News & Analysis as of

Information Governance Data Security Today's Popular Updates

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

HaystackID

[Webcast Transcript] Notable Trends in US Privacy Law

HaystackID on

Editor’s Note: On January 17, 2024, HaystackID hosted a cogent webcast, “Notable Trends in US Privacy Law,” featuring HaystackID privacy and compliance expert Chris Wall, and an esteemed panel of privacy and compliance...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

BCLP

Data and Cybersecurity - European Union Legislation and Proposals

BCLP on

Updated June 2023 - The BCLP Data Privacy & Security team is tracking EU law developments relevant to data and cyber security. This tracker summarizes the effect and status of the following: the Digital Services Act, the...more

Epiq

Deepfakes Bring Deep Risk

Epiq on

Most people know what a deepfake is but have not put much thought into how it could affect business operations. Deepfakes are videos, pictures, or audio that have been convincingly manipulated to misrepresent a person saying...more

Reveal

A Guide to Efficient Data Remediation for Law Firms in 2023

Reveal on

Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more

Ankura

Outsourcing Services: An Increasingly Common Origin for Insider Threats in the Supply Chain

Ankura on

On May 10, 2022, a former Coca-Cola chemist was sentenced to 14 years in prison for selling trade secrets to a Chinese government-backed corporation. This example demonstrates the way the supply chain increasingly presents...more

K&L Gates LLP

Litigation Minute: Navigating Government Inquiries After a Data Security Incident

K&L Gates LLP on

WHAT YOU NEED TO KNOW IN A MINUTE OR LESS - A government inquiry in the context of data security typically arises in one of two ways: either a data security incident involving a threat actor occurs, or a government agency is...more

Reveal

Healthcare Organizations Continue to Be Under (Cyber) Attack

Reveal on

Are the moles winning? A few months ago, I wrote how the job of protecting protected health information (PHI) regulated by the Health Insurance Portability and Accountability Act (HIPAA) is becoming more like a game of...more

Wiley Rein LLP

[Webinar] Privacy and Security in Transactional Due Diligence - May 25th, 12:00 pm - 1:00 pm EDT

Wiley Rein LLP on

Join us to discuss effective approaches to managing due diligence on privacy and cybersecurity issues across transactions. Companies considering acquisitions or joint ventures will need to engage in effective management of...more

Association of Certified E-Discovery...

[Webinar] Data Privacy for eDiscovery Pros: Strategy and Execution - March 17th, 1:00 pm - 2:00 pm EDT

This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more

Reveal

Protecting Healthcare Records These Days is Like a Game of “Whac-a-Mole”

Reveal on

You’ve probably either played the game “Whac-a-Mole” yourself as a kid, or you watched your kid play it, at a Chuck E. Cheese or another similar arcade. It’s a simple game with five holes in which moles pop up and a soft...more

Hinshaw & Culbertson LLP

[Webinar] Cyber and Privacy Law for School Districts: An Overview of the Legal Issues and Risks - February 17th, 10:00 am CT

From remote classrooms to student devices—and everything in between—school districts have been thrown into the deep end with no life jacket when it comes to managing cybersecurity. Join us for a discussion of the unique...more

Reveal

Learning from Cybersecurity Stats: What’s the Best Way to Limit Your Data Exposure?

Reveal on

Earlier this month, I presented a webinar for ACEDS titled Ten Recent Cybersecurity and Data Breach Trends You Need to Know with Debbie Reynolds, who is known as the “Data Diva”. It was a fun and informative webinar where we...more

HaystackID

[Webcast Transcript] Information Governance, Data Privacy, and Data Breach Exposure Mitigation

HaystackID on

Editor’s Note: On September 30, 2021, HaystackID shared an educational webcast presented at the 2021 Privacy + Security Fall Academy. The webcast provided viewers with a framework and solutions for deploying privacy-based...more

Reveal

Healthcare Organizations Must Deal with their Shadow Information Problem

Reveal on

A myopic focus on protecting EMR (Electronic Medical Records) systems has left healthcare organizations open to shadow information risk. In a world where hackers and ransomware criminals are regularly compromising healthcare...more

Reveal

Why a Global Approach to InfoGov is Necessary with Today’s Emerging Markets

Reveal on

The Legal Technology industry tends to focus heavily on North America, and in many ways, it’s easy to see why. After all, technologies and workflows must align with the jurisdictions they are serving, which vary not only from...more

Reveal

Law Firms and Cyber Attacks: InfoGov Isn't Just for Corporate Legal Teams Anymore

Reveal on

From the beginning, Information Governance, or InfoGov, has been focused on helping Corporations manage their data, often involving the legal, compliance, and IT departments working together. But what about a corporation’s...more

Reveal

There Are More Challenges in Managing Discovery in Healthcare Than You Probably Realize

Reveal on

A few months ago on this blog, I wrote about using Artificial Intelligence (AI) to keep up with the “alphabet soup” of compliance. An important area to address from a compliance standpoint is health data and at least two of...more

Onna Technologies, Inc.

The beginner’s guide to Microsoft Teams eDiscovery

The beginner’s guide to Microsoft Teams eDiscovery - Welcome to our Beginner’s Guide to Microsoft Teams eDiscovery — where we’ll cover everything you need to know about eDiscovery for Microsoft Teams, the communication and...more

Association of Certified E-Discovery...

Data Protection and Cybersecurity Today

Ari Kaplan recently spoke with Kenya Parrish-Dixon, a member of the ACEDS Global Advisory Board and the General Counsel and Chief Operating Officer for Empire Technologies Risk Management Group, a cybersecurity, information...more

BakerHostetler

The New China Data Security Law and the Impact on Multinational Companies

BakerHostetler on

On June 10, 2021, the National People’s Congress of the People’s Republic of China (PRC) approved the passage of the Data Security Law (DSL), which will take effect on Sept. 1, 2021. Overview - Unlike the PRC’s Cybersecurity...more

HaystackID

[Webcast Transcript] Remote Security for Distributed Workforces: Review Challenges and Considerations

HaystackID on

Editor’s Note: On March 17, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how organizations are preparing and responding to increasing security and...more

TransPerfect Legal

The Colonial Pipeline Ransomware: Know Where Your Key Data Lives, Decrease Your Threat Footprint

TransPerfect Legal on

The Colonial Pipeline ransomware attack was the largest in the energy sector to date, and with cybercrimes up 100% from 2019 to 2020 this is only the beginning for 2021. Many organizations are taking on a digital...more

Morgan Lewis - Tech & Sourcing

United Kingdom Forms Cyber Security Council

As part of its five-year, £1.9 billion ($2.65 million) national cybersecurity strategy, the UK government on February 9 announced the launch of the UK Cyber Security Council (Council), a new independent body to support career...more

39 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide