Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Jannica Houben and Katarzyna Golonka on Complex Investigations
Digitale Bedrohungen und Cyberangriffe nehmen jedes Jahr zu – im Jahr 2023 verursachten sie in Deutschland Schäden von über 200 Milliarden Euro, wobei 72% davon auf Cyberangriffe zurückzuführen waren (Quelle: Bitkom,...more
Long IT sub-contracting chains can make it hard for financial institutions to understand the vulnerabilities in their IT estate and the location of key functions (where these may be located in entities who do not have a...more
The Health Data, Technology, and Interoperability: Certification Program Updates, Algorithm Transparency, and Information Sharing (HTI-1) final rule, issued by the US Department of Health and Human Services (HHS) Office of...more
Upgrading critical applications has become a common challenge for corporate IT departments. Software vendors can deploy major releases more quickly because of improvements in coding and testing tools and some tie eligibility...more
The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more
In today's digital landscape, where data is often dubbed the "new oil," ensuring the smooth operation of databases is crucial for businesses. Regular oversight, including monitoring database metrics, is essential to optimize...more
Process inefficiency can create problems that quietly stifle productivity and potential growth. In an era of rapid digitalization, companies that lag in business process improvement risk falling behind competitors who embrace...more
The Accreditation Overhaul for North Carolina (and Florida) Colleges - Last month, North Carolina Governor Roy Cooper signed House Bill 8 (HB 8) into law. In addition to establishing a new computer science requirement for...more
The UK National Cyber Security Centre (NCSC) published its guidance on shadow IT on 27 July 2023. ‘Shadow IT’ are unknown assets that are used within an organisation for business purposes (including in certain cloud...more
Imagine the excitement you might feel when you hear that your company has finally decided to rid itself of a frustratingly antiquated electronic data management and storage system. Not only is the current system outdated, but...more
Like anyone whose livelihood is based on intellectual capital, the best investments that lawyers can make are those directed at increasing their education, acumen, and professional ability. Are they making sure they have the...more
It’s safe to say that there could be a whole series dedicated to Artificial Intelligence (AI) and the various use cases and ramifications of such groundbreaking technology. While there are ethical considerations, security...more
In the first part of this mini-series, we identified that showing everyday users how to secure data may not be as important as highlighting why data security matters. The “why” helps everyday users appreciate and internalize...more
As we progress through 2023, both new and old cyber challenges remain, but opportunities for improvement are present. For the upcoming year, assume the following: 1. Past challenges have not been overcome, and we still...more
Technology is at the forefront of minimizing the negative impacts of constant change. We seek out advancements to modernize business, sequence our day, and make our lives easier. Among these advancements in the business...more
The National Institute of Standards and Technology (“NIST”) is seeking comments on its second draft of NIST SP 800-161 Rev. 1, “Cyber Supply Chain Risk Management Practices for Systems and Organizations,” published on October...more
The rapidly increasing importance of a company’s environmental, social and governance (ESG) performance to its business value, has been a critical trend leading into 2020. This trend was accelerated by the COVID-19 pandemic,...more
This week, I am writing a blog post series based upon the MIT Sloan Management Review Special Report: Making Good on the Promise of AI. Today, I want to consider the article People and Machines: Partners in Innovation by...more
In this multi-part blog post series, I am exploring the increased use of technology to continue to drive the performance of corporate compliance programs. I am considering the use of Artificial Intelligence (AI) in a best...more
Over the past few blog posts, I have been considering the use of artificial intelligence (AI) to make compliance more robust in the three prongs of prevent, detect and remediate. ...more
I am exploring the use of artificial intelligence (AI) to make compliance more robust in the three prongs of prevent, detect and remediate. This series is based upon an article in the Harvard Business Review (HBR), entitled...more