Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Uncovering Hidden Risks - Episode 7 - Cloud Native Data Loss Prevention: The Future of Data Security
No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day
Sitting with the C-Suite: Learning How to Aggregate Evidence Outside of the Legal Industry
CF on Cyber: Leveraging the Incident Response Guide to Prepare for the CCPA
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Summary: If you're tackling compliance and security challenges in an AI-driven world, this post is essential. Discover how Microsoft Purview and Copilot for Security streamline processes, enhance security, and boost...more
The most important type of data that no one is thinking about, and how it could be the fatal flaw in your data loss prevention strategy. A company’s Confidential Business Information (CBI) contains its most critical...more
In an era where a single social media mishap can spiral into a legal nightmare, social media archiving is increasingly becoming a safety net for organizations....more
Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing....more
It’s time to be thankful – for eDiscovery case law! Our November 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses permissive inference sanctions for destruction of video, sanctions for failing to...more
Legal teams go to great lengths to identify and protect privileged information from inadvertent disclosure. There is another type of information that could be just as damaging to the company as a whole, but it receives far...more
Illumination Zone: Matthew L. Miller, Senior Vice President, Information Governance and Data Privacy for EDRM Trusted Partner, HaystackID, sits down with Kaylee and Mary to talk about his journey to eDiscovery, a team...more
Slack is a trailblazer in modern workplace communication. As more companies look to Slack as their primary communication tool, a growing volume of business records and sensitive information accumulates on its platform. From…...more
Maithili Dandige, Partner Group Product Manager at Microsoft, joins Erica Toelle and guest host Shilpa Bothra on this week’s episode of Uncovering Hidden Risks. Maithili’s team is behind Microsoft Purview products such as...more
Employee data theft happens frequently, and especially in current times where employees are leaving or being terminated. Some may be due to layoffs while others may leave for personal or other reasons. However, there is...more
Data leakage, also known as data exfiltration or data spillage, refers to the unauthorized transfer of sensitive data from an organization’s internal network to an external location. This can occur through various means, such...more
Data migration is a critical process that involves transferring data from one location, format, or application to another. Typically, this occurs when an organization introduces a new system or location for its data, often...more
Data consolidation is a critical outcome of any successful eDiscovery data migration strategy, but with the rapid increase in data volumes and the proliferation of new data sources from workplace applications, it has become a...more
The average cost of a data breach is on the rise. According to the 2022 ForgeRock Consumer Identity Breach Report, the average cost in 2021 of recovering from a data breach in the U.S. is $9.5 million — an increase of 16%...more
Today’s Privacy Reality: AI, Assessments, Breach and DSARs is a webcast that will bring together a panel of experts to discuss the impact of artificial intelligence (AI) on privacy and cybersecurity. The panel will address...more
As the corporate workplace continues to evolve—encompassing hybrid work environments, bring your own device policies, and cloud-based storage—companies are well-advised to consider areas of increased vulnerability and whether...more
Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more
The Committee on Foreign Investment in the United States (CFIUS) is a U.S. government interagency committee with the responsibility to review foreign investments in U.S. businesses and real estate transactions for national...more
Electronic information is ubiquitous and its use and misuse can pose serious ethical problems for attorneys. Attorneys use electronic information to communicate with the public and with clients, to advertise their services,...more
Organizations create and share enormous volumes of sensitive information, and with the rise of SaaS applications and collaboration tools, this information can exist in many places: emails, Slack messages, Jira tickets,...more
Some things that are great on their own turn out to be even better as half of a dynamic duo. We’re talking peanut butter and jelly. Burgers and fries. Hall and Oates. And now: data loss prevention (DLP) and ediscovery....more
Data volumes are growing at breakneck speeds and managing risk with collaborative enterprise data sources becomes more critical as more people work from home. Enterprise legal, compliance, and governance teams struggle to...more
In case the complexities of corporate data weren’t creating enough turbulence to keep corporate and legal teams up at night, along comes a prolonged pandemic to really shake things up. Because now, a complex data landscape...more
How do you predict when an employee is about to leave your company? Many people say that experience, personal knowledge of the specific person, and “gut feel” can forecast when someone may leave. But what if – rather than...more