

FINRA Report Addresses Common Cybersecurity Risks and Recommends Mitigation Measures

Jan. 16, 2019

Key Cyber Threats and Targets for 2019

Dec. 5, 2018

Tips from EY’s Forensics Team on Recognizing and Preventing BEC Attacks

Dec. 5, 2018

Answers to Four Critical Questions on Privilege in Internal Investigations

Oct. 24, 2018

California Enacts Groundbreaking IoT Law and Requires Disclosure of Bot Use

Oct. 17, 2018

Risks and Rewards of Bluetooth Technology

Oct. 3, 2018

Lax Privacy Policies, Security Measures and Vendor Oversight Lead to FTC Settlement for Mobile Phone Manufacturer

Sep. 5, 2018

Twenty Steps Toward Achieving an Effective Social Media Policy

Aug. 22, 2018

Protecting Against the Security Risks of Departing Employees

Aug. 15, 2018

How to Build a Cybersecurity Culture Using People, Processes and Technology

Aug. 1, 2018

Checklist for an Effective Employee Monitoring Program

Jul. 11, 2018

Ransomware Lessons From the Trenches of the MedStar Attack

Jun. 6, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Two of Three)

May 30, 2018

Understanding the Intersection of Law and Artificial Intelligence

May 16, 2018

Crafting a Multinational Employer Social Media Policy After Cambridge Analytica

Apr. 18, 2018

Ten Common Post-Breach Public Relations Failures and How to Avoid Them

Apr. 18, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Vendors and M&A (Part Three of Three)

Mar. 28, 2018

Beware of False Friends: A Hedge Fund Manager’s Guide to Social Engineering Fraud

Mar. 28, 2018

FTC Recommends Greater Transparency, Better Recordkeeping and Further Streamlining of Mobile Security Practices

Mar. 14, 2018

FTC Enters Into Stiff Settlement With PayPal for Venmo’s Deceptive Practices, but Eases up on a 2009 Sears Order 

Mar. 14, 2018

Identifying and Preparing for Ransomware Threats (Part Two of Two)

Feb. 28, 2018

Identifying and Preparing for Ransomware Threats (Part One of Two)

Feb. 14, 2018

NY AG and HHS Flex Regulatory Muscles in Recent Protected Health Information Breach Settlements

Dec. 20, 2017

Benchmarking Employee Monitoring Policies for Practical Approaches

Oct. 11, 2017

FTC Launches Stick With Security Series, Adding Detail and Guidance to Its Start With Security Guide (Part Two of Two)

Oct. 11, 2017

Creating Tomorrow’s Code, Today: Designing an Effective Mobile-First Code of Conduct

Sep. 27, 2017

New Criteria for Employee Monitoring Practices in Light of ECHR Decision

Jul. 26, 2017

What the Financial Industry Should Know to Recognize and Combat Cyber Threats (Part One of Two)

Jul. 26, 2017

Overcoming the Challenges and Reaping the Benefits of Multi-Factor Authentication in the Financial Sector (Part One of Two)

May 31, 2017

Defending Against the Rising Threat of Ransomware in the Wake of WannaCry

May 17, 2017

Executive Order on Cybersecurity Signed Amidst Massive Worldwide Ransomware Attack

Apr. 19, 2017

The Wisdom of Planning Ahead: The Duty to Preserve Backup Tapes, Mobile Devices and Instant Messages

Apr. 19, 2017

Effective and Compliant Employee Monitoring (Part Two of Two)

Apr. 19, 2017

Goodbye to the Blame Game: Forging the Connection Between Companies and Law Enforcement in Incident Response

Apr. 5, 2017

Best Practices for Mitigating Compliance Risks When Investment Advisers Use Social Media 

Apr. 5, 2017

Effective and Compliant Employee Monitoring (Part One of Two) 

Apr. 5, 2017

Multimillion-Dollar Scheme Serves As Backdrop for Lessons on Preventing and Mitigating Phishing Attacks

Mar. 22, 2017

What It Takes to Establish Compliant Social Media Policies for the Workplace

Mar. 8, 2017

A Real-Life Scenario Offers Lessons on How to Handle a Breach From the Inside

Mar. 8, 2017

Preparing For Ransomware Attacks As Part of the Board’s Fiduciary Duty

Jan. 25, 2017

Tracking Consumer Data: DAA Guidance Applies Core Principles to Cross-Device Technology

Jan. 11, 2017

FTC Priorities for 2017 and Beyond

Jan. 11, 2017

Ten Cybersecurity Priorities for 2017

Nov. 2, 2016

Advice From Blackstone and Tiffany CISOs on Fighting Cybercrime

Oct. 19, 2016

SEC Emphasizes Protecting Information From More Than Just Cyber Threats in Deutsche Bank Case

Oct. 19, 2016

Finding the Best Ways to Secure Digital Transactions in a Mobile World 

Sep. 21, 2016

Staying Cybersecure Without Mobile Device Management

Sep. 21, 2016

Managing Data Privacy Challenges While Conducting Due Diligence and Investigations in China (Part Two of Two)

Aug. 24, 2016

Cybersecurity Due Diligence in M&A Is No Longer Optional

Aug. 3, 2016

Procedures for Hedge Fund Managers to Safeguard Trade Secrets From Rogue Employees 

Aug. 3, 2016

Is Pokémon Go Pushing the Bounds of Mobile App Privacy and Security?

Jul. 20, 2016

Using Data Analytics to Combat Internal Cyber Threats

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jul. 6, 2016

Technology Leader Discusses How to Deal With the Growing Threat of Ransomware 

May 25, 2016

Do You Know Where Your Employees Are? Tackling the Privacy and Security Challenges of Remote Working Arrangements

Apr. 27, 2016

Mitigating the Risks of Using Social Media in the Workplace

Apr. 27, 2016

Regulators Speak Candidly About Cybersecurity Trends, Priorities and Coordination

Apr. 13, 2016

The Regulators’ View of Best Practices for Social Media and Mobile Apps

Mar. 30, 2016

How Law Firms Should Strengthen Cybersecurity to Protect Themselves and Their Clients

Mar. 30, 2016

Twenty Ways a Company Can Use Behavioral Psychology to Improve Compliance

Mar. 16, 2016

Designing, Implementing and Assessing an Effective Employee Cybersecurity Training Program (Part Three of Three)

Mar. 2, 2016

Designing, Implementing and Assessing an Effective Employee Cybersecurity Training Program (Part Two of Three)

Feb. 17, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part Two of Two)

Feb. 17, 2016

Designing, Implementing and Assessing an Effective Employee Cybersecurity Training Program (Part One of Three)

Feb. 3, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part One of Two)

Feb. 3, 2016

Minimizing Breach Damage When the Rubber Hits the Road

Jan. 6, 2016

Cybersecurity and Whistleblowing Converge in a New Wave of SEC Activity

Jan. 6, 2016

Keeping Up with Technology and Regulatory Changes in Online Advertising to Mitigate Risks

Dec. 9, 2015

The Multifaceted Role of In-House Counsel in Cybersecurity 

Dec. 9, 2015

Avoiding Privacy Pitfalls While Using Social Media for Internal Investigations

Nov. 11, 2015

How to Reduce Cybersecurity Risks of Bring Your Own Device Policies (Part Two of Two)

Oct. 28, 2015

Privacy and Data Security Considerations for Life Sciences and Health Technology Companies (Part Two of Two)

Oct. 14, 2015

How to Reduce the Cybersecurity Risks of Bring Your Own Device Policies (Part One of Two)

Oct. 14, 2015

Eight Ways Compliance Officers Can Build Relationships With the “Middle”

Sep. 16, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part Two of Two)  

Aug. 26, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part One of Two)

Aug. 12, 2015

Can an Employee Be Liable for Inadvertently Providing Security Details to a Fraudulent Caller?

Aug. 12, 2015

Navigating the Evolving Mobile Arena Landscape (Part Two of Two)

Jul. 29, 2015

How to Prevent and Manage Ransomware Attacks (Part Two of Two)

Jul. 29, 2015

How to Secure Evolving Mobile Technology and the Data It Collects (Part One of Two)

Jul. 15, 2015

How to Prevent and Manage Ransomware Attacks (Part One of Two)

May 6, 2015

Top Private Practitioners and Public Officials Detail Hot Topics in Cybersecurity and Best Practices for Government Investigations

Apr. 8, 2015

Strategies for Preventing and Handling Cybersecurity Threats from Employees

Apr. 14, 2021

First 100 Days As GC/CCO: Preparing for the Role and Setting the Tone

Apr. 14, 2021

Advice From CISOs on How to Succeed in the Role

Apr. 14, 2021

AI Compliance Playbook: Traditional Risk Controls for Cutting-Edge Algorithms

Apr. 7, 2021

Former Twitter and eBay Counsel Talks Overblown Fears, Third-Party Data Management, and CDA Section 230

Mar. 31, 2021

How Do You Put a System of Controls in Place When Your Target Keeps Moving?

Mar. 3, 2021

Preserving the Privilege for In-House Counsel: Internal Investigations and Depositions

Feb. 24, 2021

Cargill Compliance Director Discusses Putting Training Data to Work

Feb. 17, 2021

Wray Highlights Benefits of FBI Coordination With Public and Private Sectors

Feb. 3, 2021

Expect Continuing Regulatory Focus on Cybersecurity and Data Protection in 2021

Jan. 20, 2021

eDiscovery in Multi-Jurisdictional Investigations: Preparing to Play Multi-Level Chess

Jan. 20, 2021

Privacy Resolutions for 2021

Jan. 13, 2021

Can the Cybersecurity Industry Improve Cooperation to Beat Threats?

Jan. 13, 2021

Cybersecurity Resolutions for 2021

Jan. 6, 2021

Maintaining Privacy While Staying Competitive in an Evolving Regulatory Landscape

Jan. 6, 2021

Six Practical Tips for Building an Effective Privacy Risk Assessment Program

Jan. 6, 2021

Privacy and Security Risks in International Arbitration: Managing Remote Proceedings

Dec. 16, 2020

How Will the Biden Administration’s Approach to Cybersecurity Impact the Private Sector?

Dec. 16, 2020

AI for Compliance: Building a Model

Dec. 16, 2020

Privacy and Security Risks in International Arbitration: Threats and the Information Security Protocol

Dec. 2, 2020

How CCOs Can Avoid Personal Liability for an Organization’s Compliance Failures

Nov. 11, 2020

AI for Compliance: Foundations

Oct. 21, 2020

How Lockheed Uses Big Data to Evaluate Risk at Small Worksites

Oct. 7, 2020

Tips and New Benchmarks for Creating Effective Tabletop Exercises

Sep. 16, 2020

Four Principles Underlying Microsoft’s Compliance Analytics Program

Sep. 16, 2020

Twelve Steps for Engaging the Board of Directors and Implementing a Long-Term Cybersecurity Plan

Sep. 9, 2020

IOSCO Offers Six Risk Mitigation Measures for AI and Machine Learning

Sep. 2, 2020

Business Continuity Plans, Budgets and More: Hot Compliance Topics for Investment Advisers

Aug. 5, 2020

How to Achieve Trustworthy AI Using the European Commission’s Final Assessment List

Jul. 29, 2020

Evolution and Mitigation of Insider Cyber Threats During COVID-19

Jul. 29, 2020

Remote Forensic Data Collection Steps Into the Spotlight

Jul. 22, 2020

Majority of In-House Counsel Satisfied With Compensation, but Gender Gap Remains

Jul. 22, 2020

Business Continuity Planning: Key Provisions and Third-Party Considerations

Jul. 15, 2020

Business Continuity Planning: How to Update a BCP With Lessons Learned From the Pandemic

Jul. 8, 2020

Getting Board Buy-In for Edge Cybersecurity Initiatives Post COVID‑19

Jun. 24, 2020

Perspectives From the Public and Private Sectors on Information Sharing During COVID-19

Jun. 3, 2020

How CISOs Can Use Digital Asset Metrics to Tell a Coherent Cyber Story to the Board

Jun. 3, 2020

Preserving Privilege in Audits and Internal Investigations

May 27, 2020

Insights on Building a Compliance Program at a New Company

May 13, 2020

NIST Privacy Framework: Privacy Controls for an Era of Digital Transformation

May 6, 2020

How Asset Managers and Others Can Mitigate Pandemic-Related Operational Risks and Maintain Business Continuity

May 6, 2020

NIST Privacy Framework: Insights on New Tool for Managing Privacy Risks

Apr. 29, 2020

The Pandemic Effect: How Compliance and Enforcement Are Evolving

Apr. 15, 2020

Report on CCO Liability Calls for More Regulatory Cooperation

Apr. 1, 2020

When Do Force Majeure Clauses Excuse Performance?

Apr. 1, 2020

Investigation Strategies During Social Distancing

Mar. 25, 2020

Companywide Work From Home: Six Cybersecurity Considerations

Mar. 18, 2020

Business Considerations for Responding to the Coronavirus Outbreak

Mar. 18, 2020

The Ongoing Complexity of Vendor Risk: Top 5 Considerations for C-Level Leaders

Mar. 11, 2020

NIST’s New IoT Standard: Inspiring a Wave of New Device Security Guidance

Mar. 4, 2020

NIST’s New IoT Standard: Boosting Security As States Launch Laws

Feb. 26, 2020

Eleven Key Components of an Effective Privacy Program

Feb. 26, 2020

Tips From Ponemon/Experian Survey on Building an Incident Response Plan That Fosters Confidence

Feb. 12, 2020

Compliance Records Are a Strategic Gold Mine

Feb. 5, 2020

Defining, Implementing and Documenting “Reasonable Security”

Jan. 29, 2020

30 Creative Ideas for Compliance Messaging

Jan. 15, 2020

How Compliance and HR Can Work Together

Jan. 8, 2020

How eBay and PayPal Use Key Performance Indicators to Evaluate and Improve Privacy Programs

Dec. 11, 2019

How to Handle E.U. Data Subject Access Requests

Dec. 11, 2019

Not Just GDPR: Examining the Other European Privacy Laws 

Dec. 4, 2019

U.K. and U.S. Sign First E-Evidence Pact Under the CLOUD Act: A Look at the Privacy Protections

Nov. 20, 2019

AI for Fund Managers and Beyond: How to Automate the Legal Department and Maintain Privacy

Nov. 13, 2019

AI for Fund Managers and Beyond: Government Guidance

Nov. 6, 2019

AI for Fund Managers and Beyond: How to Use It to Streamline Operations

Oct. 16, 2019

How Uber, eBay and Pitney Bowes Built Principles-Based Global Privacy Programs

Oct. 2, 2019

Preserving Customer Goodwill After a Breach

Oct. 2, 2019

CCPA Close-Up: Review of Amendments and How to Prepare for Compliance

Sep. 25, 2019

Hallmarks of High-Impact Compliance Programs and Compensation Trends for Compliance Officers Who Implement Them

Aug. 14, 2019

Report Weighs In on Understanding and Mitigating Rising Data Breach Costs

Aug. 7, 2019

Lessons From SDNY Ruling on How to Preserve Privileged Communications With Attorney Consultants

Aug. 7, 2019

Report Shows Strategic Buy-In From Executive Leadership Is the Key Driver of Successful Risk Mitigation

Jul. 31, 2019

The Growing Role of the Chief Data Officer: Compliance and Third Parties

Jul. 24, 2019

The Growing Role of the Chief Data Officer: Reporting Structures and Budget

Jul. 17, 2019

The Growing Role of the Chief Data Officer: Skill Sets, Priorities and Collaboration

Jul. 17, 2019

Maine Enacts Sweeping Broadband Customer Privacy Law

Jun. 19, 2019

Tips From Lockheed and Groupon on Developing GC-CISO Partnerships to Improve Security and Incident Response

Jun. 12, 2019

CCPA Priorities: Tackling Data Subject Rights Requests and Vendors

Jun. 5, 2019

CCPA Priorities: Turning Legislation Prep Into a Program Shift

May 22, 2019

Social Engineering, Attacks on Cloud-Based Email on the Rise, Verizon Data Breach Report Finds

May 15, 2019

How the World’s Most Ethical Companies Are Aligning Corporate Culture and Strategy

May 15, 2019

What Does It Mean to Be Technologically Competent?

May 8, 2019

Making the Case for Increased Privacy Budgets Using Data and Diplomacy

May 1, 2019

Fresenius and Pearson Compliance Directors Discuss Corporate Community-Building

Apr. 24, 2019

Jeopardy, Coasters and the Behavioral Clock: Compliance Leaders at Fresenius and Pearson Discuss Effective Long- and Short-Term Initiatives

Apr. 17, 2019

GPEN Report Highlights Key Areas for Data Privacy Improvement

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness According to Experian Survey

Mar. 20, 2019

A Quick-Start Guide to Creating a Compliance Champion Program

Mar. 6, 2019

Preparing for the CCPA: Best Practices and Understanding Enforcement

Feb. 27, 2019

Preserving Privilege in Communications Involving In-House Counsel

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 13, 2019

FINRA Report Addresses Common Cybersecurity Risks and Recommends Mitigation Measures

Jan. 16, 2019

How a New Ethics Rule and Error in Manafort Case Highlight the Importance of Lawyers’ Technology Competence

Jan. 16, 2019

GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part Two of Two)

Jan. 9, 2019

GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part One of Two)

Jan. 9, 2019

Ten Cyber and Privacy Resolutions for the New Year

Dec. 19, 2018

Ponemon Report Cites Third-Party Risk Management Shortfalls and Offers Best Practices

Dec. 19, 2018

Ten Steps for Effective Crisis Communications

Dec. 5, 2018

Answers to Four Critical Questions on Privilege in Internal Investigations

Nov. 14, 2018

How Privacy Professionals Can Benefit Cybersecurity Programs: Practical Tips From Gap and Privacy Panacea

Nov. 14, 2018

A Roadmap to Preparing for and Managing a Cyber Investigation

Nov. 7, 2018

How GoDaddy Built an Effective Privacy Program

Oct. 10, 2018

Fifteen Tips for an Effective Cybersecurity Board Presentation

Sep. 12, 2018

Information Sharing in the Private Sector: Lessons From the Financial Services Industry

Aug. 22, 2018

How to Maximize a Cybersecurity Budget in a Time of Change

Aug. 22, 2018

Protecting Against the Security Risks of Departing Employees

Aug. 15, 2018

How to Build a Cybersecurity Culture Using People, Processes and Technology

Aug. 8, 2018

Essential Cyber, Tech and Privacy M&A Due Diligence Considerations

Jul. 25, 2018

Companies Face Increasing Cost of a Data Breach and an Inability to Detect Incidents Promptly, Surveys Show

Jul. 25, 2018

GDPR Essentials for the Financial Sector: Staying Compliant and Special Challenges (Part Three of Three)

Jul. 18, 2018

GDPR Essentials for the Financial Sector: Compliance Steps (Part Two of Three)

Jul. 18, 2018

Overcoming Barriers to Cross-Border Data Flows, Contract Provisions and Other Digital Transformation Issues

Jul. 11, 2018

GDPR Essentials for the Financial Sector: Benchmarking and Assessing the Risks (Part One of Three)

Jun. 20, 2018

Managing Cyber Investigations: A CISO and In-House Counsel Discuss Best Practices for Real-Life Scenarios

Jun. 6, 2018

Analyzing New and Amended State Breach Notification Laws

Jun. 6, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Two of Three)

May 30, 2018

Understanding the Intersection of Law and Artificial Intelligence

May 9, 2018

How Financial Services Firms Should Structure Their Cybersecurity Programs

May 2, 2018

Lessons on Litigation Privilege in Internal Investigations from the U.K.’s Bilta v. Royal Bank of Scotland Case

Apr. 18, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Vendors and M&A (Part Three of Three)

Apr. 11, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Assessments and Incident Response (Part Two of Three)

Mar. 28, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: It Starts With Governance (Part One of Three)

Mar. 28, 2018

EY Global Data Analytics Survey Finds Lack of GDPR Preparedness and Need for Cross-Functional Collaboration

Mar. 14, 2018

How Will the GDPR Affect Due Diligence?

Feb. 28, 2018

Financial Firms Must Supervise Their IT Providers to Avoid CFTC Enforcement Action

Jan. 31, 2018

Five Strategies a Privacy Attorney Uses to Bridge the Gap With Tech Teams

Jan. 17, 2018

NIST Program Manager Explains Pending Changes to Its Cybersecurity Framework

Jan. 17, 2018

Ten Cybersecurity Resolutions for 2018

Dec. 20, 2017

How to Make the Most of Limited Resources When Planning the Compliance Budget

Dec. 20, 2017

Benchmarking Employee Monitoring Policies for Practical Approaches

Dec. 6, 2017

Gathering and Analyzing Compliance Data

Nov. 8, 2017

How to Mitigate the Risks of Open-Source Software (Part Two of Two)

Nov. 8, 2017

IBM Cybersecurity Counsel Offers Techniques for Speaking the Same Language as the C-Suite When Managing Cyber Risk

Nov. 8, 2017

Managing Data Privacy Across Multiple Jurisdictions

Oct. 11, 2017

FTC Launches Stick With Security Series, Adding Detail and Guidance to Its Start With Security Guide (Part Two of Two)

Sep. 27, 2017

Deloitte Survey Shows Getting Skilled Cybersecurity Talent and Addressing Cyber Threats Among the Top Challenges for Financial Institutions

Sep. 27, 2017

Audit of Websites’ Security, Privacy and Consumer Practices Reveals Deficiencies Despite Overall Progress

Aug. 23, 2017

Tips From Google, Chase and P&G Privacy Officers on Developing Strong Privacy Leadership and When to Use Outside Counsel

Aug. 23, 2017

SEC Report Cites Cybersecurity Progress Along With Gaps in Training and Compliance

Aug. 9, 2017

What the Financial Sector Should Know to Recognize and Combat Cyber Threats (Part Two of Two)

Jul. 26, 2017

How the CCO Can Use SEC Guidance to Tackle Cyber Threats 

Jul. 12, 2017

A Discussion With eHarmony’s GC About the Role of In-House Counsel in Cybersecurity

Jul. 12, 2017

How Small Businesses Can Maximize Cybersecurity Protections and Prioritize Their Spending

Jun. 28, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part Two of Two)

Jun. 28, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part Two of Two)

Jun. 28, 2017

Surveys Show Cyber Risk Remains High for Financial Services Despite Preventative Steps

Jun. 14, 2017

How Internal Audit Can Improve Cybersecurity 

Jun. 14, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part One of Two)

Jun. 14, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part One of Two)

May 31, 2017

Using Big Data Legally and Ethically While Leveraging Its Value (Part Two of Two)

May 31, 2017

Advice on Incorporating Cybersecurity in eDiscovery

May 31, 2017

Defending Against the Rising Threat of Ransomware in the Wake of WannaCry

May 31, 2017

One Year Until GDPR Enforcement: Five Steps Companies Should Take Now

May 17, 2017

Advice From CPOs on Nurturing Privacy Programs on Any Budget

May 17, 2017

Using Big Data Legally and Ethically While Leveraging Its Value (Part One of Two)

May 3, 2017

Infrastructure Cybersecurity Challenges: A View Through the Oil and Gas Pipeline Lens

May 3, 2017

Compliance Implications of Brexit 

Apr. 19, 2017

Effective and Compliant Employee Monitoring (Part Two of Two)

Apr. 19, 2017

How to Ensure Cyber Risks Do Not Derail an IPO

Apr. 5, 2017

Effective and Compliant Employee Monitoring (Part One of Two) 

Mar. 22, 2017

Forensic Firms: Effective Vetting and Collaboration (Part Three of Three)

Mar. 8, 2017

Preparing For Ransomware Attacks As Part of the Board’s Fiduciary Duty

Mar. 8, 2017

Forensic Firms: Key Contract Considerations and Terms (Part Two of Three)

Feb. 22, 2017

Strategies for In-House Counsel Responsible for Privacy and Data Security 

Feb. 22, 2017

Forensic Firms: Understanding and Leveraging Their Expertise From the Start (Part One of Three)

Feb. 8, 2017

Getting to Know the DPO and How to Adapt Corporate Structure to Comply With GDPR Requirements for the Role (Part Two of Two)

Feb. 8, 2017

Protecting Attorney-Client Privilege and Attorney Work Product While Cooperating With the Government: Establishing Privilege and Work Product in an Investigation (Part One of Three)

Jan. 25, 2017

Getting to Know the DPO and Adapting Corporate Structure to Comply With the GDPR (Part One of Two)

Jan. 25, 2017

Triaging Security Projects in the Current Legal Landscape

Jan. 11, 2017

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part Two of Two)

Jan. 11, 2017

Ten Cybersecurity Priorities for 2017

Jan. 11, 2017

Tech Meets Legal Spotlight: Advice on Working With Information Security

Dec. 14, 2016

Advice From Compliance Officers on Getting the C-Suite to Show You the Money for Your Data Privacy Program

Dec. 14, 2016

Presidential Commission Recommends Ways For Public and Private Sectors to Improve Cybersecurity 

Dec. 14, 2016

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part One of Two)

Nov. 30, 2016

Using a Risk Assessment as a Critical Component of a Robust Cybersecurity Program (Part Two of Two)

Nov. 16, 2016

WilmerHale Attorneys Explain the Evolving Cybersecurity Environment of the Energy Sector

Nov. 16, 2016

Increasing Role of Counsel Among Operational Shifts Highlighted by Cyber Risk Management Survey

Nov. 2, 2016

FBI Veteran Discusses Using Law Enforcement’s Cyber Resources to Improve Security and Obtain Board Buy-In

Nov. 2, 2016

Guide to Getting Your Security Program Certified Under ISO 27001

Oct. 5, 2016

Examining Newly Released Privacy and Security Guidance for the Fast-Driving Development of Autonomous Cars

Oct. 19, 2016

Demystifying the FTC’s Reasonableness Requirement in the Context of the NIST Cybersecurity Framework (Part One of Two)

Oct. 19, 2016

Privacy Leaders Share Key Considerations for Incorporating a Privacy Policy in the Corporate Culture 

Oct. 19, 2016

Taking Action to Refocus on Security: Conversation With a CIO 

Oct. 5, 2016

ISAO Organization Releases a Roadmap to Cyber Threat Information Sharing 

Sep. 21, 2016

Seven Overlooked Business Costs of a Cyber Breach and Strategies for Avoiding Them

Sep. 21, 2016

What Private Companies Can Learn From the OPM Data Breaches

Sep. 21, 2016

Managing Data Privacy Challenges While Conducting Due Diligence and Investigations in China (Part Two of Two)

Sep. 7, 2016

Using Information Sharing to Combat Cyber Crime While Protecting Privacy 

Sep. 7, 2016

Understanding Data Privacy and Cybersecurity in China (Part One of Two)

Sep. 7, 2016

Navigating Online Identity Management’s Risks and Regulations

Aug. 24, 2016

Fulfilling the Ethical Duty of Technology Competence for Attorneys

Aug. 24, 2016

How GE’s Global CPO Approaches Shifting Regulations With Dynamic Implications 

Aug. 3, 2016

How Cyber Stakeholders Can Speak the Same Language (Part Two of Two)

Aug. 3, 2016

Six State Secrets and Data Privacy Considerations in Chinese Internal Investigations 

Jul. 20, 2016

Challenges Facing Chief Privacy Officers

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jul. 20, 2016

How the Financial Services Industry Can Manage Cyber Risk

Jul. 6, 2016

Understanding the Far-Reaching Impact of Chinese State Secrets Laws on Data Flow 

Jul. 6, 2016

Law Enforcement on Cybersecurity Matters: Corporate Friend or Foe? (Part Two of Two)

Jun. 22, 2016

How to Avoid Common Mistakes and Manage the First 48 Hours Post-Breach

Jun. 22, 2016

Law Enforcement on Cybersecurity Matters: Corporate Friend or Foe? (Part One of Two)

Jun. 8, 2016

Eight Attributes In-House Counsel Look For in Outside Cybersecurity Counsel

Jun. 8, 2016

Foreign Business Chambers Sign Open Letter Against Chinese Cybersecurity Regulatory Changes

Jun. 8, 2016

Minimizing Class Action Risk in Breach Response

May 25, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: Does Your Plan Work? (Part Three of Three)

May 25, 2016

Do You Know Where Your Employees Are? Tackling the Privacy and Security Challenges of Remote Working Arrangements

May 11, 2016

Google, CVS and the FBI Share Advice on Interacting With Law Enforcement After a Breach

May 11, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: Seven Key Components (Part Two of Three)

Apr. 27, 2016

Regulators Speak Candidly About Cybersecurity Trends, Priorities and Coordination

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Apr. 13, 2016

A Look Inside the Cybersecurity and Privacy Law Department of a Top Defense Company

Apr. 13, 2016

Study Analyzes How Companies Can Overcome Cybersecurity Challenges and Create Business Value

Mar. 30, 2016

How Law Firms Should Strengthen Cybersecurity to Protect Themselves and Their Clients

Mar. 30, 2016

Steps for Companies to Take This Week, This Month and This Year to Meet the Challenges of International Cyberspace Governance

Mar. 30, 2016

Twenty Ways a Company Can Use Behavioral Psychology to Improve Compliance

Mar. 16, 2016

CSIS’ James Lewis Discusses Balancing Law Enforcement and Privacy

Mar. 2, 2016

Implementing a Privacy by Design Program to Protect Corporate and Consumer Information

Mar. 2, 2016

How the American Energy Industry Approaches Security and Emphasizes Information Sharing

Feb. 17, 2016

Cybersecurity Preparedness Is Now a Business Requirement

Jan. 20, 2016

How In-House Counsel, Management and the Board Can Collaborate to Manage Cyber Risks and Liability (Part One of Two)

Jan. 20, 2016

Defining, Documenting and Measuring Compliance Program Effectiveness

Jan. 6, 2016

How the Financial Services Sector Can Meet the Cybersecurity Challenge: A Plan for Building a Cyber-Compliance Program (Part Two of Two)

Jan. 6, 2016

Opportunities and Challenges of the Long-Awaited Cybersecurity Act of 2015

Dec. 9, 2015

Building a Strong Cyber Insurance Policy to Weather the Potential Storm (Part Two of Two)

Dec. 9, 2015

Avoiding Privacy Pitfalls While Using Social Media for Internal Investigations

Dec. 9, 2015

Proactive Steps to Protect Your Company in Anticipation of Future Data Security Litigation (Part Two of Two)

Dec. 9, 2015

The Multifaceted Role of In-House Counsel in Cybersecurity 

Nov. 25, 2015

Building a Strong Cyber Insurance Policy to Weather the Potential Storm (Part One of Two)

Nov. 25, 2015

Proactive Steps to Protect Your Company in Anticipation of Future Data Security Litigation (Part One of Two)

Nov. 11, 2015

Target Privilege Decision Delivers Guidance for Post-Data Breach Internal Investigations

Nov. 11, 2015

What Companies Can Learn from Cybersecurity Resources in Pittsburgh

Oct. 28, 2015

Mastercard and U.S. Bancorp Execs Share Tips for Awareness and Prevention of Mushrooming Cyber Risk (Part Two of Two)

Oct. 14, 2015

Energy Industry Demonstrates Public-Private Cybersecurity Coordination

Oct. 14, 2015

Eight Ways Compliance Officers Can Build Relationships With the “Middle”

Sep. 30, 2015

Protecting the Crown Jewels Using People, Processes and Technology 

Sep. 30, 2015

Protecting and Enforcing Trade Secrets in a Digital World

Sep. 16, 2015

How the Legal Industry Is Sharing Information to Combat Cyber Threats

Sep. 16, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part Two of Two)  

Aug. 26, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part One of Two)

Aug. 12, 2015

How the Hospitality Industry Confronts Cybersecurity Threats that Never Take Vacations

Jul. 29, 2015

How to Prevent and Manage Ransomware Attacks (Part Two of Two)

Jul. 29, 2015

Analyzing and Complying with Cyber Law from Different Vantage Points (Part Two of Two)

Jul. 1, 2015

SEC Commissioner Says Public-Private Partnership Is Key to Effective Cybersecurity

Jul. 1, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part Two of Two)

Jun. 17, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part One of Two)

Jun. 17, 2015

In a Candid Conversation, FBI Director James Comey Discusses Cooperation among Domestic and International Cybersecurity Law Enforcement Communities (Part Two of Two)

Jun. 3, 2015

In a Candid Conversation, FBI Director James Comey Talks About the “Evil Layer Cake” of Cybersecurity Threats (Part One of Two)

Jun. 3, 2015

Private and Public Sector Perspectives on Producing Data to the Government

May 20, 2015

Weil Gotshal Attorneys Advise on Key Ways to Anticipate and Counter Cyber Threats

May 20, 2015

DOJ Encourages Cyber Incident Reporting and Advance Planning with Best Practices Guidance

May 20, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part Two of Two)

May 6, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part One of Two)

Apr. 22, 2015

Shifting to Holistic Information Governance and Managing Information as an Asset

Apr. 8, 2015

How Can a Company Mitigate Cyber Risk with Cross-Departmental Decisionmaking?

Apr. 8, 2015

Ten Actions for Effective Data Risk Management

Most-Read Articles

  • Apr. 14, 2021
    AI Compliance Playbook: Traditional Risk Controls for Cutting-Edge Algorithms
    • Artificial Intelligence
  • Mar. 17, 2021
    Privacy and Security Provisions in Vendor Agreements: Assessing the Risks
    • Third Parties
  • Mar. 31, 2021
    How Do You Put a System of Controls in Place When Your Target Keeps Moving?
    • Operations
  • Mar. 24, 2021
    Recommended Data Strategies As Google Swears Off Web Tracking
    • Online Advertising
  • Apr. 7, 2021
    Behind the Scenes: California AG’s Non-Public CCPA Inquiries
    • State Attorneys General

Cybersecurity Resolutions for 2021

In this quick take video, we talk about some of our cybersecurity resolutions for 2021.


H&M’s Data Protection Fine

In this short video, we discuss Germany’s highest GDPR fine so far in a case against H&M relating to their mishandling of sensitive employee data. The full article on the case is here.


CSLR Q3 Editorial Update

Register here to view the complimentary recording.


Apple App Privacy Policy Makes Waves


Summer 2020 Editorial Update

 

 

 

 

 

 

Register here to view the complimentary recording or here for an audio version.


CCPA and Third Parties

Editor-in-Chief Rebecca Hughes Parker discusses the California Attorney General’s final CCPA regulations and their effect on contracts with vendors in this video.

  • Privacy Policy
  • Terms of Use
  • About Us

© 2021 Mergermarket Limited. All rights reserved.

Sign inFree trialForgot password ×

Sorry, we do not recognise the username and password combination you have entered.

Please ensure you have typed your email address correctly and remember that passwords are case sensitive.

You are logged into a maximum of three different browsers/devices.

Please log in with one previously used and go to My Account to manage the browsers/devices you are using.

Forgotten password? Request Details


Not a user? Get a free trial

Thank you.

A reset link has been sent to the email address provided.

Please be aware that the time taken for mail to be delivered is dependent upon your Internet Service Provider. It should normally arrive within 5-15 minutes.

Request Details

Sorry, this email address is not recognised on our system




Thank you, we'll contact you about your trial