News & Analysis as of

Electronically Stored Information Cyber Attacks

EDRM - Electronic Discovery Reference Model

Cyber Diplomacy: A New Frontier in International Relations and Professional Practice

ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more

Pagefreezer

The 2024 ESI Risk Management & Litigation Readiness Report

Pagefreezer on

New study finds legal departments struggling to manage electronically stored information (ESI), resulting in delays and fines. Review the key findings from the 2024 ESI Risk Management & Litigation Readiness Report....more

Association of Certified E-Discovery...

[Webinar] Navigating the Cybersecurity Landscape: Insights from Legal and Insurance Experts - May 14th, 9:00 am - 10:00 am PDT

In today's digital world, organizations are increasingly vulnerable to a wide variety of cyber threats that can wreak havoc on their operations, jeopardize the security of confidential information, negatively impact...more

TransPerfect Legal

eDiscovery Trends in 2024

TransPerfect Legal on

TransPerfect Legal experts from across the globe sat down earlier this month to discuss the trends that will affect the eDiscovery industry (and all those who use the technology) in 2024. Stefan Nigam (UK), Tom Balmer...more

Robinson+Cole Data Privacy + Security Insider

The Risks of Excessive Data Retention and Tips for Information Security

In today’s digital age, our every action generates a trail of data. From online searches to credit card details, this data is collected by companies to enhance their services. However, the question arises – how long should...more

EDRM - Electronic Discovery Reference Model

Cyber Risk Management Chronicles | Episode X | Biometrics - the Ticket to Flying High or a Turbulent Ride for Authentication?

Feeling seen, but maybe too seen - Stepping off the plane this past August after a long international flight, the last thing I wanted was a lengthy wait at US Customs, the final sentinel between me and a good night’s sleep. I...more

Onna Technologies, Inc.

[Webinar] Declutter Your Data: Strategies for Efficient Data Retention & Risk Reduction - October 25th, 1:00 pm - 2:00 pm ET

In an era where data is often referred to as the “new oil,” an abundance of it can lead to unexpected challenges. Back in 2012, IDC estimated that information workers spent an average of 9.4 hours per week simply sifting...more

White and Williams LLP

Electronic Medical Records May Be Subject to On-site Inspection

On-site expert review of electronic medical records (“EMR”) may no longer be a last resort in professional liability matters in New Jersey. A three-judge panel in New Jersey’s Appellate Division recently upheld a trial...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Association of Certified E-Discovery...

Cyber Incident Response and eDiscovery Are Not One in the Same: Understanding the Key Differences and Associated Risks

With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more

EDRM - Electronic Discovery Reference Model

[Webinar] Cyber Sidebar: The NIST Cybersecurity Framework Applied to the Legal Profession - November 15th, 1:00 pm - 2:15 pm ET

The legal profession is under constant threat of cyberattacks and breaches. Cybersecurity challenges exist in many contexts but the legal profession is particularly vulnerable due to its federated environment and disparate...more

Reveal

Identifying and Protecting Data Within Your Organization is a Moving Target

Reveal on

Organizations have a lot to contend with regarding their data these days. Data is more sensitive than ever, due to ever-changing data privacy laws. Yet, it’s also under siege more than ever with an increasing number of...more

Association of Certified E-Discovery...

[Webinar] Data Breach Response -- Technologies, Techniques and Technicalities - February 17th, 1:00 pm - 2:00 pm EST

The retention of prolific sensitive, personal electronic information has essentially become a responsibility inherent in the conduct of modern business. From the maintenance of medical records by a healthcare provider to the...more

Robinson+Cole Data Privacy + Security Insider

Broward Health Data Breach Affects 1.3 Million Individuals

On January 1, 2022, Broward Health, which operates dozens of health care facilities in Broward County, Florida, notified over 1.3 million individuals that a threat actor gained access to and removed data from its system on...more

Association of Certified E-Discovery...

[Webinar] Ten Recent Cybersecurity and Data Breach Trends You Need to Know - January 12th, 1:00 pm - 2:00 pm EST

It seems there is another high-profile data breach just about every day that results in issues for organizations ranging from compromised personal data of customers to millions of dollars lost in sanctions or judgments to...more

Reveal

Be Aware, Be Very Aware – of Cybersecurity Awareness Month!

Reveal on

Tomorrow is October 1st, and the end of the month is Halloween. So, the phrase “be afraid, be very afraid” (a tagline* which came from the 1986 movie The Fly) seems very appropriate for the end of October. But the phrase “be...more

Reveal

Hackers Will Not Only Take Your Money, They Could Also Take Your Patients’ Lives

Reveal on

Go to just about any news site today and there is probably a new story about a data breach that costs a company millions of dollars. Just in the past few weeks, we’ve seen Colonial Pipeline pay as much as $5 million in...more

Association of Certified E-Discovery...

[Webinar] Risky Business – Protecting Your Data From Hackers? - April 21st, 11:30 am - 1:00 pm CDT

It’s hard to read the news these days without hearing about another major breach. No one is immune to these attacks including government, social media, law firms, dating websites, credit reporting agencies, and even our...more

Association of Certified E-Discovery...

[Virtual Event] The Intersection of Cybersecurity and eDiscovery - March 25th, 2:00 pm - 3:00 pm GMT

Cyber-attacks can happen to any organisation around the globe and when an incident or breach occurs, they must act quickly to determine the extent of the data exposure and notify all individuals impacted by the breach....more

Association of Certified E-Discovery...

Defining Doxing And Learning How to Avoid It

From August 2015 to August 2017, a man named Rodney Phipps was sentenced to prison for making fake phone calls to emergency services—calls that would end up sending SWAT and police to strangers’ residences in practice known...more

Association of Certified E-Discovery...

[Webinar] How To Prepare for Cybersecurity and Respond to a Data Breach - November 19th, 12:00 pm - 1:00 pm CT

Consilio, SecureIT360 and Polsinelli will take a deep dive into responding to a cyber-attack and data breach. Learn about what to expect when you arrive on the scene following a cyber incident, and best practices for what...more

Mitratech Holdings, Inc

Data Governance And Data Management: What’s The Difference?

Mitratech Holdings, Inc on

A lot of attention is now being paid to the topic of data governance, and what it means versus data management. Within the last few years, data governance has leapt from an esoteric term bandied about only by IT...more

Epiq

Yes, Blockchain Can Be Hacked Too

Epiq on

Many different organizations, including those in the legal industry, use blockchain for several business functions. Blockchain allows users to record transactions over a distributed network of computers. The server is secure...more

Hogan Lovells

Disrupting the law

Hogan Lovells on

As developing countries continue to gain access to technology and begin to innovate existing systems, it is has become clear that technology has stopped being an end in itself but an instrumental tool and means to accelerate...more

Association of Certified E-Discovery...

Chips Ahoy: #Meltdown and #Spectre Implications for Legal Professionals Part I

Recent press reports talk about a newly discovered form of security threat that involves attackers exploiting common features of modern microprocessors (aka chips) that power our computers, tablets, smartphones, and other...more

36 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide