Meeting the Needs of General Counsel: Beyond the Basics of Legal Advice - On Record PR
Studying the Global Legal Market to Keep Businesses Ahead of the Curve: On Record PR
PODCAST: Williams Mullen's Gavels & Gowns - Title IX Regulations - Changes on the Horizon
Hot Topics in International Trade-Reasonable Care
Openings of Openings
The Basics of Opening Statements
Podcast - Effective Trial Language Part 2: Legalese
Transparency and the Open Payments Program
Navigating GSA Audits Compliance Strategies and Best Practices
Podcast - Bringing Mindfulness and Best Practices to Trial Law
Law Brief®: Rich Schoenstein and Annmarie Giblin Discuss Cyber Law
Podcast - The Different Ways Lawyers Prepare Notes for Trial
Podcast - The Key to a Successful Trial Lawyer
The Presumption of Innocence Podcast: Episode 26 - Crisis Communication: Managing Perception & Mitigating Reputational Damage
Podcast - The Unwritten Rules of Trial Practice
Building a law firm off of 1.7 million TikTok followers - Legally Contented podcast
Nonprofit Basics: Meeting Minutes Best Practices
The Risk Roundtable: Best Practices for Litigation to Help After an Accident
Constangy Webinar - Spring Cleaning: How to Keep your HR Practices Mess Free
AI: Technology, Opportunities, Risks, and Best Practices (Part Two) – Regulatory Oversight Podcast
CISA’s Incident Response Guide outlines ways in which WWS owners and operators can engage with federal agencies to prepare for, mitigate, and respond to cyber incidents, including best practices for incident response and...more
As we’ve written about in the past, the SAFETY Act has the potential to help companies mitigate their risk from cyber-terrorism. As previously noted, the statute has never been fully tested in courts, so the full contours of...more
• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more
New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more