No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
2023 DSIR Deeper Dive: How International and Domestic Regulatory Enforcement Spotlights the Information Governance Tensions Between ‘There’ and ‘Here’ and Between ‘Keep’ and ‘Delete’
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Cybersecurity in Video Games & Esports
2023 DSIR Deeper Dive: State Privacy and Data Collection
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
2023 DSIR Report Deeper Dive into the Data
Cybersecurity: What Healthcare Providers Need to Know
2022 DSIR Deeper Dive: OCR’s Right of Access Initiative
Hot Topics: Risk Management for Cybersecurity
2022 DSIR Report Deeper Dive: The Expanding Landscape of State Data Privacy Laws
Can Cyber Investigations Be Canned? - Unauthorized Access Podcast
2022 DSIR Report Deeper Dive: Personal Data Deletion
Panel Pursuit: The Ins and Outs of Becoming a Preferred Panel Vendor - Unauthorized Access Podcast
Get Me Off This Ride: Understanding the Emotional Rollercoaster After a Ransomware Attack - Unauthorized Access Podcast
2022 DSIR Deeper Dive: Vendor Incidents
Dark Web Monitoring - Unauthorized Access Podcast
Unauthorized Access: An Inside Look at Incident Response
Mandatory Cyber Incident Reporting: Pros, Cons, and Next Steps
Defense In-Depth: Cybersecurity For Energy
Compliance is everywhere – it’s far from limited to just the workplace. From the moment we are born, we follow rules taught to us, rules we picked ourselves, or guiding principles that make sense to embrace. Parents,...more
Editor’s Note: This article covers valuable insights on artificial intelligence’s (AI) evolving role in cybersecurity and incident response shared during an expert panel discussion. As cybersecurity, information governance,...more
In the first installment of our cybersecurity series, we discussed the importance of developing and implementing practical Information Security policies and procedures within your organization as well as the ethical and legal...more
Over the past few months, the OIG shorts series focused on structuring and implementing a comprehensive and effective ethics and compliance program. Many times, this requires a mindset shift from a checking-the-box mentality...more
The DOJ has signaled that CEO and CCO certifications will become a staple of all corporate settlement agreements. Critics worry CEOs and CCOs face undue personal liability and argue it will dissuade CCOs from accepting the...more
Our Regional Compliance Conferences provide attendees with a forum to interact with local compliance professionals, share information about your compliance successes and challenges, and create educational opportunities for...more
Case closure times on employee hotline reports improved last year—one of the most promising findings in NAVEX Global’s 2017 Hotline Benchmark Report. The four-day drop in median closure time indicated in the 2016 report halts...more
About two years ago, the Securities and Exchange Commission (SEC) made history when it brought the first “pretaliation” whistleblower enforcement action against KBR Inc., a technology and engineering firm in Houston. The...more
Just about any compliance officer knows that reporting, training, and case management are three indispensable elements of an effective compliance program....more
One collection of terms I hear a lot is “tools, processes and people.” All three need to be successfully deployed to make a compliance program run properly while also creating an organizational culture that supports...more
Every company wants to create a culture of ethics. If the senior leadership ignores or downplays a culture of ethics, they have narrowed business opportunities for the company, its shareholders, and other stakeholders. A...more
Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more