News & Analysis as of

Risk Management Data Security Risk Mitigation

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Womble Bond Dickinson

Cybersecurity Crunch: Building Strong Data Security Programs with Limited Resources - Insights from Tech and Financial Services...

Womble Bond Dickinson on

In today’s digital age, cybersecurity has become a paramount concern for executives navigating the complexities of their corporate ecosystems. With resources often limited and the ever-present threat of cyberattacks,...more

Kennedys

[Webinar] Days of reckoning: How to prepare for, respond to, and recover from ransomware and other cyberattacks - June 27th, 2:00...

Kennedys on

Kennedys and Booz Allen Hamilton are delighted to invite you to our 3 hour webinar on Thursday, June 27, 2024. This half-day seminar features three presentations: Clear and present danger, In the war room, and The fallout....more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Clark Hill PLC

[Webinar] Navigating Risk After the Change Healthcare Cyberattack: Strategies for Effective Healthcare Third Party Risk Management...

Clark Hill PLC on

In an increasingly interconnected healthcare landscape, third party relationships play a critical role in operations, but they also introduce significant risk. To address this challenge, our webinar delves into the...more

Spilman Thomas & Battle, PLLC

HHS Cybersecurity Performance Goals and the Healthcare Industry

The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more

Society of Corporate Compliance and Ethics...

[Event] Higher Education & Healthcare Research Compliance Conference - June 10th - 12th, New Orleans, LA

Don’t miss our annual conference devoted to higher education and research compliance - Attend the Higher Education & Healthcare Research Compliance Conference June 10–12, 2024 and hear from experienced professionals on a...more

Guidepost Solutions LLC

Unlocking the Power of Precision: Data Quality and Accessibility for Corporate Security Departments

Amidst the relentless waves of pandemic-induced uncertainty, organizations found themselves at a crossroads, compelled to reimagine how their businesses operated. For example, when stay at home orders continued to be extended...more

Health Care Compliance Association (HCCA)

‘An Unknown Individual Walked In’: Protecting Against Telehealth Risks Includes Non-IT Threats

The HHS Office for Civil Rights (OCR) and other government agencies aren’t just worried that providers understand—and mitigate—the privacy and security risks of telehealth. In fact, in 2022, the Government Accountability...more

Skadden, Arps, Slate, Meagher & Flom LLP

What Does the SEC’s Complaint Against SolarWinds Mean for CISOs and Boards?

On October 30, 2023, the SEC filed a litigated complaint against SolarWinds, a software development company, and Timothy Brown, its chief information security officer (CISO). The SEC alleges that from October 2018, when...more

A&O Shearman

UK – NCSC publishes guidance on shadow IT

A&O Shearman on

The UK National Cyber Security Centre (NCSC) published its guidance on shadow IT on 27 July 2023. ‘Shadow IT’ are unknown assets that are used within an organisation for business purposes (including in certain cloud...more

Bradley Arant Boult Cummings LLP

Cybersecurity in the U.S. Construction Industry: Navigating Challenges and Strategies for a Secure Future – Part 2

In today’s digital era, the construction industry faces a growing threat from cyber risks that can have significant impacts on projects and operations. As technology continues to revolutionize the industry, it is crucial for...more

Baker Donelson

MOVEit Transfer Zero-Day Vulnerability: What Companies Need to Know

Baker Donelson on

On May 31, 2023, renowned managed file transfer solution provider Ipswitch, Inc. revealed a zero-day vulnerability in its flagship solution, MOVEit Transfer, that can enable mass data theft from thousands of organizations....more

Society of Corporate Compliance and Ethics...

[Event] Regional Compliance & Ethics Conference - April 28th, Tampa, FL

Looking for compliance education and networking in your area? SCCE’s Regional Compliance & Ethics Conferences offer convenient, local compliance education for practitioners across the globe, including updates on the latest...more

Sheppard Mullin Richter & Hampton LLP

Ethics & Compliance: Let’s Talk About Cybersecurity

Over the past few months, the OIG shorts series focused on structuring and implementing a comprehensive and effective ethics and compliance program. Many times, this requires a mindset shift from a checking-the-box mentality...more

Robinson+Cole Data Privacy + Security Insider

CISA Recommends Following Microsoft’s Mitigation for Zero Day Exploits

Microsoft recently issued mitigation steps for vulnerabilities that are being actively exploited by threat actors. Microsoft stated that it is aware that two vulnerabilities are being actively exploited to access users’...more

U.S. Legal Support

[Webinar] Culture of Confidentiality: How to ensure your external vendors are mitigating cybersecurity risk - July 20th, 10:00 am...

U.S. Legal Support on

Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more

Society of Corporate Compliance and Ethics...

Cyber risks: How are you measuring and mitigating them?

CEP Magazine (June 2022) - Picture this: The workday starts out like most other days and inevitably involves electronic devices for many of us. Our expectation, realistic or not, is that technology will work at our command...more

Health Care Compliance Association (HCCA)

Hybrid Workforces and Compliance with Sheila Limmroth

Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more

Society of Corporate Compliance and Ethics...

[Virtual Event] Nonprofit Sector Compliance Conference - May 24th, 9:00 am - 4:00 pm CDT

Get the support you need to properly manage key nonprofit compliance challenges - Nonprofit organizations often find themselves vulnerable to unique fraud and conflict of interest concerns. This one-day virtual conference...more

Health Care Compliance Association (HCCA)

[Event] 26th Annual Compliance Institute - March 28th - 31st, Phoenix, AZ

The primary educational and networking event for healthcare compliance professionals - As our flagship healthcare compliance conference, HCCA’s Compliance Institute (CI) has been providing educational resources and...more

Epiq

[Webinar] What is insider risk, and why do companies ignore it? - November 16th, 12:00 pm AEDT

Epiq on

What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more

Epiq

[Webinar] What is insider risk, and why do companies ignore it? - October 7th, 11:30 am - 12:10 pm GMT

Epiq on

What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more

NAVEX

The State of Risk Alignment - Alliances Grow Between IT Security and IRM

NAVEX on

While business risks abound, including intensified cybersecurity attacks, the impact of rapid technological advances and increasing regulations, there are healthy ways to uncover and mitigate risks. Organizations are...more

Vinson & Elkins LLP

[Webinar] Navigating Privacy Rules in a Virtual World - June 17th, 10:00 am - 11:00 am PT

Vinson & Elkins LLP on

The transformation to a work from home/work from anywhere model has become the new normal and even after the pandemic ends, many expect that model to continue. This accelerated transition has forced companies to embrace...more

74 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide