News & Analysis as of

Data Breach Data Protection Best Practices

EDRM - Electronic Discovery Reference Model

[Webinar] Unlocking the Power of ROPA: Why It Matters, Latest Privacy Trends, and How It Protects Your Business - August 20th,...

Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing emphasis on data transparency, it's essential to stay ahead...more

Association of Certified E-Discovery...

[Webinar] Stay ahead of the latest privacy trends: Unlocking the power of ROPA - September 10th, 10:00 am PDT

Why it matters and how it protects your business - Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing...more

Kennedys

[Webinar] Ransom-ready: Navigating recovery, remediation and legalities - June 4th, 11:00 am - 12:00 pm EST

Kennedys on

Kennedys and CYPFER are delighted to invite you to our 60 minute webinar on Tuesday, June 4, 2024. We will explore the practical and legal implications involved in navigating a ransomware event, and how decision-making in a...more

Integreon

Best Practices for Reducing the Cost of a Cyber Incident for Small to Mid-Sized Businesses

Integreon on

Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more

Miller Nash LLP

[Webinar] Privacy 101: Navigating the Digital Frontier - June 4th, 9:00 am - 10:00 am PT

Miller Nash LLP on

Join us for an insightful webinar with Miller Nash’s head of privacy and data security team, Eva Novick, and colleague, Delfina Homen, where we will delve into the essentials of privacy and data security in 2024. Whether...more

EDRM - Electronic Discovery Reference Model

[Webinar] “Reasonable” Cyber Best Practices: Sword or Shield? - April 24th, 1:00 pm - 2:00 pm ET

In an era where digital information flows ceaselessly, the specter of data breaches looms large. Whether these breaches are the result of deliberate attacks or unintentional leaks, they can range from being merely...more

Osano

Privacy Impact Assessment Guide: 7 Best Practices to Master PIAs

Osano on

One of data privacy’s greatest challenges is that it can all feel just so abstract. What does it really mean for an individual’s data to be at “risk”? What activities are riskier than others?...more

Mitratech Holdings, Inc

[Webinar] Data Security Secrets for HR: Background Screening, I-9, & Beyond - March 6th, 1:00 pm CST

Mitratech Holdings, Inc on

In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more

Brooks Pierce

Business Associate Victim of Ransomware Attack Pays $100,000 to HHS OCR

Brooks Pierce on

Is your organization a business associate? You could be subject to enforcement action if you fail to protect health information within your control from ransomware attacks. In October, for the first time, the U.S....more

Health Care Compliance Association (HCCA)

[Webinar] Cybersecurity & Incident Response: 2023 Update on Best Practices for Detecting, Avoiding, Responding to a Cybersecurity...

Learning Objectives: - Overview of current US privacy/cybersecurity laws and regulation - Current cyber threats: overview of recent trends in cyberattacks and risk areas for healthcare providers - Incident Response: how...more

Akin Gump Strauss Hauer & Feld LLP

HHS Unveils New Cybersecurity Guide

The U.S. Department of Health and Human Services (HHS) continues to play a central role in helping health care organizations defend against cybersecurity threats, issuing cybersecurity briefs and a new cybersecurity framework...more

Venable LLP

[Webinar] Nonprofit Organization Data Privacy and Security - March 16th, 12:30 pm - 1:30 pm ET

Venable LLP on

The regulatory landscape governing how your nonprofit must protect its data and what it needs to do in the event of a breach is constantly shifting. With new privacy laws in multiple states—including most notably Colorado—and...more

Association of Certified E-Discovery...

[Webinar] Data Breach Review: Best Practices and Top Technology Considerations - December 2nd, 1:00 pm - 2:00 pm EST

There’s no denying that data breaches are a major concern for organizations of all sizes, 2021 saw 1,860 data breaches occur (a record high), and 81% of those involved sensitive information like social security numbers and...more

Esquire Deposition Solutions, LLC

Rx for Law Firm Cyberthreats: Planning, Training, and Vendor Due Diligence

We’re all familiar with the adage that, for businesses, the question is not “if” but “when” a data breach or ransomware attack will occur. The odds of a cyberattack aren’t as high as death and taxes but they’re approaching a...more

Reveal

Healthcare Organizations Continue to Be Under (Cyber) Attack

Reveal on

Are the moles winning? A few months ago, I wrote how the job of protecting protected health information (PHI) regulated by the Health Insurance Portability and Accountability Act (HIPAA) is becoming more like a game of...more

Wyrick Robbins Yates & Ponton LLP

A Prelude to Enforcement: Colorado AG Issues Remarks Opining on What Constitutes Reasonable Security Measures

Last month, on Data Privacy Day, Colorado’s Attorney General Philip Weiser released prepared remarks entitled “The Way Forward on Data Privacy and Data Security” that shed some light on his approach to enforcing Colorado’s...more

Hinshaw & Culbertson LLP

[Webinar] Cyber and Privacy Law for School Districts: An Overview of the Legal Issues and Risks - February 17th, 10:00 am CT

From remote classrooms to student devices—and everything in between—school districts have been thrown into the deep end with no life jacket when it comes to managing cybersecurity. Join us for a discussion of the unique...more

Ward and Smith, P.A.

Upside Down: Privacy and Data Security LARP

Ward and Smith, P.A. on

A Ward and Smith attorney, Information Technology professional and Privacy Officer outlined a variety of best practices and tips for businesses dealing with data security and privacy issues. The webinar, one in a series...more

Association of Certified E-Discovery...

[Webinar] Ten Recent Cybersecurity and Data Breach Trends You Need to Know - January 12th, 1:00 pm - 2:00 pm EST

It seems there is another high-profile data breach just about every day that results in issues for organizations ranging from compromised personal data of customers to millions of dollars lost in sanctions or judgments to...more

Epstein Becker & Green

Best Practices to Protect Against Increased Cyber Threats During the Holiday Season

Epstein Becker & Green on

Recent data thefts and systems intrusions, particularly with respect to ransomware, have assured that cybersecurity is top of mind for corporate executives and compliance officials. We at EBG have tried to keep you up to date...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

[Webinar] Privacy, Data and Cyber Security: The Current Legal Landscape - November 11th, 12:00 pm - 1:00 pm EST

Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more

Arnall Golden Gregory LLP

AGG Talks: Technology - In the Balance: Interoperability and Security

Our podcast series features AGG attorneys and guests discussing challenges they’ve encountered when assisting clients on business and legal issues related to the Technology industry. While all topics will have a legal...more

Oberheiden P.C.

Cybersecurity Compliance Programs for Law Firms

Oberheiden P.C. on

Law firms process sensitive information on a daily basis. Confidential client data is targeted by hackers and insiders for a variety of reasons including financial gain or retaliatory purposes. When a law firm has a security...more

NAVEX

The State of Risk Alignment - Alliances Grow Between IT Security and IRM

NAVEX on

While business risks abound, including intensified cybersecurity attacks, the impact of rapid technological advances and increasing regulations, there are healthy ways to uncover and mitigate risks. Organizations are...more

Goodwin

Setting A New Standard: Data Privacy And Corporate Social Responsibility

Goodwin on

Corporate Social Responsibility (“CSR”) and Environmental, Social, and Governance (“ESG”) practices have increasingly become priorities for many organizations as they assess their obligations to their employees, customers,...more

64 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide