News & Analysis as of

Risk Mitigation Encryption Data Privacy

Integreon

Thomson Reuters: Achieving Compliance With Your Law Enforcement and Third-party Subpoena Response Process

Integreon on

This article originally appeared on Thomson Reuters Westlaw Today on February 12, 2024. View the original article here. Robert Daniel and Mark Grant of Integreon, Inc. explore areas legal operations professionals should...more

HaystackID

[Webinar] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and Teams -...

HaystackID on

The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more

American Conference Institute (ACI)

[Event] 13th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls - March 29th - 30th, San Francisco, CA

Hosted by American Conference Institute, the 13th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that will dive into the intricacies of...more

TransPerfect Legal

The Colonial Pipeline Ransomware: Know Where Your Key Data Lives, Decrease Your Threat Footprint

TransPerfect Legal on

The Colonial Pipeline ransomware attack was the largest in the energy sector to date, and with cybercrimes up 100% from 2019 to 2020 this is only the beginning for 2021. Many organizations are taking on a digital...more

American Conference Institute (ACI)

[Virtual Event] U.S. Export & Reexport Compliance For Canadian Operations - January 26th - 27th, 9:00 am - 5:00 pm EST

For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more

Faegre Drinker Biddle & Reath LLP

October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month (NCAM). NCAM serves as a timely reminder to continue to assess and improve organizational cybersecurity. In honor of NCAM, here are five fundamental steps that every...more

Sunstein LLP

Twenty Years Under the Microscope: A Small Business, a Data Breach and the FTC

Sunstein LLP on

James Grago has a nice business going. He runs a website called ClixSense.com that permits users to earn money by completing surveys and watching advertisements. Revenues grew from $6.7 million in 2015 to $9.1 million in...more

Fisher Phillips

Security Breaches In Schools: 10 Steps To Protect Your Information

Fisher Phillips on

California’s San Diego Unified School District recently disclosed that it had sustained a data breach when multiple phishing emails from malicious hackers were used to gather login information of staff members throughout the...more

Fisher Phillips

The Government Shutdown Leaves Vulnerability in Cyber Security

Fisher Phillips on

While parts of the Government continue to be shut down over concerns about people crossing the border from Mexico into the United States, the cyber borders are at risk. Many government websites are not being monitored or...more

Bass, Berry & Sims PLC

Privacy Perils: Protecting Data While on the Road

Bass, Berry & Sims PLC on

When the world’s cyber-security experts meet at the largest computer security conference in Las Vegas, many of them leave their regular devices at home and either forgo electronics all together or bring burner phones and...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide