The Privacy Insider Podcast Ep. 7: David, Goliath, and Data Privacy Part II: Max Schrems
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Healthcare Document Retention
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Navigating State Privacy Laws: A Conversation with Oregon & Texas Regulators about Privacy Enforcement
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Information Security and ISO 27001
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
Data Centers: Demand, Development, and Future Challenges With Ali Greenwood — TAG Infrastructure Talks Podcast
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
In today’s digital age landscape, where 27% of law firms experience security breaches, protecting sensitive client information is paramount for legal professionals. With cyber threats becoming more sophisticated, relying...more
The Masters Conference in Washington, DC, on April 17th, 2024, was a bustling event with crowded sessions throughout the day. The agenda featured a diverse range of topics, such as Modern Data, Link Files, eDiscovery Case...more
Data is likely your organization’s most valuable asset — or, at least, it could be. But chances are that it’s also one of your most underused and underappreciated assets. Every data source has the potential to yield a...more
Cybersecurity is one of the biggest challenges facing contemporary society. With the advancement of digital technologies and the ever-increasing dependence on information systems to perform the most diverse activities, the...more
Hey there, cyber sleuths! TechnoCat, Cat Casey, here, ready to uncover some digital secrets! As we’ve chatted before, eDiscovery is the Sherlock Holmes of the digital age....more
Hey there, cyber sleuths! Your friendly neighborhood TechnoCat, Cat Casey, here to talk about a vital player in our eDiscovery game: PII, or Personally Identifiable Information. And folks, it’s not just about the usual...more
In Short - The Situation: Following a cyberattack on a law firm's systems, the Securities and Exchange Commission ("SEC") subpoenaed the firm for information, including the identity of clients whose information may have...more
Editor’s note: This post was originally published in October 2020 and has been updated for accuracy and comprehensiveness. They say more is better. And that’s true in many cases, but not when we’re talking about a stockpile...more
Exceeding Corporate Client Expectations - The first session of the conference, moderated by Richard Clark from CloudNine, focused on introducing new ways of deepening the relationship between corporate in-house and outside...more
In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more
Since its founding 2008, Exterro has continued to innovate and improve its best-in-industry end-to-end e-discovery platform. Exterro’s recent acquisition of Zapproved strengthens their commitment to empowering customers to...more
With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more
From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more
Single-Tenant Architecture: A New Paradigm for Cloud Security - Alarm bells rang when several respected ediscovery providers announced they had shut down their sites due to security breaches. The causes were different for...more
Let’s talk about the “New Cybersecurity Triad.” We’re all pretty familiar with the venerable C-I-A Triad whereby secure data exhibits the characteristics of Confidentiality, Integrity, and Availability. But today’s...more
Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program. The efficacy of a program is only theoretical until thorough testing is conducted. One of...more
Businesses are facing more uncertainty around talent and employee management than ever before. Whether it’s challenges around working from home, employee burnout, the “Great Resignation,” or the threat of recession-fueled...more
Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more
Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more
Whether you’re a partner at a law firm, General Counsel at a Corporation, or a leader of legal services within a government agency, you can’t accomplish the goals of your legal team efficiently and effectively without...more
In case the complexities of corporate data weren’t creating enough turbulence to keep corporate and legal teams up at night, along comes a prolonged pandemic to really shake things up. Because now, a complex data landscape...more
I'm still elated to see the return to in-person events - there is so much to share now that we're getting back together. Earlier this month, I returned to the stage at Legalweek to share ideas with the brilliant Linn Freedman...more
This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more
Corporate legal departments have seen some significant changes over the past couple of years. The ongoing explosion of data volumes and rapid adoption of new communications technologies have made e-discovery operations more...more