News & Analysis as of

Information Technology Technology Risk Management

McDermott Will & Emery

DORA-Check

McDermott Will & Emery on

Digitale Bedrohungen und Cyberangriffe nehmen jedes Jahr zu – im Jahr 2023 verursachten sie in Deutschland Schäden von über 200 Milliarden Euro, wobei 72% davon auf Cyberangriffe zurückzuführen waren (Quelle: Bitkom,...more

BCLP

The EU’s Digital Operational Resilience Act 2022/2554 (DORA)

BCLP on

Long IT sub-contracting chains can make it hard for financial institutions to understand the vulnerabilities in their IT estate and the location of key functions (where these may be located in entities who do not have a...more

McDermott Will & Emery

Special Report: Understanding ONC’s Health AI Transparency and Risk Management Regulatory Framework

McDermott Will & Emery on

The Health Data, Technology, and Interoperability: Certification Program Updates, Algorithm Transparency, and Information Sharing (HTI-1) final rule, issued by the US Department of Health and Human Services (HHS) Office of...more

Opportune LLP

RightAngle Upgrade: Best Practices for a Successful…

Opportune LLP on

Upgrading critical applications has become a common challenge for corporate IT departments. Software vendors can deploy major releases more quickly because of improvements in coding and testing tools and some tie eligibility...more

Spilman Thomas & Battle, PLLC

HHS Cybersecurity Performance Goals and the Healthcare Industry

The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more

Opportune LLP

Efficient Systems Monitoring with RightAngle Database…

Opportune LLP on

In today's digital landscape, where data is often dubbed the "new oil," ensuring the smooth operation of databases is crucial for businesses. Regular oversight, including monitoring database metrics, is essential to optimize...more

Opportune LLP

Process Improvement Techniques That Optimize Efficiency…

Opportune LLP on

Process inefficiency can create problems that quietly stifle productivity and potential growth. In an era of rapid digitalization, companies that lag in business process improvement risk falling behind competitors who embrace...more

Spilman Thomas & Battle, PLLC

The Academic Advisor - Education Law Insights, Issue 9, November 2023

The Accreditation Overhaul for North Carolina (and Florida) Colleges - Last month, North Carolina Governor Roy Cooper signed House Bill 8 (HB 8) into law. In addition to establishing a new computer science requirement for...more

A&O Shearman

UK – NCSC publishes guidance on shadow IT

A&O Shearman on

The UK National Cyber Security Centre (NCSC) published its guidance on shadow IT on 27 July 2023. ‘Shadow IT’ are unknown assets that are used within an organisation for business purposes (including in certain cloud...more

Butler Snow LLP

How “Disappearing Apps” Entwine the Legal and Business World

Butler Snow LLP on

Imagine the excitement you might feel when you hear that your company has finally decided to rid itself of a frustratingly antiquated electronic data management and storage system. Not only is the current system outdated, but...more

Esquire Deposition Solutions, LLC

Technology Education Is Key to Delivering Value to Clients

Like anyone whose livelihood is based on intellectual capital, the best investments that lawyers can make are those directed at increasing their education, acumen, and professional ability. Are they making sure they have the...more

NAVEX

Artificial Intelligence – The Next Frontier of GRC Management

NAVEX on

It’s safe to say that there could be a whole series dedicated to Artificial Intelligence (AI) and the various use cases and ramifications of such groundbreaking technology. While there are ethical considerations, security...more

J.S. Held

Cyber Hygiene in 2023: Part 2 – Cyber Hygiene for Remote and Hybrid Workforce

J.S. Held on

In the first part of this mini-series, we identified that showing everyday users how to secure data may not be as important as highlighting why data security matters. The “why” helps everyday users appreciate and internalize...more

J.S. Held

Cyber Hygiene in 2023: Part 1 – Getting Buy-In from Users

J.S. Held on

As we progress through 2023, both new and old cyber challenges remain, but opportunities for improvement are present. For the upcoming year, assume the following: 1. Past challenges have not been overcome, and we still...more

Opportune LLP

5 Ways Automation Technology May Save Your Job, Not End It

Opportune LLP on

Technology is at the forefront of minimizing the negative impacts of constant change. We seek out advancements to modernize business, sequence our day, and make our lives easier. Among these advancements in the business...more

Sheppard Mullin Richter & Hampton LLP

Seeking HoNIST Opinions, Part II – NIST Invites Comments on Major Revision to Cyber Supply Chain Risk Management Practices and...

The National Institute of Standards and Technology (“NIST”) is seeking comments on its second draft of NIST SP 800-161 Rev. 1, “Cyber Supply Chain Risk Management Practices for Systems and Organizations,” published on October...more

Vinson & Elkins LLP

The Pandemic Lessons: The Future Of ESG And How It Will Define Business Success

Vinson & Elkins LLP on

The rapidly increasing importance of a company’s environmental, social and governance (ESG) performance to its business value, has been a critical trend leading into 2020. This trend was accelerated by the COVID-19 pandemic,...more

Thomas Fox - Compliance Evangelist

AI in Compliance – Strategies for AI Implementation

This week, I am writing a blog post series based upon the MIT Sloan Management Review Special Report: Making Good on the Promise of AI. Today, I want to consider the article People and Machines: Partners in Innovation by...more

Thomas Fox - Compliance Evangelist

AI, Compliance & the Value of Collaboration: Part II – AI Assisting Compliance

In this multi-part blog post series, I am exploring the increased use of technology to continue to drive the performance of corporate compliance programs. I am considering the use of Artificial Intelligence (AI) in a best...more

Thomas Fox - Compliance Evangelist

Using AI in Compliance: Going Forward – Part IV

Over the past few blog posts, I have been considering the use of artificial intelligence (AI) to make compliance more robust in the three prongs of prevent, detect and remediate. ...more

Thomas Fox - Compliance Evangelist

Using AI in a Compliance Function – Part III, Implementation

I am exploring the use of artificial intelligence (AI) to make compliance more robust in the three prongs of prevent, detect and remediate. This series is based upon an article in the Harvard Business Review (HBR), entitled...more

21 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide