Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Why Retailers and Merchants Should Pay Attention to the CFPB - The Consumer Finance Podcast
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
Fraud Risks at Nonprofit Organizations - Part 1
False Claims Act Insights - If Everything Matters, Nothing Does: Parsing Materiality in FCA Disputes
AGG Talks: Cross-Border Business Podcast - Episode 18: Navigating U.S. Sanctions and Their Implications for Non-U.S. Individuals and Entities
Navigating U.S. Sanctions and Their Implications for Non-U.S. Individuals and Entities
Power, Privacy, and Protection: Unpacking Security Challenges in the Energy Sector - Energy Law Insights
FCA Uncovered: Mitigating Risk in the Regulatory Spotlight — Regulatory Oversight Podcast
JONES DAY PRESENTS®: Cross-Border Trade Secret Litigation in the United States
Navigating Employment and Separation Agreements: Lessons From Al Pacino's Serpico — Hiring to Firing Podcast
What's the Tea in L&E? Love Contracts: Consensual Relationships in the Workplace
CMO Series EP131 - Noni Garratt-Wall of Charles Russell Speechlys on The Art Of A Law Firm Rebrand
Life After Love Gone Wrong Podcast: Season 3, Episode 4 - Splitting Costs: Forensic Accounting in Divorce
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
What to Do If the Government Knocks on Your Company’s Door … or Breaks It Down – Speaking of Litigation Podcast
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 157: Sarah Glover, Maynard Nexsen Cybersecurity Attorney
ESG, DEI and Compliance
Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more
“In assessing a generative AI product, it is critical to understand issues of data ownership and privacy. This cumbersome task is necessary to learn how the AI platform will use data, if the data shared is entering an open or...more
In an increasingly interconnected healthcare landscape, third party relationships play a critical role in operations, but they also introduce significant risk. To address this challenge, our webinar delves into the...more
On February 28, 2024, President Biden issued Executive Order 14117 (the EO) on “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern” that would...more
The Department of Health and Human Services ("HHS") has released a concept paper outlining its new cybersecurity strategies for the health care sector, identifying cybersecurity priorities, potential future regulations and...more
On October 30, 2023, the SEC filed a litigated complaint against SolarWinds, a software development company, and Timothy Brown, its chief information security officer (CISO). The SEC alleges that from October 2018, when...more
Startups face unique challenges that can impact their success and sustainability. Obstacles such as financial constraints (inadequate funding or limited cash flow) and resource constraints often result in small teams having...more
Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more
A few years ago, your worst nightmares for your organization might have involved old-fashioned data breaches or class action lawsuits. Those seems like child’s play compared to AI-fueled deepfakes and phishing scams,...more
Engaging third-party providers for technology transactions involves a certain level of cybersecurity risk. In fact, most companies have been through a third-party incident. In this episode, partners Justin Herring and Adam...more
Generative AI has captured the public’s attention and promises to transform the way we live and work. The technology, however, implicates a number of important cybersecurity and privacy considerations for organizations. This...more
Recent breakthroughs in generative artificial intelligence (AI) have captured significant media attention. Developers argue that the technology, which learns from data to produce new text, visual, or audio content based on a...more
The pace of internet consumer privacy class action litigation is skyrocketing. Remarkably, no specific legislative change in the law triggered the increase in litigation. Instead, the driver of this litigation explosion — in...more
On May 31, 2023, renowned managed file transfer solution provider Ipswitch, Inc. revealed a zero-day vulnerability in its flagship solution, MOVEit Transfer, that can enable mass data theft from thousands of organizations....more
2022 has seen a new wave of class action lawsuits targeting companies that use technology to track consumers’ interfaces on their websites. These lawsuits generally allege that the use of technologies such as session replay...more
Sorry to be the bearer of bad news but remember that I am only the messenger. According to the World Economic Forum’s Global Cybersecurity Outlook 23 Insight Report (published in collaboration with Accenture), although...more
The proliferation of privacy-related law suits filed against a wide range of companies related to website tracking/analytics will continue in 2023, joining robocall and biometric privacy disputes. Join Kelley Drye Privacy...more
Today’s Privacy Reality: AI, Assessments, Breach and DSARs is a webcast that will bring together a panel of experts to discuss the impact of artificial intelligence (AI) on privacy and cybersecurity. The panel will address...more
With the threat of cyber-attacks making the news, it is a good time for all non-profit organizations to review their policies and procedures with respect to data privacy. Many non-profit organizations are particularly...more
Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more
CEP Magazine (June 2022) - Picture this: The workday starts out like most other days and inevitably involves electronic devices for many of us. Our expectation, realistic or not, is that technology will work at our command...more
From our homes to our workplaces, the deployment of smart technology is becoming increasingly prevalent. The Wall Street Journal notes that smart-building-related companies raised $2.88 billion in venture capital in 2021. In...more
As the number of data breaches, security incidents, and ransomware attacks continue to rise, preparation has become even more important — and make no mistake, these attacks are happening to all types of organizations. These...more
A data breach can be the result of a cyber/ransomware attack or an honest mistake. Either way, the potential impact of compromised data is huge. This impact can be financial (in the form of fines) and reputational (by...more
The United States Cybersecurity & Infrastructure Security Agency (CISA) recently issued a Joint Advisory providing an overview of 2021 ransomware trends, noting several key developments that employers should take note of. The...more