OG Talks: Good Energy and Navigating Transactions
Launching a Product Too Soon? Lessons From Recent CFPB Orders — The Consumer Finance Podcast
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
Why the Increase in Demeaning Women Online Matters for Your Workplace: What's the Tea in L&E?
Daily Compliance News: January 6, 2025 – The Lady MacBeth in 2025 Edition
Regulatory vs. Business Compliance
Fintech Focus Podcast | Navigating IT and Security Risks in Fintechs in Light of Impending DORA Deadline
On-Demand Webinar: Bring Predictability to the Spiraling Cost of Cyber Incident Response Data Mining
Episode 347 -- LRN's Code of Conduct Survey
Workplace Investigation Protocols: One-on-One with Greg Keating
The Election's Impact on the FTC Will Bring Big Changes, But Being Vigilant Must Remain a Priority
Harnessing Generative AI: Innovations and Best Practices — The Good Bot Podcast
Innovation in Compliance: Navigating Risk Management in the Automotive Industry with Tom Kline
2 Gurus Talk Compliance: Episode 41 – The Where Are We Headed Edition
Effective Compliance Training
Compliance Tip of the Day: Board Questions and Metrics for 3rd Party Risk Management
AI Washing: Simple Guidance to Avoid Risk
Webinar ¦ Benefits of Using AI in Construction
The Future of AI Regulation and Legislation: 5 Key Takeaways
Beginning 17 January 2025, the Digital Operational Resilience Act (DORA) will apply to almost all EU financial entities, including banks, insurers and reinsurers, brokers , payment and electronic money institutions,...more
The recent indictment of 14 North Korean nationals for fraudulently obtaining remote IT jobs with U.S.-based companies underscores the importance of vigilant hiring practices. Our Privacy, Cyber & Data Strategy and...more
The Cybersecurity and Infrastructure Security Agency (CISA) unveiled new cyber performance goals aimed at addressing risks to software development and product design in the IT sector. Last week, the Cybersecurity and...more
Looking for something more advanced than your average export controls conference? Go beyond the basics at ACI’s 2nd Annual Advanced Forum on Global Export Controls. This premier event offers cutting-edge insights and...more
Digital Operational Resilience Act (DORA) aims to harmonize provisions related to cybersecurity and information and communication technology (ICT) risk management in the financial sector. Its scope covers nearly all entities...more
The EU Cyber Resilience Act (CRA) entered into force on 10 December 2024. The CRA is the first legislation of its kind in the world that aims to enhance the cyber security of products or software with a digital component...more
Background - The Digital Operational Resilience Act (DORA), a European Union (EU) regulation that is set to transform how financial entities and their information technology (IT) service providers manage operational risks,...more
A massive data breach hit one of the country’s largest education software providers. According to EducationWeek, PowerSchool provides school software products to more than 16,000 customers, largely K-12 schools, that serve 50...more
Remote worker fraud is expected to continue to proliferate in 2025. Fully remote hiring and work, particularly in the technology sector, continues to pose unique business and legal risks for companies. Just in December 2024,...more
In today's digital landscape, robust password management is critical to information security. With the increasing complexity of cyber threats, ensuring secure access to sensitive information has become more critical than...more
The Department of Commerce (Commerce) Office of Information and Communications Technology and Services (OICTS) has broad authority—born out of executive action during the first Trump administration—to identify and mitigate...more
On January 6, 2025 the U.S. Department of Health and Human Services published a Proposed Rule (90 FR 898) to strengthen the HIPAA Security Rule and afford greater cybersecurity protections for electronic protected health...more
CyberArk, an identity security provider, has issued a new report on employee risk that is a must-read for IT Professionals and executives. The report highlights several findings that are directly related to the risks...more
In today's fast-paced digital world, businesses often seek to access a global pool of skilled professionals by turning to remote talent to fill gaps in their IT needs. Although this practice has many advantages, it also...more
According to Cyberscoop, the cyber gang Cl0p “has claimed responsibility for attacks tied to vulnerabilities in software made by Cleo, an Illinois-based IT company that sells various types of enterprise software.” The gang...more
Cyber issues are seldom out of the news, from ransomware attacks and espionage to non-malicious outages that cause widespread concern. Organizations need to protect themselves against both current and future risks and...more
When it comes to discovery of mobile devices, organizations today must consider being proactive regarding how mobile devices of their employees and contractors are managed and what rights they have regarding the storage and...more
Let’s role-play the title “Chief Information Security Officer” (CISO) as various chess pieces, each representing different aspects of the challenges and responsibilities faced in this critical position. Examining these...more
Cutting over to a new Energy Trading and Risk Management (ETRM) system is a significant undertaking. The process involves transitioning data, configurations, and business processes from your legacy system to the new one,...more
The New York Department of Financial Services issued a cybersecurity advisory on November 1, 2024, regarding a growing threat posed by North Korean operatives seeking remote IT roles at U.S. companies. These operatives secure...more
Digitale Bedrohungen und Cyberangriffe nehmen jedes Jahr zu – im Jahr 2023 verursachten sie in Deutschland Schäden von über 200 Milliarden Euro, wobei 72% davon auf Cyberangriffe zurückzuführen waren (Quelle: Bitkom,...more
Contractors interested in offering federal agencies artificial intelligence (AI) can now glean insight into how agencies are expected to conduct AI acquisitions. On September 24, 2024, the Office of Management and Budget...more
For most employees, it is relatively easy to send information from the employer’s network to a private digital environment, such as personal e-mail or cloud storage....more
Scammers are always looking for new ways to dupe victims. If you battle your weight, you think about it a lot and are always looking for easier ways to lose some pounds. There is no easy way, but we are always looking for an...more
On this episode of “Don’t Take No for An Answer,” Lynda A. Bennett, Chair of Lowenstein’s Insurance Recovery Group, speaks with David Anderson, Vice President of Cyber at Woodruff Sawyer, about the difference between...more