News & Analysis as of

Data Security Sensitive Business Information Data Protection

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

Integreon

Best Practices for Reducing the Cost of a Cyber Incident for Small to Mid-Sized Businesses

Integreon on

Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more

Mitratech Holdings, Inc

[Webinar] Data Security Secrets for HR: Background Screening, I-9, & Beyond - March 6th, 1:00 pm CST

Mitratech Holdings, Inc on

In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more

Spilman Thomas & Battle, PLLC

Remote Work Strategies for Managing Cybersecurity Teams

Managing a remote cybersecurity team at colleges and universities involves addressing a unique set of challenges to ensure the security of sensitive data and infrastructure. There is an additional overlay of potential...more

Fisher Phillips

6 Proactive Tips to Address Employee Defection Concerns Before a Crisis Unfolds

Fisher Phillips on

It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more

Goldberg Segalla

Death by a Thousand Paper Cuts: The Scourge That Is Business Email Compromise

Goldberg Segalla on

In June 2014, the CEO of Omaha-based Scoular Company sent a series of emails to his company’s controller to let him know that the company was in negotiations to buy a Chinese company. The emails highlighted the sensitivity of...more

Epiq

CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)

Epiq on

Jerich Beason is joined by Erik Weinick. Erik's experience includes privacy, cybersecurity, bankruptcy, commercial torts, defamation/slander, regulatory to name a few. He is also the co-founder of Otterburg’s Privacy &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Please join Epiq and Microsoft Canada for an interactive roundtable discussion on the impact of digital transformation, compliance, data protection and Information Governance in Canada's Healthcare Sector. This 60-minute...more

Fisher Phillips

One Year Later: How the Evolving Work-from-Home Climate Prompts Reminders for Technology Best Practices

Fisher Phillips on

Perhaps no COVID-19 phenomenon will have a more lasting impact than the virtual office. Many employers recently marked the first anniversary of the decision to ask their employees to work from home in an effort to combat the...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft Canada on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft Canada would like to personally invite you to join a...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft Canada on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft Canada would like to personally invite you to join a...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Fisher Phillips

Not If But When: Cybercrime Targets Telework

Fisher Phillips on

As a result of the COVID-19 pandemic, millions of Americans have deserted the physical workplace. Modern technology and remote access capabilities have made it possible to transform almost any job to a telework position. As...more

Williams Mullen

Protecting Your Sensitive Information While Using Virtual Meeting Platforms

Williams Mullen on

Over the last several weeks, virtual meetings have become the new normal for many businesses. Improvements in the technology now mean that virtual meetings have a similar look and feel as in-person meetings. However, there is...more

Akin Gump Strauss Hauer & Feld LLP

Protecting Privacy in Virtual Meetings

As businesses and their employees come to terms with the new realities of working from home during the current COVID-19 pandemic, conference calls and virtual meetings are becoming more important than ever. The increase in...more

Sheppard Mullin Richter & Hampton LLP

“Internet of Things” Guidance to be Added to Cybersecurity Requirements for Agencies and Federal Contractors

In 2019, cybersecurity has become top-of-mind for most federal government contractors and agencies that share sensitive information. In addition to updated Department of Defense guidance and procedures for evaluating...more

Foley Hoag LLP - Security, Privacy and the...

Privacy and Data Security Strategies for Start-Up Companies

Start-up companies know that, when potential investors kick the tires, they will look carefully at the company’s business model and IP portfolio. These days, investors are also likely to look at whether the company is in...more

Snell & Wilmer

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

Snell & Wilmer on

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

Foley Hoag LLP - Security, Privacy and the...

CFTC Approves NFA Interpretive Notice on Information Systems Security Programs, Including Cybersecurity Guidance

The CFTC recently approved the National Futures Association’s interpretive notice (the “Cybersecurity Notice”) on the general requirements that members should implement for their information systems security programs...more

25 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide