• Search for " " on Law Report Group

    HOME

    TOPICS

    ABOUT US

  • |
  • Home
  • Topics A-Z
  • Regulations & Enforcement
  • Data Security
  • Data Privacy
  • In-House Essentials
  • Checklists
  • About Us
  • Subscribe

In-House Essentials

  • Tech Meets Legal
  • Cyber Leadership
  • Employment
  • Operations

May 14, 2025

“Everyone Wants to Speak to the CISO” and Other Realities of Addressing Vendor Breaches

May 7, 2025

Benchmarking AI Governance Practices and Challenges

Apr. 23, 2025

Redefining Compliance From a Consumer-Centric Obligation to Product-Embedded Enablement

Apr. 16, 2025

Checklist for AI Procurement

Apr. 9, 2025

Reference Guide to 2025 Executive Orders for Compliance Professionals

Apr. 2, 2025

Statistics on Privacy Staffing, Budgets and Compliance Culture

Mar. 26, 2025

Navigating Global Privacy Control’s Not-So-Simple Implementation

Mar. 26, 2025

Implications of the Trump AI Executive Order

Mar. 19, 2025

Assessing and Managing AI’s Transformation of Cybersecurity in 2025

Mar. 19, 2025

Staying Ahead of Rising Identity-Based and Cloud Intrusions

Mar. 12, 2025

Managing Tracking Technologies and Their Privacy Dilemmas in 2025

Mar. 12, 2025

The Algorithmic CCO: Practical Steps for Implementing AI in Compliance

Mar. 12, 2025

How CPOs Can Manage Evolving Privacy Risk and Add Value to Their Organizations

Mar. 5, 2025

The Algorithmic CCO: AI’s Role in Shaping the Future of Hedge Fund Governance

Mar. 5, 2025

FTC Settlement Spotlights Security of APIs Proliferating Across the Internet

Feb. 26, 2025

The Tension Between Data Scraping and Data Protection in an AI-Driven World

Feb. 26, 2025

Former NIST Leader Discusses Data Governance As Master Key to a Trio of Frameworks

Feb. 19, 2025

Transforming Security and Privacy Workloads With Generative AI: A Comprehensive Framework

Feb. 19, 2025

AI Meets GDPR: Mitigating Risks and Scaling Compliance in the Development and Deployment of AI Models

Feb. 12, 2025

AI Governance: Striking the Balance Between Innovation, Ethics and Accountability

Feb. 12, 2025

New Jersey and Oregon Advisories Contribute to AI Guidance From State AGs

Feb. 5, 2025

AI Meets GDPR: EDPB Weighs In on AI Models

Feb. 5, 2025

How the 2025 Cybersecurity Executive Order Affects Business

Feb. 5, 2025

California’s Pending Automated Decision-Making Technology Regulations Will Further Focus Consumers’ Attention on AI

Jan. 29, 2025

Unifying Risk Assessments: Breaking Silos to Enhance Efficiency and Manage Risk

Jan. 22, 2025

Nine Cybersecurity Resolutions for 2025

Jan. 15, 2025

Navigating Ever-Increasing State AI Laws and Regulations

Jan. 8, 2025

Website Privacy Compliance Statistics and Practical Takeaways

Dec. 18, 2024

SEC Stresses Cybersecurity, AI and Crypto in Its 2025 Exam Priorities

Dec. 11, 2024

Preparing for U.S. State Law Privacy Compliance in 2025

Dec. 4, 2024

Checklist for Conducting Technical Privacy Reviews

Nov. 20, 2024

CFTC’s Report Calls for Engagement and Development of AI Risk Management Frameworks

Nov. 6, 2024

DOJ’s 2024 Edits to the ECCP: Some History and AI Expectations

Oct. 16, 2024

Cybersecurity and Privacy: Two Sides of the Same Coin

Oct. 9, 2024

What CCOs Should Know About the DOJ’s Efforts to Curtail Criminal Use of AI

Oct. 2, 2024

FTC and State Enforcers Reveal What’s Next and What to Do About It

Oct. 2, 2024

How to Manage AI Procurement: Five Steps

Sep. 25, 2024

Outgoing CPPA Board Member Discusses Rulemaking and Looming Privacy Issues

Sep. 25, 2024

Practical Strategies for Effective Consent Management

Sep. 18, 2024

How to Manage AI Procurement: Leadership and Preparation

Sep. 18, 2024

FTC Signals Stricter Children’s Enforcement in NGL Labs Settlement: Key Violations and Settlement Terms

Sep. 11, 2024

Cybersecurity Obligations in E.U.’s Digital Laws: Data Act, DORA and Compliance Steps

Sep. 4, 2024

Cybersecurity Obligations in E.U.’s Digital Laws: AI Act, CRA and NIS2

Aug. 14, 2024

AI Offers Clear Value for AML, but the Path Forward Is Murky

Jul. 31, 2024

How Hedge Funds Are Approaching AI Use

Jul. 31, 2024

Restricting Super Users and Zombie IDs to Increase Cloud Security

Jul. 17, 2024

Thoughts From DOJ Experts on Using Data Analytics to Strengthen Compliance Programs

Jul. 3, 2024

1) Bridging Security and Compliance Communication Gaps

Jul. 3, 2024

3) Conducting Technical Privacy Reviews

Jul. 3, 2024

6) Governing AI

Jun. 26, 2024

A Mock Cyber Incident Tabletop: Day Two and Beyond

Jun. 19, 2024

A Mock Cyber Incident Tabletop: Day One, Everything at Once

Jun. 5, 2024

In‑House Perspectives on Compliance’s Role in Managing New and Emerging Risks

Jun. 5, 2024

How to Address the Colorado AI Act’s “Complex Compliance Regime”

May 22, 2024

SEC Enforcement Actions Target “AI Washing”

May 15, 2024

Applying AI in Information Security

May 8, 2024

Survey Finds Cybersecurity Budgets Rising and Increased Incident Response Confidence

May 8, 2024

Answers to Top Questions About the E.U. AI Act: Practical Steps and What’s Next

May 1, 2024

Answers to Top Questions About the E.U. AI Act: Risk Tiers and Big-Player Transparency

Apr. 24, 2024

Answers to Top Questions About the E.U. AI Act: Reach and Unique Requirements

Apr. 24, 2024

Examining Maryland’s Game-Changing Data Minimization Requirements

Apr. 17, 2024

AI Governance Strategies for Privacy Pros

Apr. 17, 2024

How to Achieve Privacy by Design With a Technical Privacy Review

Apr. 17, 2024

Tracking Technologies: Compliance Challenges and Solutions

Apr. 3, 2024

Examining Utah’s Pioneering State AI Law

Apr. 3, 2024

Crafting Effective Mobile Device Policies to Satisfy Regulatory Expectations

Mar. 27, 2024

SEC’s 2024 Regulatory Focus

Mar. 27, 2024

Welcome to the GPT Store – and Its Three Million Security Uncertainties

Mar. 27, 2024

Checklist Covering CSRB Recommendations on Five Areas for Strengthening Cyber Defenses

Mar. 20, 2024

Court Hands FTC Grounds to Curb Data Broker Sales

Mar. 20, 2024

AI Drives Rise in Private Funds’ Use of Alternative Data

Mar. 20, 2024

Examining the Cyber Threat Landscape Dominated by Stealth Attacks

Mar. 13, 2024

Fostering Collaboration and Communication Between Security and Compliance

Feb. 28, 2024

Legal and Ethical Issues in Use of Biometrics: FIDO, Identity-Proofing and Other Options

Feb. 21, 2024

Tracking Technologies: A 360‑Degree Governance Plan

Feb. 21, 2024

Legal and Ethical Issues in Use of Biometrics: Modality Selection, Implementation and State Laws

Feb. 14, 2024

Financial Services 2024 Privacy, Cybersecurity and AI Regulation Overview

Jan. 31, 2024

Tracking Technologies: A Deep Dive on What They Are and How They Work

Jan. 31, 2024

FTC’s Rite Aid Order: Expanded Algorithm Disgorgement and a Compliance Roadmap

Jan. 24, 2024

Emerging Cyber Threats and Defenses

Jan. 24, 2024

FTC’s Rite Aid Order: A Strong Message to Users of Biometrics and AI

Jan. 10, 2024

E.U. Takes Lead on AI and Climate Change Via ESG Regulation

Jan. 10, 2024

Ten Cybersecurity Resolutions for 2024

Dec. 20, 2023

Dos and Don’ts for Employee Use of Generative AI

Dec. 20, 2023

Key Legal and Business Issues in AI-Related Contracts

Dec. 20, 2023

Innovation and Accountability: Asking Better Questions in Implementing Generative AI

Dec. 20, 2023

NYC AI Audit Law Series

Dec. 13, 2023

A 2023 Cyber Regulation Look-Back and 2024 Risk-Management Strategies

Dec. 13, 2023

Navigating a Breach As a Third-Party Service Provider: Notifications, Network Decisions and Preserving Privilege

Dec. 6, 2023

Dos and Don’ts for Employee Use of Generative AI

Dec. 6, 2023

Navigating a Breach As a Third-Party Service Provider: Communications and Investigation

Nov. 29, 2023

How Cybersecurity Professionals Can Handle Three Common Misconceptions

Nov. 22, 2023

Task 3: Selecting New Technologies

Nov. 15, 2023

What the AI Executive Order Means for Companies: Examining Red‑Teaming Requirements

Nov. 15, 2023

Navigating NIST’s AI Risk Management Framework

Nov. 8, 2023

Understanding the Growing Use of PETs

Nov. 8, 2023

What the AI Executive Order Means for Companies: Seven Key Takeaways

Nov. 1, 2023

Examining Security Mandates, Including California’s Draft Audit Regulations, in State Privacy Laws

Nov. 1, 2023

Checklist for Selecting Privacy Tech Solutions

Oct. 18, 2023

IBM, eBay and Walgreens CPOs Outline 10 Steps for Building AI Governance

Oct. 11, 2023

Shaping AI Policy to Address Risks to U.S. Citizens and National Security

Sep. 27, 2023

CSRB Report on Lapsus$ Attacks: Moving Beyond MFA, Building Resilience and Mitigating Third-Party Threats

Sep. 27, 2023

The Good, Bad and Ugly of Summer’s Cyber Incidents

Sep. 20, 2023

CSRB Report on Lapsus$ Attacks: Key Takeaways and Law Enforcement Cooperation

Sep. 20, 2023

NYC AI Audit Law: A Best Practice Guide, From Choosing an Auditor to Avoiding Enforcement

Sep. 13, 2023

Key Terms and Negotiation Issues in Data Processing Agreements

Sep. 13, 2023

NYC AI Audit Law: What Five Companies Published – and How Others Avoid It

Sep. 6, 2023

E.U. Coordinated Enforcement Framework Focuses on DPOs

Sep. 6, 2023

An Analysis of the Liberal and Strict Provisions in India’s New Privacy Law

Aug. 30, 2023

Checklist for Building an Identity-Centric Cybersecurity Framework

Aug. 16, 2023

Why Companies Unintentionally Fail to Honor Opt-Outs

Aug. 9, 2023

Key Legal and Business Issues in AI-Related Contracts

Aug. 9, 2023

Selecting the Latest Privacy Tech Solutions: How to Kick the Tires and Decide

Aug. 2, 2023

Innovation and Accountability: Asking Better Questions in Implementing Generative AI

Aug. 2, 2023

Navigating Evolving Data Breach Litigation and Regulatory Risks

Aug. 2, 2023

Selecting the Latest Privacy Tech Solutions: Four Preparatory Steps

Jul. 5, 2023

How to Comply With the CPRA’s Data Minimization Standards

Jun. 28, 2023

CPOs Weigh In on Navigating Myriad Privacy and Security Laws Amid Dizzying Technological Advancements

Jun. 21, 2023

Xbox and Alexa COPPA Case Lessons: Avatars, Biometrics and Other New Expectations

Jun. 21, 2023

The Practical and Legal Complexities of Online Age Verification

Jun. 14, 2023

Xbox and Alexa COPPA Case Lessons: Negotiating With the FTC Over Algorithms and Remedies

May 17, 2023

Understanding Cyberattacks on Digital Asset Platforms

May 3, 2023

Landscape of On-Chain Asset Tokenization and Blockchain Technology’s Path Toward Maturity

May 3, 2023

VMware CPO Discusses the Evolution of the Privacy Role

Apr. 26, 2023

Cloud Attacks and Six Other Cybersecurity Dangers for 2023 and 2024

Apr. 19, 2023

NIST Advances Soft Law for AI While World Awaits Hard Laws

Apr. 12, 2023

First Independent Certification of Responsible AI Launches

Mar. 22, 2023

Managing Legal Issues Arising From Use of ChatGPT and Generative AI: Industry Considerations and Practical Compliance Measures

Mar. 15, 2023

Managing Legal Issues Arising From Use of ChatGPT and Generative AI: E.U. and U.S. Privacy Law Considerations

Mar. 8, 2023

Best Practices to Combat Surge of Unwanted Data Scraping

Mar. 1, 2023

Getting Used to Zero Trust? Meet Zero Copy

Feb. 22, 2023

IAB Unveils Multistate Contract to Satisfy 2023 Laws’ Curbs on Targeted Ads

Feb. 15, 2023

Impact of Emerging Technologies on Financial Crime Risk Management

Feb. 8, 2023

How to Comply With the CPRA’s Data Minimization Standards

Feb. 8, 2023

AI Governance Gets Real: Core Compliance Strategies

Feb. 1, 2023

Key Privacy Issues for 2023

Feb. 1, 2023

AI Governance Gets Real: Tips From a Chat Platform on Building a Program

Dec. 14, 2022

Recent FTC Cases Highlight Evolving Regulatory Expectations in the Use of Multi-Factor Authentication

Nov. 9, 2022

Privacy and Security Considerations of Blockchain Technology

Oct. 26, 2022

Takeaways From the New Push for a Federal AI Law

Oct. 12, 2022

Metaverse IRL: Are Companies Overlooking the Privacy Risks of NFTs and Crypto Wallets?

Oct. 5, 2022

Metaverse IRL: Grappling With Biometric Data and Privacy Notices in VR Headsets

Sep. 21, 2022

Trio of Settled Enforcement Actions Highlights SEC Concerns About Identity Theft Policies and Procedures

Sep. 21, 2022

Metaverse IRL: Tackling Privacy Amid the Rampant Hype and Burst of Deals

Sep. 14, 2022

Compliance Survey Finds Data Management Challenges, Rising Costs and Increasing Uptake of RegTech

Sep. 07, 2022

Four Steps to Secure Open-Source Software After CSRB’s Log4j Investigation

Aug. 24, 2022

New AI Rules

Aug. 10, 2022

Protecting Against Crypto Theft

Jul. 13, 2022

New AI Rules: Five Compliance Takeaways

Jun. 29, 2022

Navigating the Intersection of Digital Assets and AML

Jun. 22, 2022

New AI Rules: States Require Notice and Records, Feds Urge Monitoring and Vetting

Jun. 15, 2022

New AI Rules: NYC First to Mandate Audit

May 18, 2022

Navigating the Intersection of Blockchain and Data Privacy Laws

May 11, 2022

The Evolving Crypto Regulatory Climate

May 4, 2022

Cybersecurity and Privacy Teams Join to Create Data Governance Councils

Apr. 13, 2022

California AG Opinion Hands Companies New Tasks for AI, Data Maps, Marketing

Apr. 6, 2022

How to Measure Whether Your Company Is Ready to Catch Lots of Phish

Mar. 30, 2022

As Email Scams Surge, Training Lessons From 115 Million Phishing Messages

Mar. 16, 2022

How Combining Approaches to Data Analytics Can Yield Powerful Insights

Mar. 16, 2022

Securing Emerging Technologies Without Hampering Innovation: Government Initiatives and How Companies Can Adapt

Mar. 9, 2022

Securing Emerging Technologies Without Hampering Innovation: Private Sector Challenges

Mar. 2, 2022

Blockchain Recordkeeping Stirs Privacy Concerns

Feb. 16, 2022

AB InBev’s C2CRIGHT Initiative: Using Split Learning to Protect Privacy While Working Together

Feb. 9, 2022

AB InBev’s C2CRIGHT Initiative: Can Companies Work Together to Prevent Corruption?

Jan. 19, 2022

Privacy and Security Due Diligence in M&A Transactions: Going Beyond the Questionnaire

Jan. 19, 2022

Privacy Resolutions for 2022

Jan. 5, 2022

Using Technology to Build in Data Governance for Improved Security and Privacy

Jan. 5, 2022

Compliance Checklist for AI and Machine Learning

Dec. 15, 2021

Understanding Differential Privacy

Dec. 8, 2021

Privacy Tech Products Hold Promise but Sector Faces Hurdles

Dec. 01, 2021

Using Technology and Outsourcing to Enhance Compliance Programs and Manage Conflicts of Interest

Nov. 3, 2021

Checklist for Building an Identity-Centric Cybersecurity Framework

Oct. 27, 2021

IOSCO Issues Final Guidance on AI and Machine Learning

Oct. 6, 2021

How to Build Insider Risk Programs to Satisfy Global Employee Privacy Laws

Oct. 6, 2021

Lessons From HPE’s Anti-Corruption Purchase Order Analytics on the Role for Humans in Data Interpretation

Oct. 6, 2021

Fund Managers Must Ensure Adequate Security Measures Under Safeguards Rule or Risk SEC Enforcement Action

Sep. 22, 2021

Examining the Intersection of Voiceprints and Data Privacy Laws

Sep. 15, 2021

Essential Technology Contract Elements

Aug. 11, 2021

Using RegTech for Compliance Efforts and Potential Benefits of Emerging Technologies

Aug. 11, 2021

Evaluating Privacy and Cybersecurity Risks In Emerging Technology Transactions: Biometrics, Fintech and Cryptocurrency

Aug. 4, 2021

The Evolution, Status and Future of RegTech in the Private Funds Industry

Aug. 4, 2021

Evaluating Privacy and Cybersecurity Risks in Emerging Technology Transactions: Artificial Intelligence and EdTech

Jul. 21, 2021

Understanding Common Hacking Techniques and Forensic Analysis

Jul. 7, 2021

How Law Firms Can Prevent, Detect and Respond to Ransomware Attacks

Jul. 7, 2021

Digital Identity Management in a Post-Pandemic World: SolarWinds, Zero Trust and the Challenges Ahead

Jun. 30, 2021

Using RegTech to Enhance Compliance

Jun. 16, 2021

The Impact of Recent Legislative and Litigation Trends on Commercial Use of De-Identified Data

Jun. 2, 2021

AI Compliance Playbook: Adapting the Three Lines Framework for AI Innovations

May 19, 2021

Negotiating Reps, Warranties and Remedies in Technology Contracts

May 12, 2021

How Law Firms Can Prevent, Detect and Respond to Ransomware Attacks

May 12, 2021

How Three Companies Embarked on AI Compliance Journeys

Apr. 28, 2021

AI Compliance Playbook: Understanding Algorithm Audits

Apr. 21, 2021

AI Compliance Playbook: Seven Questions to Ask Before Regulators or Reporters Do

Apr. 14, 2021

AI Compliance Playbook: Traditional Risk Controls for Cutting-Edge Algorithms

Apr. 7, 2021

Did Clubhouse Sacrifice Privacy for Innovation? How to Find the Balance 

Mar. 31, 2021

Managing Vendor Contracts From the Data Controller's Perspective

Mar. 24, 2021

Digital Identity Management in a Post-Pandemic World: A Framework for Identity-Centric Cybersecurity

Mar. 17, 2021

Digital Identity Management in a Post-Pandemic World: SolarWinds, Zero Trust and the Challenges Ahead

Mar. 10, 2021

AI for Compliance: Five Workarounds for Asymmetric Data Sets

Jan. 27, 2021

The Potential Legal Implications of Web Scraping for Market Research

Jan. 20, 2021

eDiscovery in Multi-Jurisdictional Investigations: Preparing to Play Multi-Level Chess

Dec. 16, 2020

AI for Compliance: Building a Model

Dec. 9, 2020

Strategies for Managing the Intersection of Cybersecurity and New Technologies

Nov. 18, 2020

Show Me the Data: How to Conduct Audits for Data Minimization

Nov. 11, 2020

AI for Compliance: Foundations

Nov. 11, 2020

The Intelligent Workplace in the Age of a Pandemic: Six Privacy and Security Safeguards

Nov. 4, 2020

Vulnerability Management: Increasing Communication to Prevent Problems From Hiding in Plain Sight

Oct. 28, 2020

The Intelligent Workplace in the Age of a Pandemic: Balancing Innovation and Risk

Oct. 28, 2020

Vulnerability Management: Understanding the Risks of External Scanning

Oct. 14, 2020

Vulnerability Management: What You Don’t Know From Your External Scans Can Be Used Against You

Sep. 9, 2020

IOSCO Offers Six Risk Mitigation Measures for AI and Machine Learning

Aug. 5, 2020

How to Achieve Trustworthy AI Using the European Commission’s Final Assessment List

Jul. 15, 2020

Back to the Table: CCPA Regulations Spark New Wave of Service-Provider Negotiations

Jul. 8, 2020

Getting Board Buy-In for Edge Cybersecurity Initiatives Post COVID‑19

Jun. 24, 2020

Balancing Privacy Rights and Innovation in Digital Contact Tracing

Jun. 17, 2020

The Current State and Future of AI Regulation

Jun. 10, 2020

After Capital One Ruling, How Will Companies Protect Forensic Reports?

May 20, 2020

Did Adtech Fix Its CCPA Problem? IAB’s GC Discusses New Contract for Data Sales

May 13, 2020

NIST Privacy Framework: Privacy Controls for an Era of Digital Transformation

Mar. 18, 2020

The Keys to Encryption: Effective Policies, Legal’s Role and Third Parties

Mar. 11, 2020

The Keys to Encryption: Legal and Regulatory Framework

Mar. 4, 2020

The Keys to Encryption: Uses and Implementation Challenges

Feb. 19, 2020

Best Practices for Using Alternative Data: Mitigating Regulatory Risks

Feb. 12, 2020

Best Practices for Using Alternative Data: Collection and Provider Management

Feb. 5, 2020

Defining, Implementing and Documenting “Reasonable Security”

Feb. 5, 2020

The Rise of Facial Recognition Technology: Mitigating Risk

Jan. 29, 2020

The Rise of Facial Recognition Technology: Mapping the Legal Framework

Jan. 22, 2020

The Rise of Facial Recognition Technology: Uses and Risks

Jan. 8, 2020

How eBay and PayPal Use Key Performance Indicators to Evaluate and Improve Privacy Programs

Dec. 11, 2019

How to Handle E.U. Data Subject Access Requests

Dec. 11, 2019

Allocating Risk in Cloud Computing Relationships: Key Legal Issues

Dec. 4, 2019

Allocating Risk in Cloud Computing Relationships: Spectrum of Offerings

Nov. 20, 2019

AI for Fund Managers and Beyond: How to Automate the Legal Department and Maintain Privacy

Nov. 13, 2019

AI for Fund Managers and Beyond: Government Guidance

Nov. 6, 2019

AI for Fund Managers and Beyond: How to Use It to Streamline Operations

Oct. 30, 2019

Reconciling Technology Development, Security and the Lawyer’s Role

Oct. 2, 2019

CCPA Close-Up: Review of Amendments and How to Prepare for Compliance

Sep. 25, 2019

Strategies and Tactics for Conducting an Effective Tabletop Exercise (Part Two of Two)

Sep. 4, 2019

Mitigating the Risks of Open-Source Software

Jul. 31, 2019

Takeaways From the U.K. ICO’s FaceApp Warning

Jul. 10, 2019

Can GDPR Hinder AI Made in Europe?

Jul. 3, 2019

Increased Post-Breach Discovery Turns Spotlight on Privilege

Jun. 19, 2019

Tips From Lockheed and Groupon on Developing GC-CISO Partnerships to Improve Security and Incident Response

Jun. 12, 2019

There Really Isn’t a Quarterback: Uber and Equifax Executives Share Insights on Incident Response Best Practices and the Lawyer’s Role

Jun. 5, 2019

FINRA RegTech Conference Reviews AI, RegTech Adoption and Compliance Challenges (Part Two of Two)

May 29, 2019

FINRA RegTech Conference Examines Digital Identification, Suspicious Activity Reporting and Machine Learning

May 22, 2019

Court Reconsiders November 2018 Order and Issues Preliminary Injunction Against ICO

May 15, 2019

What Does It Mean to Be Technologically Competent?

May 8, 2019

Understanding Regulatory Technology: Current Uses and Deployment Considerations

May 1, 2019

Understanding Regulatory Technology: Tools, Challenges and Regulators’ Views

Apr. 10, 2019

Insights From a Former SEC Counsel on Regulating Digital Assets

Mar. 27, 2019

Navigating the Risks of Alternative Data Collection and Use

Mar. 20, 2019

Increased Post-Breach Discovery Turns Spotlight on Privilege

Mar. 13, 2019

Mitigating the Risks of Open-Source Software

Mar. 6, 2019

Benefits and Risks of Open-Source Software and How the Financial Sector Is Using It

Feb. 27, 2019

Preparing for the CCPA: Securing Buy-In and Setting the Scope

Feb. 20, 2019

Implications of the Illinois Supreme Court’s BIPA Holding Against Six Flags

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 13, 2019

Practical Ways to Incorporate Security Protection Into Supplier Agreements

Jan. 23, 2019

Illinois Federal Court Denies Standing in BIPA Claim Against Google

Jan. 16, 2019

How a New Ethics Rule and Error in Manafort Case Highlight the Importance of Lawyers’ Technology Competence

Dec. 12, 2018

Illinois Appellate Decision Creates Split on Standing to Sue Under BIPA

Dec. 5, 2018

Insights From Uber: Building Bridges Between Legal and Engineering

Nov. 28, 2018

Insights From Uber: An Inside Look at Its Privacy Team Structure and How Legal and Tech Collaborated on Its Differential Privacy Tool

Nov. 14, 2018

How Privacy Professionals Can Benefit Cybersecurity Programs: Practical Tips From Gap and Privacy Panacea

Nov. 14, 2018

A Roadmap to Preparing for and Managing a Cyber Investigation

Nov. 7, 2018

WhiteHat Report on the Software Lifecycle and Visa Bug Bounty Program Demonstrate the Need for Greater App Security

Oct. 24, 2018

California Enacts Groundbreaking IoT Law and Requires Disclosure of Bot Use

Oct. 17, 2018

Risks and Rewards of Bluetooth Technology

Oct. 17, 2018

Regulating AI: U.S., E.U. and Industry Laws and Guidance

Sep. 26, 2018

Artificial Intelligence in Legal Practice: Potential Ethical and Liability Pitfalls

Sep. 26, 2018

New Sidley Partner Lilya Tessler Discusses the Fintech and Blockchain Space

Sep. 19, 2018

Evolving Roles of Privacy and Security Professionals: Operationalizing Policies, Incident Response and Vendor Management

Sep. 12, 2018

Evolving Roles of Privacy and Security Professionals: Effective Governance and Board Reporting

Sep. 5, 2018

Evolving Roles of Privacy and Security Professionals: Examining Required Skills and Potential Convergence

Jul. 11, 2018

Is Encryption Obligatory? HHS Upholds Texas Hospital $4.3M HIPAA Fine 

Jun. 13, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Three of Three)

Jun. 6, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Two of Three)

May 30, 2018

Understanding the Intersection of Law and Artificial Intelligence

May 30, 2018

What Lawyers Need to Know About Security Techniques and Technologies to Mitigate Breach Risk (Part One of Three)

Apr. 18, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Vendors and M&A (Part Three of Three)

Apr. 11, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Assessments and Incident Response (Part Two of Three)

Mar. 28, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: It Starts With Governance (Part One of Three)

Mar. 14, 2018

FTC Enters Into Stiff Settlement With PayPal for Venmo’s Deceptive Practices, but Eases up on a 2009 Sears Order 

Feb. 14, 2018

Biometric Data Protection Laws and Litigation Strategies (Part Two of Two)

Feb. 14, 2018

Virtual Currencies Present Significant Risk and Opportunity, Demanding Focus From Regulators, According to CFTC Chair

Feb. 14, 2018

Using Technology to Comply With the GDPR

Jan. 31, 2018

Biometric Data Protection Laws and Litigation Strategies (Part One of Two)

Jan. 31, 2018

Five Strategies a Privacy Attorney Uses to Bridge the Gap With Tech Teams

Jan. 31, 2018

How to Make Data Work for You: A Conversation With a Law Firm’s Chief Data Analytics Officer and Its CISO

Jan. 17, 2018

How Blockchain Will Continue to Revolutionize the Private Funds Sector in 2018

Dec. 20, 2017

SEC Takes Aggressive Action Against Allegedly Fraudulent ICO

Dec. 6, 2017

Actions Under Biometric Privacy Laws Highlight Related Risks

Nov. 8, 2017

How to Mitigate the Risks of Open-Source Software (Part Two of Two)

Oct. 25, 2017

How to Mitigate the Risks of Open-Source Software (Part One of Two)

Oct. 25, 2017

How to Outsource Vulnerability Assessments to Hackers

Sep. 27, 2017

Lessons From the Equifax Breach on How to Bolster Incident Response Planning (Part One of Two)

Oct. 11, 2017

Lessons From the Equifax Breach on How to Bolster Incident Response Planning (Part Two of Two)

Oct. 11, 2017

Practical and Ethical Data-Protection Steps for Law Firms

Sep. 13, 2017

Unlocking Encryption: An Attorney Weighs in on Balancing Security and Practicality (Part Three of Three)

Sep. 13, 2017

Negotiating an Effective Cloud Service Agreement

Aug. 23, 2017

Unlocking Encryption: A CISO’s Perspective on Encryption As Only One Strategy (Part Two of Three)

Aug. 9, 2017

Overcoming the Challenges and Reaping the Benefits of Multi-Factor Authentication in the Financial Sector (Part Two of Two)

Aug. 9, 2017

Unlocking Encryption: A Consultant’s View on Navigating Encryption Options and Persuading Reluctant Organizations (Part One of Three)

Jul. 26, 2017

Overcoming the Challenges and Reaping the Benefits of Multi-Factor Authentication in the Financial Sector (Part One of Two)

Jul. 12, 2017

Blockchain and the Financial Services Industry: Potential Impediments to Its Eventual Adoption (Part Three of Three)

Jun. 28, 2017

The Arc of the Deal: Tips for Cybersecurity Due Diligence Advisors in Mergers & Acquisitions From Beginning to End

Jun. 28, 2017

How Financial Service Providers Can Use Blockchain to Improve Operations and Compliance (Part Two of Three)

Jun. 14, 2017

Basics of the Blockchain Technology and How the Financial Sector Is Currently Employing It (Part One of Three)

May 31, 2017

Advice on Incorporating Cybersecurity in eDiscovery

May 31, 2017

One Year Until GDPR Enforcement: Five Steps Companies Should Take Now

May 17, 2017

Investigative Realities: Working Effectively With Forensic Firms (Part Two of Two)

May 17, 2017

Tracking Data and Maximizing Its Potential

May 3, 2017

Investigative Realities: Working Effectively With Forensic Firms (Part One of Two)

Apr. 19, 2017

What In-House and Outside Counsel Need to Know About ACC’s First Model Cybersecurity Practices for Law Firms

Apr. 5, 2017

Proactive Steps to Prevent Legal Pitfalls in Bug Bounty Programs 

Mar. 22, 2017

Forensic Firms: Effective Vetting and Collaboration (Part Three of Three)

Mar. 22, 2017

How to Establish and Manage a Successful Bug Bounty Program 

Mar. 8, 2017

Forensic Firms: Key Contract Considerations and Terms (Part Two of Three)

Feb. 22, 2017

Forensic Firms: Understanding and Leveraging Their Expertise From the Start (Part One of Three)

Jan. 11, 2017

Tech Meets Legal Spotlight: Advice on Working With Information Security

Nov. 30, 2016

Exploring the New Frontier of International Regulations on Importing and Exporting Encryption Technology

Nov. 30, 2016

Tech Meets Legal Spotlight: What to Do When IT and Legal Slow the Retention of a Third-Party Vendor

Nov. 2, 2016

Guide to Getting Your Security Program Certified Under ISO 27001

Oct. 19, 2016

Finding the Best Ways to Secure Digital Transactions in a Mobile World 

Aug. 24, 2016

Fulfilling the Ethical Duty of Technology Competence for Attorneys

Aug. 3, 2016

How Cyber Stakeholders Can Speak the Same Language (Part Two of Two)

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jul. 6, 2016

Technology Leader Discusses How to Deal With the Growing Threat of Ransomware 

Jun. 22, 2016

Assistant Attorney General Leslie Caldwell Addresses the Challenges of Cross-Border Cooperation and Electronic Evidence Gathering

Jun. 8, 2016

What CISOs Want Lawyers to Understand About Cybersecurity

May 11, 2016

Privacy Concerns in a Cashless Society

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Apr. 13, 2016

Study Analyzes How Companies Can Overcome Cybersecurity Challenges and Create Business Value

Mar. 30, 2016

How Law Firms Should Strengthen Cybersecurity to Protect Themselves and Their Clients

Mar. 30, 2016

Steps for Companies to Take This Week, This Month and This Year to Meet the Challenges of International Cyberspace Governance

Oct. 28, 2015

Orrick Attorneys Explain California’s New Specific Standards for Breach Notification

Aug. 26, 2015

The Development of E-Currency and Its Potential Impact on the Future

Aug. 12, 2015

How the Hospitality Industry Confronts Cybersecurity Threats that Never Take Vacations

Aug. 12, 2015

Surveys Find Internal and Third-Party Cybersecurity Risks Among Top Executive Concerns

Jul. 29, 2015

Managing the Increased Individual Risks and Responsibilities of Compliance Officers

Jul. 15, 2015

Conflicting Views of Safety, Vulnerability and Privacy Fuel Encryption Debate

Jul. 15, 2015

The Challenge of Coordinating the Legal and Security Teams in the Current Cyber Landscape (Part Two of Two)

Jun. 17, 2015

The Advantages of Sending Data Up to the Cloud 

Jun. 17, 2015

Sample Questions for Companies to Ask to Assess Their Law Firms’ Cybersecurity Environment

Jun. 3, 2015

Understanding and Addressing Cybersecurity Vulnerabilities at Law Firms: Strategies for Vendors, Lawyers and Clients

Jun. 3, 2015

In a Candid Conversation, FBI Director James Comey Talks About the “Evil Layer Cake” of Cybersecurity Threats (Part One of Two)

Jun. 3, 2015

How Companies Are Preparing for the Imminent Liability Shift for Counterfeit Credit Cards

Apr. 8, 2015

Ten Actions for Effective Data Risk Management

May 14, 2025

DOJ Guidance on Bulk Sensitive Data Rules: Compliance Program, Recordkeeping and Reporting

May 7, 2025

Rethinking Click-Through Training: Integration Into a Comprehensive Training Program

May 7, 2025

DOJ Guidance on Bulk Sensitive Data Rules: Enforcement Grace Period and Prohibited Transactions

Apr. 30, 2025

NAVEX Statistics on Internal Reporting and Substantiation

Apr. 23, 2025

How Ericsson Made Compliance Training Must-See TV

Apr. 23, 2025

Redefining Compliance From a Consumer-Centric Obligation to Product-Embedded Enablement

Apr. 2, 2025

Statistics on Privacy Staffing, Budgets and Compliance Culture

Apr. 2, 2025

2025 LRN Effectiveness Survey Finds Lags in Third-Party Diligence

Mar. 19, 2025

Staying Ahead of Rising Identity-Based and Cloud Intrusions

Mar. 12, 2025

How CPOs Can Manage Evolving Privacy Risk and Add Value to Their Organizations

Mar. 12, 2025

The Algorithmic CCO: Practical Steps for Implementing AI in Compliance

Mar. 5, 2025

Navigating Evolving Mobile App Privacy Issues

Mar. 5, 2025

The Algorithmic CCO: AI’s Role in Shaping the Future of Hedge Fund Governance

Feb. 26, 2025

Survey Finds Increased Value in Having a Culture of Compliance

Feb. 12, 2025

AI Governance: Striking the Balance Between Innovation, Ethics and Accountability

Jan. 29, 2025

Unifying Risk Assessments: Breaking Silos to Enhance Efficiency and Manage Risk

Jan. 29, 2025

Examining DOJ’s Final Rules on Access to Government and Sensitive U.S. Personal Data

Jan. 22, 2025

Nine Cybersecurity Resolutions for 2025

Jan. 22, 2025

Fifty-Three Regulators Raise Cyber Expectations With Multi-State Breach Settlement

Jan. 15, 2025

Five Steps for Effective Board Oversight on Cybersecurity Breach Response

Jan. 8, 2025

Website Privacy Compliance Statistics and Practical Takeaways

Dec. 18, 2024

Advertising Opt‑Outs Drive New Privacy Strategies in 2025

Dec. 18, 2024

Transparency Needed, This Time in Roles for Privacy Professionals

Dec. 11, 2024

Preparing for U.S. State Law Privacy Compliance in 2025

Dec. 11, 2024

DOJ’s 2024 Edits to the ECCP: Speaking Up, Compliance Resources and Lessons Learned

Dec. 4, 2024

SEC Charges Four Companies for Misleading Cyber Incident Disclosures: Lessons on Contents and Procedures

Nov. 20, 2024

SEC Charges Four Companies for Misleading Cyber Incident Disclosures: New Expectations?

Nov. 20, 2024

DOJ’s 2024 Edits to the ECCP: Data Analytics to Find Risks and Measure Effectiveness

Nov. 13, 2024

To Work Effectively, CCOs Need Authority, Autonomy and Information

Nov. 6, 2024

DOJ’s 2024 Edits to the ECCP: Some History and AI Expectations

Oct. 23, 2024

Answers to Six Key Questions About How Enforcers View Gatekeepers

Oct. 16, 2024

Meeting DOJ Expectations Post-Resolution Requires Realism and Accountability

Oct. 16, 2024

Cybersecurity and Privacy: Two Sides of the Same Coin

Oct. 9, 2024

What CCOs Should Know About the DOJ’s Efforts to Curtail Criminal Use of AI

Oct. 2, 2024

How to Manage AI Procurement: Five Steps

Sep. 25, 2024

Practical Strategies for Effective Consent Management

Sep. 18, 2024

How to Manage AI Procurement: Leadership and Preparation

Sep. 11, 2024

Cybersecurity Obligations in E.U.’s Digital Laws: Data Act, DORA and Compliance Steps

Sep. 4, 2024

Cybersecurity Obligations in E.U.’s Digital Laws: AI Act, CRA and NIS2

Sep. 4, 2024

Making the Business Case for Privacy

Aug. 21, 2024

How to Select the Latest Cloud Security Tools and Platforms

Aug. 14, 2024

SolarWinds Decision: Practical Takeaways for Cyber Communications

Aug. 7, 2024

How Privacy Efforts Can Boost Revenue

Aug. 7, 2024

SolarWinds Decision: Court Narrows Case, but SEC’s Surviving Claims Alarm CISOs

Jul. 31, 2024

Restricting Super Users and Zombie IDs to Increase Cloud Security

Jul. 31, 2024

Challenges, Risks and Future of the CISO Role

Jul. 24, 2024

Compliance Program Implementation: Compliance Calendars and Testing

Jul. 17, 2024

Thoughts From DOJ Experts on Using Data Analytics to Strengthen Compliance Programs

Jul. 17, 2024

FCC Forfeiture Orders Underline Need for Vigilance on Geolocation Sharing

Jul. 10, 2024

A Framework for Materiality Determinations Under SEC’s Cyber Incident Disclosure Rules

Jul. 3, 2024

2) Choosing Privacy Tech Solutions

Jun. 26, 2024

Measures for Complying With 19 (and Counting) State Privacy Laws

Jun. 26, 2024

A Mock Cyber Incident Tabletop: Day Two and Beyond

Jun. 19, 2024

A Mock Cyber Incident Tabletop: Day One, Everything at Once

Jun. 12, 2024

Six Steps for Improving Cloud Security From CSRB’s Report on Microsoft Intrusion

Jun. 5, 2024

In‑House Perspectives on Compliance’s Role in Managing New and Emerging Risks

Jun. 5, 2024

Preparing to Comply With the Protecting Americans’ Data From Foreign Adversaries Act

May 29, 2024

Testing Is an Integral Component of Compliance Programs

May 15, 2024

New E.U. Directive Expands Scope of Due Diligence

May 1, 2024

Navigating Ransomware’s Challenges

Apr. 24, 2024

Examining Maryland’s Game-Changing Data Minimization Requirements

Apr. 17, 2024

AI Governance Strategies for Privacy Pros

Apr. 3, 2024

Crafting Effective Mobile Device Policies to Satisfy Regulatory Expectations

Mar. 20, 2024

Examining the Cyber Threat Landscape Dominated by Stealth Attacks

Mar. 13, 2024

Fostering Collaboration and Communication Between Security and Compliance

Feb. 14, 2024

Mitigating CISO Personal Liability Post-SolarWinds

Feb. 7, 2024

Binance’s $4.3‑Billion Criminal Resolution Raises Questions on Crypto Guidance

Jan. 31, 2024

Compliance 5.0: A Culture-Centered Approach

Jan. 24, 2024

Emerging Cyber Threats and Defenses

Jan. 10, 2024

Ten Cybersecurity Resolutions for 2024

Jan. 10, 2024

E.U. Takes Lead on AI and Climate Change Via ESG Regulation

Jan. 3, 2024

SEC Director Offers Clarification on New Cyber Disclosure Regime

Dec. 20, 2023

IBM, eBay and Walgreens CPOs Outline 10 Steps for Building AI Governance

Jan. 3, 2024

Amendment to NYDFS Cyber Regulation Brings New Mandates: First Compliance Steps

Dec. 13, 2023

Amendment to NYDFS Cyber Regulation Brings New Mandates: Governance Provisions

Dec. 13, 2023

A 2023 Cyber Regulation Look-Back and 2024 Risk-Management Strategies

Dec. 6, 2023

Dos and Don’ts for Employee Use of Generative AI

Nov. 29, 2023

Ransomware and Incident Response Considerations for Global Companies

Nov. 29, 2023

How Cybersecurity Professionals Can Handle Three Common Misconceptions

Nov. 22, 2023

Task 1: Board Presentations

Nov. 15, 2023

Navigating SEC Cybersecurity Enforcement in a Post-SolarWinds World

Nov. 8, 2023

Top Tips for Effective GC Succession Planning and Training

Nov. 8, 2023

Understanding the Growing Use of PETs

Nov. 1, 2023

Checklist for Selecting Privacy Tech Solutions

Nov. 1, 2023

Examining Security Mandates, Including California’s Draft Audit Regulations, in State Privacy Laws

Oct. 18, 2023

IBM, eBay and Walgreens CPOs Outline 10 Steps for Building AI Governance

Oct. 11, 2023

Benchmarking the Impact of State Privacy Laws on Digital Advertising

Oct. 4, 2023

Understanding the Fiduciary Exception to Attorney-Client Privilege

Sep. 27, 2023

The Good, Bad and Ugly of Summer’s Cyber Incidents

Sep. 27, 2023

CSRB Report on Lapsus$ Attacks: Moving Beyond MFA, Building Resilience and Mitigating Third-Party Threats

Sep. 20, 2023

CSRB Report on Lapsus$ Attacks: Key Takeaways and Law Enforcement Cooperation

Sep. 6, 2023

Navigating the SEC’s Newly Adopted Cybersecurity Disclosure and Controls Regime

Sep. 6, 2023

E.U. Coordinated Enforcement Framework Focuses on DPOs

Aug. 9, 2023

Selecting the Latest Privacy Tech Solutions: How to Kick the Tires and Decide

Aug. 2, 2023

Navigating Evolving Data Breach Litigation and Regulatory Risks

Aug. 2, 2023

Selecting the Latest Privacy Tech Solutions: Four Preparatory Steps

Jul. 26, 2023

NAVEX Shares Benchmarking Data in 2023 State of Risk and Compliance Report

Jul. 5, 2023

A Roadmap to the Final Regulations Under the CPRA

Jun. 28, 2023

CPOs Weigh In on Navigating Myriad Privacy and Security Laws Amid Dizzying Technological Advancements

Jun. 14, 2023

Deciphering California and U.K. Children’s Codes and Compliance Obligations

Jun. 7, 2023

Impact of State Privacy Laws on the Financial Services Sector

May 31, 2023

How CPOs Communicate Privacy’s Value to the Board

May 31, 2023

Colorado Controllers: The Final (Rules’) Frontier

May 31, 2023

How to Navigate the Rough Waters and Turning Tides of U.S. States’ Anti-ESG Movement and Europe’s Pro-ESG Measures (Part Two of Two)

May 10, 2023

Making Sense of Evolving Regulations, Recent Enforcement Efforts and Antitrust Claims as to ESG Investing in the U.S. and E.U. (Part One of Two)

May 3, 2023

VMware CPO Discusses the Evolution of the Privacy Role

Apr. 26, 2023

Cloud Attacks and Six Other Cybersecurity Dangers for 2023 and 2024

Apr. 26, 2023

Ransomware Incident Response Checklist

Apr. 19, 2023

Expedia and Lululemon Privacy Pros Discuss Scaling Vendor Contracting for New Privacy Laws

Apr. 5, 2023

Updates to the NSCP’s Firm and CCO Liability Framework

Mar. 15, 2023

A Roadmap to the Final Regulations Under the CPRA

Mar. 1, 2023

Getting Used to Zero Trust? Meet Zero Copy

Feb. 15, 2023

Advice From a CISO and Lawyer on Best Practices in Information and Data Governance

Feb. 8, 2023

How to Comply With the CPRA’s Data Minimization Standards

Feb. 1, 2023

Key Privacy Issues for 2023

Jan. 11, 2023

A Ransomware Tabletop’s 360-Degree Incident Response View: Day Five Through Post-Mortem

Jan. 11, 2023

Ten Cybersecurity Resolutions for Financial Services Firms in 2023

Jan. 4, 2023

A Ransomware Tabletop’s 360-Degree Incident Response View: Days One to Four

Dec. 14, 2022

Taking Compliance Policies From Dense and Dry to Effective and Engaging

Dec. 7, 2022

How Lawyers Can Leverage the Shifting Environment to Enhance Compliance Programs

Nov. 30, 2022

Understanding and Implementing Privacy Audits

Nov. 9, 2022

Lessons From the Conviction of Uber’s Former CISO

Nov. 9, 2022

Ransomware Evolution: Growing Threats and Response Considerations

Nov. 2, 2022

Revised Monaco Memo Affects Compensation, Clawbacks and Monitorships

Oct. 19, 2022

GM CCO Talks Data, Culture, ESG and Scope Creep

Oct. 12, 2022

How the Revised Monaco Memo Alters Deal Making and Strategy

Oct. 5, 2022

A PR Blitz as DOJ Fine-Tunes Its Corporate Enforcement Policies

Sep. 28, 2022

Using Software Bills of Materials to Bolster Security in Contracting

Sep. 21, 2022

Metaverse IRL: Tackling Privacy Amid the Rampant Hype and Burst of Deals

Sep. 21, 2022

Trio of Settled Enforcement Actions Highlights SEC Concerns About Identity Theft Policies and Procedures

Sep. 14, 2022

Robinhood Resolution a First for Cryptocurrency Enforcement in NY

Sep. 14, 2022

Compliance Survey Finds Data Management Challenges, Rising Costs and Increasing Uptake of RegTech

Sep. 07, 2022

Four Steps to Secure Open-Source Software After CSRB’s Log4j Investigation

Aug. 17, 2022

SEC Cyber Rules: How to Prepare for the New 10-K Disclosure Mandates

Aug. 10, 2022

SEC Cyber Rules: How to Prepare for the New 8-K Incident Mandate

Aug. 10, 2022

Tips for How In-House Counsel Can Navigate Typical Ethical Dilemmas and Conflicts of Interest (Part Two of Two)

Aug. 3, 2022

Importance of In-House Counsel Discerning Their Client and Managing Evolving Attorney-Client Privilege Issues (Part One of Two)

Jul. 27, 2022

Designing a Privacy Center to Build Trust and Facilitate Business Growth

Jul. 20, 2022

Corporate Compliance and Enforcement Hot Topics With IBM VP Una Dean

Jun. 1, 2022

FINRA Clarifies Stance on CCO Supervisory Liability

Jun. 1, 2022

Roadmap for Building an Efficient Global Privacy Program: Maintenance

May 18, 2022

Roadmap for Building an Efficient Global Privacy Program: Buy-In, Scalability and Outside Resources

May 11, 2022

Roadmap for Building an Efficient Global Privacy Program: Scope and Prioritization

May 4, 2022

Roadmap for Building an Efficient Global Privacy Program: Organizational Structure

May 4, 2022

Effective Use of Privacy Impact Assessments

Apr. 20, 2022

GCs Discuss Crisis Management, Investigations, Individual Accountability and ESG

Mar. 30, 2022

The Parallels and Distinctions Between Investigations and Culture Reviews

Mar. 16, 2022

How Combining Approaches to Data Analytics Can Yield Powerful Insights

Mar. 9, 2022

A Look at the NSCP’s Firm and CCO Liability Framework

Feb. 16, 2022

Evolving Career Path and Rising Compensation for CISOs

Feb. 9, 2022

Leveraging Partnerships to Operationalize Privacy Programs

Jan. 26, 2022

Personal Liability and Compliance Resourcing Are Top Concerns Among CCOs, Surveys Show

Jan. 26, 2022

More Regulators Accept New Tool to Streamline Companies’ Cyber Compliance

Jan. 19, 2022

Privacy Resolutions for 2022

Jan. 12, 2022

Cybersecurity Resolutions for 2022

Jan. 5, 2022

A Guide to Privacy Frameworks: Implementation and Maintenance

Dec. 15, 2021

A Guide to Privacy Frameworks: Finding the Best Fit

Dec. 8, 2021

Privacy Tech Products Hold Promise but Sector Faces Hurdles

Dec. 8, 2021

A Guide to Privacy Frameworks: Examining Options

Dec. 8, 2021

Managing Compliance Scope Creep

Dec. 01, 2021

Using Technology and Outsourcing to Enhance Compliance Programs and Manage Conflicts of Interest

Nov. 10, 2021

How In-House Expertise Can Help Outside Counsel

Nov. 3, 2021

In-House Insight on Handling Data Subject Access Requests Under Multiple Privacy Regimes

Oct. 27, 2021

IOSCO Issues Final Guidance on AI and Machine Learning

Oct. 20, 2021

U.K. Data Privacy Officers Discuss Challenges and Concerns

Oct. 6, 2021

How to Build Insider Risk Programs to Satisfy Global Employee Privacy Laws

Sep. 22, 2021

Jacki Cheslow on IEEE’s Remote Program Assessment

Sep. 15, 2021

Leadership Insights From CPOs at Google, J.P. Morgan and Dow Jones

Sep. 8, 2021

Electronic Communications: Useful Training Techniques and Policies and Procedures to Adopt

Sep. 8, 2021

Imperva’s Global Data Privacy Officer Discusses Privacy by Design

Aug. 18, 2021

Electronic Communications: Current Technological Landscape and Relevant Regulatory Measures

Jul. 28, 2021

Incident Response in the Financial Services Industry

Jul. 7, 2021

How Law Firms Can Prevent, Detect and Respond to Ransomware Attacks

Jun. 30, 2021

DOL Begins Cyber Audits to Protect U.S. Workers’ Retirement Savings

Jun. 16, 2021

Leveraging Policies and Culture: A Recipe for Success

Jun. 9, 2021

State AGs Share Breach Notification Tips and Latest Enforcement Concerns

Jun. 2, 2021

Post-COVID Compliance Strategies: Dealing With Persistent Heightened Risks

May 12, 2021

How Law Firms Can Prevent, Detect and Respond to Ransomware Attacks

May 5, 2021

Balancing Legalese and Simplicity in Modern Privacy Policies

Apr. 28, 2021

First 100 Days As GC/CCO: Managing Daily Work, Performing Risk Assessments and Looking Ahead

Apr. 21, 2021

First 100 Days As GC/CCO: Developing Knowledge and Forging Key Relationships

Apr. 14, 2021

Advice From CISOs on How to Succeed in the Role

Apr. 14, 2021

First 100 Days As GC/CCO: Preparing for the Role and Setting the Tone

Mar. 31, 2021

How Do You Put a System of Controls in Place When Your Target Keeps Moving?

Mar. 10, 2021

AI for Compliance: Five Workarounds for Asymmetric Data Sets

Mar. 3, 2021

Preserving the Privilege for In-House Counsel: Internal Investigations and Depositions

Feb. 24, 2021

Cargill Compliance Director Discusses Putting Training Data to Work

Jan. 13, 2021

Can the Cybersecurity Industry Improve Cooperation to Beat Threats?

Jan. 13, 2021

Cybersecurity Resolutions for 2021

Jan. 6, 2021

Maintaining Privacy While Staying Competitive in an Evolving Regulatory Landscape

Jan. 6, 2021

Six Practical Tips for Building an Effective Privacy Risk Assessment Program

Dec. 16, 2020

AI for Compliance: Building a Model

Dec. 2, 2020

How CCOs Can Avoid Personal Liability for an Organization’s Compliance Failures

Nov. 18, 2020

SEC Commissioner Peirce Shares Views on Personal Liability for CCOs

Nov. 11, 2020

AI for Compliance: Foundations

Oct. 21, 2020

How Lockheed Uses Big Data to Evaluate Risk at Small Worksites

Oct. 7, 2020

Tips and New Benchmarks for Creating Effective Tabletop Exercises

Sep. 16, 2020

Four Principles Underlying Microsoft’s Compliance Analytics Program

Sep. 16, 2020

Twelve Steps for Engaging the Board of Directors and Implementing a Long-Term Cybersecurity Plan

Sep. 9, 2020

IOSCO Offers Six Risk Mitigation Measures for AI and Machine Learning

Sep. 2, 2020

Business Continuity Plans, Budgets and More: Hot Compliance Topics for Investment Advisers

Jul. 22, 2020

Majority of In-House Counsel Satisfied With Compensation, but Gender Gap Remains

Jul. 8, 2020

Getting Board Buy-In for Edge Cybersecurity Initiatives Post COVID‑19

Jun. 10, 2020

How Compliance Departments Are Responding to COVID‑19

Jun. 3, 2020

How CISOs Can Use Digital Asset Metrics to Tell a Coherent Cyber Story to the Board

May 27, 2020

Insights on Building a Compliance Program at a New Company

May 20, 2020

Did Adtech Fix Its CCPA Problem? IAB’s GC Discusses New Contract for Data Sales

May 13, 2020

NIST Privacy Framework: Privacy Controls for an Era of Digital Transformation

May 6, 2020

NIST Privacy Framework: Insights on New Tool for Managing Privacy Risks

Apr. 15, 2020

Report on CCO Liability Calls for More Regulatory Cooperation

Mar. 25, 2020

Companywide Work From Home: Six Cybersecurity Considerations

Mar. 18, 2020

The Keys to Encryption: Effective Policies, Legal’s Role and Third Parties

Mar. 18, 2020

The Ongoing Complexity of Vendor Risk: Top 5 Considerations for C-Level Leaders

Feb. 26, 2020

Eleven Key Components of an Effective Privacy Program

Feb. 26, 2020

Tips From Ponemon/Experian Survey on Building an Incident Response Plan That Fosters Confidence

Feb. 12, 2020

Compliance Records Are a Strategic Gold Mine

Feb. 5, 2020

Defining, Implementing and Documenting “Reasonable Security”

Jan. 29, 2020

30 Creative Ideas for Compliance Messaging

Jan. 8, 2020

How eBay and PayPal Use Key Performance Indicators to Evaluate and Improve Privacy Programs

Dec. 11, 2019

How to Handle E.U. Data Subject Access Requests

Nov. 20, 2019

AI for Fund Managers and Beyond: How to Automate the Legal Department and Maintain Privacy

Oct. 30, 2019

Guide to Cybersecurity Training: Assessing Effectiveness and Avoiding Pitfalls

Oct. 30, 2019

Reconciling Technology Development, Security and the Lawyer’s Role

Oct. 16, 2019

How Uber, eBay and Pitney Bowes Built Principles-Based Global Privacy Programs

Sep. 25, 2019

Hallmarks of High-Impact Compliance Programs and Compensation Trends for Those Who Implement Them

Sep. 11, 2019

Using “Red-Teaming” to Test and Improve Cyber Defenses

Aug. 7, 2019

Report Shows Strategic Buy-In From Executive Leadership Is the Key Driver of Successful Risk Mitigation

Aug. 7, 2019

How Facebook’s $5-Billion FTC Settlement Is Shaping Compliance Expectations

Jul. 31, 2019

The Growing Role of the Chief Data Officer: Compliance and Third Parties

Jul. 24, 2019

Privacy Officers Share Best Practices for Reporting to the Board

Jul. 24, 2019

The Growing Role of the Chief Data Officer: Reporting Structures and Budget

Jul. 17, 2019

The Growing Role of the Chief Data Officer: Skill Sets, Priorities and Collaboration

Jul. 17, 2019

How to Establish an Efficient Incident Response Plan

Jul. 17, 2019

Maine Enacts Sweeping Broadband Customer Privacy Law

Jun. 19, 2019

Tips From Lockheed and Groupon on Developing GC-CISO Partnerships to Improve Security and Incident Response

Jun. 5, 2019

Irish Data Protection Commissioner Helen Dixon on Breach Notification, the Role of the DPO and a U.S. Privacy Law

May 29, 2019

Keeping CISOs and the C-Suite Off the Witness Stand

May 15, 2019

How the World’s Most Ethical Companies Are Aligning Corporate Culture and Strategy

May 8, 2019

Making the Case for Increased Privacy Budgets Using Data and Diplomacy

May 1, 2019

Fresenius and Pearson Compliance Directors Discuss Corporate Community-Building

Apr. 24, 2019

Jeopardy, Coasters and the Behavioral Clock: Compliance Leaders at Fresenius and Pearson Discuss Effective Long- and Short-Term Initiatives

Apr. 17, 2019

GPEN Report Highlights Key Areas for Data Privacy Improvement

Apr. 3, 2019

FCA Evaluates Firms’ Cyber Resilience

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness, According to Experian Survey

Mar. 20, 2019

A Quick-Start Guide to Creating a Compliance Champion Program

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 20, 2019

Fixing the Chinks in Companies’ Cyber Armor: Executives

Dec. 19, 2018

Interim Response Lessons From the Marriott Breach

Dec. 5, 2018

Insights From Uber: Building Bridges Between Legal and Engineering

Nov. 28, 2018

Insights From Uber: An Inside Look at Its Privacy Team Structure and How Legal and Tech Collaborated on Its Differential Privacy Tool

Nov. 14, 2018

How Privacy Professionals Can Benefit Cybersecurity Programs: Practical Tips From Gap and Privacy Panacea

Nov. 7, 2018

How GoDaddy Built an Effective Privacy Program

Oct. 31, 2018

IAPP-EY Annual Report Finds GDPR Compliance Strides and DPO Explosion

Oct. 10, 2018

Fifteen Tips for an Effective Cybersecurity Board Presentation

Sep. 19, 2018

Evolving Roles of Privacy and Security Professionals: Operationalizing Policies, Incident Response and Vendor Management

Sep. 12, 2018

Evolving Roles of Privacy and Security Professionals: Effective Governance and Board Reporting

Sep. 5, 2018

Evolving Roles of Privacy and Security Professionals: Examining Required Skills and Potential Convergence

Aug. 15, 2018

How to Build a Cybersecurity Culture Using People, Processes and Technology

Aug. 8, 2018

Essential Cyber, Tech and Privacy M&A Due Diligence Considerations

Jun. 13, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Three of Three)

May 9, 2018

How Financial Services Firms Should Structure Their Cybersecurity Programs

May 9, 2018

Building a Customer Privacy Program: Lessons from Dupont’s Privacy Leaders

Apr. 25, 2018

Pillars of Effective Breach Detection, Response and Remediation

Apr. 11, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Assessments and Incident Response (Part Two of Three)

Mar. 28, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: It Starts With Governance (Part One of Three)

Mar. 14, 2018

How to Handle Rising Expectations for Board Cyber Education and Involvement

Feb. 14, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part Two of Two)

Jan. 31, 2018

How to Make the Most of Limited Compliance Resources

Jan. 31, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part One of Two)

Dec. 20, 2017

How to Make the Most of Limited Resources When Planning the Compliance Budget

Nov. 8, 2017

IBM Cybersecurity Counsel Offers Techniques for Speaking the Same Language as the C-Suite When Managing Cyber Risk

Nov. 8, 2017

Managing Data Privacy Across Multiple Jurisdictions

Oct. 25, 2017

Advice From Recruiters on How to Attract the Best and Brightest Security and Privacy Leadership

Oct. 11, 2017

How to Successfully Incorporate the Role of the Chief Technology Officer

Sep. 27, 2017

Deloitte Survey Shows Getting Skilled Cybersecurity Talent and Addressing Cyber Threats Among the Top Challenges for Financial Institutions

Aug. 23, 2017

Tips From Google, Chase and P&G Privacy Officers on Developing Strong Privacy Leadership and When to Use Outside Counsel

Jul. 26, 2017

How the CCO Can Use SEC Guidance to Tackle Cyber Threats 

Jul. 12, 2017

A Discussion With eHarmony’s GC About the Role of In-House Counsel in Cybersecurity

Jun. 28, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part Two of Two)

Jun. 28, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part Two of Two)

Jun. 14, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part One of Two)

Jun. 14, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part One of Two)

May 17, 2017

Advice From CPOs on Nurturing Privacy Programs on Any Budget

Apr. 19, 2017

What In-House and Outside Counsel Need to Know About ACC’s First Model Cybersecurity Practices for Law Firms

Apr. 5, 2017

A Discussion With Ireland’s Data Protection Commissioner Helen Dixon About GDPR Compliance Strategies (Part Two of Two)

Mar. 22, 2017

Forensic Firms: Effective Vetting and Collaboration (Part Three of Three)

Mar. 22, 2017

A Discussion With Ireland’s Data Protection Commissioner Helen Dixon About GDPR Compliance Strategies (Part One of Two)

Mar. 8, 2017

Forensic Firms: Key Contract Considerations and Terms (Part Two of Three)

Mar. 8, 2017

Preparing For Ransomware Attacks As Part of the Board’s Fiduciary Duty

Feb. 22, 2017

Strategies for In-House Counsel Responsible for Privacy and Data Security 

Feb. 22, 2017

A CSO/GC Advises on How and When to Present Cybersecurity to the Board 

Feb. 8, 2017

Getting to Know the DPO and How to Adapt Corporate Structure to Comply With GDPR Requirements for the Role (Part Two of Two)

Jan. 25, 2017

Getting to Know the DPO and Adapting Corporate Structure to Comply With the GDPR (Part One of Two)

Jan. 11, 2017

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part Two of Two)

Jan. 11, 2017

Tech Meets Legal Spotlight: Advice on Working With Information Security

Dec. 14, 2016

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part One of Two)

Dec. 14, 2016

Advice From Compliance Officers on Getting the C-Suite to Show You the Money for Your Data Privacy Program

Nov. 30, 2016

Using a Risk Assessment as a Critical Component of a Robust Cybersecurity Program (Part Two of Two)

Nov. 16, 2016

Using a Risk Assessment as a Critical Component of a Robust Cybersecurity Program (Part One of Two)

Nov. 2, 2016

Advice From Blackstone and Tiffany CISOs on Fighting Cybercrime

Oct. 19, 2016

Privacy Leaders Share Key Considerations for Incorporating a Privacy Policy in the Corporate Culture 

Sep. 21, 2016

What Private Companies Can Learn From the OPM Data Breaches

Aug. 24, 2016

How GE’s Global CPO Approaches Shifting Regulations With Dynamic Implications 

Aug. 3, 2016

How Cyber Stakeholders Can Speak the Same Language (Part Two of Two)

Jul. 20, 2016

Challenges Facing Chief Privacy Officers

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jun. 8, 2016

Eight Attributes In-House Counsel Look For in Outside Cybersecurity Counsel

Jun. 8, 2016

What CISOs Want Lawyers to Understand About Cybersecurity

May 11, 2016

Google, CVS and the FBI Share Advice on Interacting With Law Enforcement After a Breach

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Apr. 13, 2016

Study Analyzes How Companies Can Overcome Cybersecurity Challenges and Create Business Value

Apr. 13, 2016

A Look Inside the Cybersecurity and Privacy Law Department of a Top Defense Company

Mar. 30, 2016

Steps for Companies to Take This Week, This Month and This Year to Meet the Challenges of International Cyberspace Governance

Mar. 30, 2016

In-House and Outside Counsel Offer Strategies for Navigating the TCPA, Avoiding Litigation and Responding to Breaches

Feb. 3, 2016

How In-House Counsel, Management and the Board Can Collaborate to Manage Cyber Risks and Liability (Part Two of Two) 

Jan. 20, 2016

How In-House Counsel, Management and the Board Can Collaborate to Manage Cyber Risks and Liability (Part One of Two)

Jan. 20, 2016

Defining, Documenting and Measuring Compliance Program Effectiveness

Jan. 6, 2016

How the Financial Services Sector Can Meet the Cybersecurity Challenge: A Plan for Building a Cyber-Compliance Program (Part Two of Two)

Dec. 9, 2015

The Multifaceted Role of In-House Counsel in Cybersecurity 

Nov. 25, 2015

Implementing an Effective Cloud Service Provider Compliance Program

Nov. 11, 2015

Target Privilege Decision Delivers Guidance for Post-Data Breach Internal Investigations

Oct. 14, 2015

Eight Ways Compliance Officers Can Build Relationships With the “Middle”

Aug. 12, 2015

Surveys Find Internal and Third-Party Cybersecurity Risks Among Top Executive Concerns

Aug. 12, 2015

Cybersecurity 2.0: The Role of Counsel in Addressing Destructive Cyberattacks

Jul. 29, 2015

Managing the Increased Individual Risks and Responsibilities of Compliance Officers

Jul. 15, 2015

The Challenge of Coordinating the Legal and Security Teams in the Current Cyber Landscape (Part Two of Two)

Jul. 1, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part Two of Two)

Jul. 1, 2015

Coordinating Legal and Security Teams in the Current Cybersecurity Landscape (Part One of Two)

Jun. 17, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part One of Two)

May 20, 2015

Weil Gotshal Attorneys Advise on Key Ways to Anticipate and Counter Cyber Threats

May 20, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part Two of Two)

May 6, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part One of Two)

Apr. 8, 2015

How Can a Company Mitigate Cyber Risk with Cross-Departmental Decisionmaking?

May 14, 2025

“Everyone Wants to Speak to the CISO” and Other Realities of Addressing Vendor Breaches

May 7, 2025

Rethinking Click-Through Training: Integration Into a Comprehensive Training Program

Apr. 23, 2025

How Ericsson Made Compliance Training Must-See TV

Apr. 23, 2025

Redefining Compliance From a Consumer-Centric Obligation to Product-Embedded Enablement

Apr. 16, 2025

Rethinking Click-Through Training: Maximize Effectiveness With Customization

Apr. 9, 2025

Six Steps to Address the SEC’s Trump Era Cyber Enforcement Priorities

Apr. 9, 2025

Reference Guide to 2025 Executive Orders for Compliance Professionals

Apr. 2, 2025

2025 LRN Effectiveness Survey Finds Lags in Third-Party Diligence

Apr. 2, 2025

Statistics on Privacy Staffing, Budgets and Compliance Culture

Mar. 26, 2025

Rethinking Click-Through Training: The Pluses and Minuses

Mar. 19, 2025

Staying Ahead of Rising Identity-Based and Cloud Intrusions

Mar. 12, 2025

Managing Tracking Technologies and Their Privacy Dilemmas in 2025

Mar. 5, 2025

Navigating Evolving Mobile App Privacy Issues

Feb. 26, 2025

Survey Finds Increased Value in Having a Culture of Compliance

Feb. 26, 2025

The Tension Between Data Scraping and Data Protection in an AI-Driven World

Feb. 12, 2025

Children’s Privacy Grows Up: Seven Compliance Areas for Protecting Teens

Feb. 12, 2025

New Jersey and Oregon Advisories Contribute to AI Guidance From State AGs

Feb. 5, 2025

How the 2025 Cybersecurity Executive Order Affects Business

Jan. 22, 2025

Nine Cybersecurity Resolutions for 2025

Jan. 15, 2025

Children’s Privacy Grows Up: Examining New Laws That Now Protect Older Teens

Jan. 8, 2025

Loose Lips Sink Ships: Maintaining Confidentiality in Investigations

Dec. 11, 2024

Preparing for U.S. State Law Privacy Compliance in 2025

Dec. 11, 2024

DOJ’s 2024 Edits to the ECCP: Speaking Up, Compliance Resources and Lessons Learned

Oct. 30, 2024

What to Know (and Do) About DOJ’s Efforts to Identify and Prosecute Cybersecurity Fraud Under the False Claims Act

Oct. 30, 2024

Emerging Issues in Workplace Privacy: Regulations and Compliance Strategies

Oct. 23, 2024

Aftermath of the Ninth Circuit BIPA Liability Shake‑Up in Zellmer v. Meta

Oct. 23, 2024

Emerging Issues in Workplace Privacy: Data Collected and Employees’ Perspectives

Oct. 9, 2024

Emojis and Video Communications: Compliance Practices to Overcome Recordkeeping Challenges

Oct. 2, 2024

Emojis and Video Communications: The Next Frontier of SEC Scrutiny?

Sep. 18, 2024

SEC Penalizes Adviser for Failing to Preserve Off-Channel Communications

Sep. 4, 2024

Making the Business Case for Privacy

Aug. 21, 2024

Navigating U.S. Privacy Laws in Internal Investigations

Jul. 17, 2024

Thoughts From DOJ Experts on Using Data Analytics to Strengthen Compliance Programs

Jun. 26, 2024

A Mock Cyber Incident Tabletop: Day Two and Beyond

Jun. 26, 2024

Measures for Complying With 19 (and Counting) State Privacy Laws

Jun. 19, 2024

A Mock Cyber Incident Tabletop: Day One, Everything at Once

May 22, 2024

How the FTC Non‑Compete Ban Could Impact CPOs, CCOs and Other Top Executives

May 1, 2024

Off-Channel Communications Are Not the Only Source of Electronic Recordkeeping Violations

May 1, 2024

Navigating Ransomware’s Challenges

Apr. 10, 2024

Latest SEC Sweep of Off‑Channel Communications Both Befuddles and Turns Up the Heat on Investment Advisers

Apr. 3, 2024

Crafting Effective Mobile Device Policies to Satisfy Regulatory Expectations

Mar. 20, 2024

AI Drives Rise in Private Funds’ Use of Alternative Data

Mar. 20, 2024

Examining the Cyber Threat Landscape Dominated by Stealth Attacks

Mar. 6, 2024

Scraping Battles: Global Privacy Regulators Urge Safeguards to Stop Data Scraping

Feb. 28, 2024

Cybersecurity Practices for PE Sponsors and Their Portfolio Companies: Incident Prevention and Response

Feb. 28, 2024

Legal and Ethical Issues in Use of Biometrics: FIDO, Identity-Proofing and Other Options

Feb. 28, 2024

Data Retention and Destruction Lessons From FTC’s Blackbaud Case

Feb. 21, 2024

Legal and Ethical Issues in Use of Biometrics: Modality Selection, Implementation and State Laws

Feb. 21, 2024

Scraping Battles: Meta Loses Legal Effort to Halt Harvesting of Personal Profiles

Feb. 7, 2024

Avoiding Pitfalls in Cyber Insurance Applications and Claims

Jan. 24, 2024

Emerging Cyber Threats and Defenses

Jan. 10, 2024

Ten Cybersecurity Resolutions for 2024

Jan. 3, 2024

Amendment to NYDFS Cyber Regulation Brings New Mandates: First Compliance Steps

Dec. 13, 2023

Navigating a Breach As a Third-Party Service Provider: Notifications, Network Decisions and Preserving Privilege

Dec. 13, 2023

Amendment to NYDFS Cyber Regulation Brings New Mandates: Governance Provisions

Dec. 6, 2023

U.K. Penalizes Morgan Stanley for Lax Electronic Communications Practices

Dec. 6, 2023

Navigating a Breach As a Third-Party Service Provider: Communications and Investigation

Nov. 29, 2023

Ransomware and Incident Response Considerations for Global Companies

Nov. 22, 2023

Task 4: Data Requests

Nov. 8, 2023

Top Tips for Effective GC Succession Planning and Training

Nov. 8, 2023

What the AI Executive Order Means for Companies: Seven Key Takeaways

Nov. 1, 2023

Compliance Challenges in Records Management

Sep. 27, 2023

Changes Brewing for Enforceability of Non‑Compete Provisions

Sep. 27, 2023

CSRB Report on Lapsus$ Attacks: Moving Beyond MFA, Building Resilience and Mitigating Third-Party Threats

Sep. 27, 2023

The Good, Bad and Ugly of Summer’s Cyber Incidents

Sep. 20, 2023

CSRB Report on Lapsus$ Attacks: Key Takeaways and Law Enforcement Cooperation

Sep. 20, 2023

SEC and CFTC Continue to Penalize Firms for Electronic Communications Recordkeeping Violations

Sep. 20, 2023

NYC AI Audit Law: A Best Practice Guide, From Choosing an Auditor to Avoiding Enforcement

Sep. 13, 2023

NYC AI Audit Law: What Five Companies Published – and How Others Avoid It

Aug. 30, 2023

Ransomware Incident Response Checklist

Aug. 30, 2023

Checklist for Addressing Employee Data Rights Requests

Aug. 23, 2023

3. Location Data Series

Aug. 16, 2023

Recent Developments in SEC, DOJ and Civil Litigation Efforts Targeting Off-Channel Electronic Communications

Aug. 9, 2023

Go Phish: Employee Training Key to Fighting Social Engineering Attacks

Jul. 26, 2023

Checklist for Addressing Employee Data Rights Requests

Jul. 19, 2023

CFTC Commissioner Shares Five Pillars of Cyber Resilience

Jul. 12, 2023

SEC Remains Focused on Off-Channel Communications

Jul. 12, 2023

Stolen Credentials, Phishing and Vulnerability Exploits Are Key Attack Vectors, According to Verizon Data Breach Report

Jul. 5, 2023

Employee Data Under the CPRA Series

Jun. 21, 2023

The Practical and Legal Complexities of Online Age Verification

Jun. 14, 2023

Messaging Apps Come Under Increasing Regulatory Scrutiny

Jun. 7, 2023

Implications of CJEU Ruling on Compensation for GDPR Claims

Apr. 26, 2023

Tips for Working With Cyber Insurance Carriers Following a Ransomware Event

Apr. 26, 2023

Cloud Attacks and Six Other Cybersecurity Dangers for 2023 and 2024

Apr. 26, 2023

Ransomware Incident Response Checklist

Apr. 19, 2023

Delaware Chancery Court Strikes Down Employee Restrictive Covenants in a Partnership Agreement

Apr. 12, 2023

Navigating the Intersection of Whistleblowing and China’s Data Protection Regime

Apr. 12, 2023

Complying With Europe’s Digital Services Act and Digital Markets Act

Apr. 5, 2023

Verizon Report Details Evolution of Threats and Provides Cybersecurity Program Advice

Mar. 29, 2023

Use of Alternative Data Continues to Grow, Says New Survey

Mar. 22, 2023

Managing Legal Issues Arising From Use of ChatGPT and Generative AI: Industry Considerations and Practical Compliance Measures

Mar. 8, 2023

What Employers Should Know About the FTC’s Proposed Ban on Non-Compete Provisions

Mar. 8, 2023

BIPA Decisions Expand Potential Liability: What’s Next in Illinois and Other States?

Mar. 8, 2023

Best Practices to Combat Surge of Unwanted Data Scraping

Mar. 1, 2023

The Impact of New York City’s New Wage Transparency Law on Hiring

Feb. 22, 2023

Lessons From the Multinational Takedown of Hive Ransomware: Coordination and Defensive Priorities

Feb. 15, 2023

Lessons From the Multinational Takedown of Hive Ransomware: A Broad Impact

Jan. 18, 2023

A Sensitive Time for Location Data: Tips to Address New Rules and Vendor Standards

Jan. 18, 2023

Electronic Communications, Cooperation Standards and Other Emerging Trends in the SEC’s Oversight of Private Funds

Jan. 11, 2023

A Ransomware Tabletop’s 360-Degree Incident Response View: Day Five Through Post-Mortem

Jan. 4, 2023

FTC and $391-Million State AG Case Put Location Data Enforcement on the Map

Jan. 4, 2023

A Ransomware Tabletop’s 360-Degree Incident Response View: Days One to Four

Dec. 14, 2022

Taking Compliance Policies From Dense and Dry to Effective and Engaging

Nov. 30, 2022

Navigating Evolving Social Media Risks

Nov. 23, 2022

6) Ransomware Evolution

Nov. 16, 2022

Compliance Checklist for Consumer and Employee DSARs

Nov. 16, 2022

Ransomware Evolution: Government Efforts and Cyber Insurance

Nov. 9, 2022

Ransomware Evolution: Growing Threats and Response Considerations

Nov. 2, 2022

In New Proposal, E.U. Aims to Boost Security of Connected Devices

Oct. 26, 2022

Navigating the Interplay of Breach Response and Breach Notification

Oct. 19, 2022

Held to Ransom: How Cyberattacks Can Become a Legal and Regulatory Odyssey for a Private Investment Fund

Oct. 19, 2022

GM CCO Talks Data, Culture, ESG and Scope Creep

Oct. 5, 2022

The Great Resignation: Cyber Risks in the Crypto Sector

Sep. 21, 2022

Held to Ransom: How Cyberattacks Can Become a Legal and Regulatory Odyssey for a Private Investment Fund

Sep. 14, 2022

Shaping the BIPA Landscape: Avoiding Liability

Sep. 07, 2022

Cyber Crisis Communications – “No Comment” Is Not an Option

Aug. 24, 2022

Employee Data Under the CPRA

Aug. 10, 2022

Protecting Against Crypto Theft

Aug. 3, 2022

How to Prepare for the Cybersecurity Incident Reporting for Critical Infrastructure Act

Jul. 27, 2022

A Checklist to Help Fund Managers Assess Their Cybersecurity Programs

Jul. 27, 2022

Employee Data Under the CPRA: Rights Requests, Privacy Policies and Enforcement

Jul. 20, 2022

Employee Data Under the CPRA: Key Rights and Restrictions

Jul. 13, 2022

Handling Evolving Post-Pandemic Employee Privacy Issues

Jun. 29, 2022

Navigating the Intersection of Digital Assets and AML

Jun. 15, 2022

Behavioral Science in Compliance Programs: Learning From the Data and Changing the Perspective

Jun. 8, 2022

Behavioral Science in Compliance Programs: Concepts and Examples

Jun. 1, 2022

Tesco Is Making Big Strides With Little Learning Leaps

May 25, 2022

TV Privacy: Will the TV Industry Agree to Standardize Consent on Screen?

May 25, 2022

Ransomware and Sanctions in the Time of War

May 18, 2022

TV Privacy: Can Old Remotes Handle New Consent Requirements?

Apr. 13, 2022

Advice From a CPO on Balancing Insider Threat Management and Privacy

Apr. 6, 2022

How Colonial Pipeline Changed Advice on Ransomware Preparation and Response

Apr. 6, 2022

How to Measure Whether Your Company Is Ready to Catch Lots of Phish

Mar. 30, 2022

As Email Scams Surge, Training Lessons From 115 Million Phishing Messages

Mar. 2, 2022

Prioritizing Public-Private Partnerships in an Increasingly Complex Regulatory Environment

Feb. 16, 2022

Evolving Career Path and Rising Compensation for CISOs

Jan. 26, 2022

Lessons From SolarWinds

Jan. 12, 2022

SEC Chair Gensler’s Stance on Three Key Disclosure Areas and the Role of Individual Accountability in Enforcement Actions

Jan. 12, 2022

Ten Tips to Prepare for and Navigate Ransomware Decisions

Jan. 12, 2022

Cybersecurity Resolutions for 2022

Dec. 15, 2021

To Pay or Not to Pay? Empirical Studies Show Keys to Ransomware Decisions

Dec. 01, 2021

Former SDNY Complex Frauds and Cybercrime Unit Co-Chief Discusses Prosecution Trends and Takeaways

Nov. 10, 2021

Cyber Insurance Litigation Trends Amid Rising Ransomware Attacks

Nov. 3, 2021

In-House Insight on Handling Data Subject Access Requests Under Multiple Privacy Regimes

Oct. 13, 2021

New Pressures Shift Best Practices for Ransomware Crisis Communications

Oct. 6, 2021

How to Build Insider Risk Programs to Satisfy Global Employee Privacy Laws

Sep. 29, 2021

SEC Cybersecurity Disclosure Enforcement Heats Up: Best Practices

Sep. 29, 2021

Value of Sponsors Implementing Portfolio Monitoring Models for ESG and Cybersecurity Issues

Sep. 15, 2021

Electronic Communications: Using Third Parties for Compliance, Mitigating Social Media Risks and Fulfilling Document Requests

Sep. 8, 2021

Electronic Communications: Useful Training Techniques and Policies and Procedures to Adopt

Aug. 18, 2021

Post-Pandemic Workplace Vaccines and Testing Policy Checklist

Aug. 18, 2021

A Look Inside Businesses’ Private Disputes Over Ransomware Costs

Aug. 18, 2021

Electronic Communications: Current Technological Landscape and Relevant Regulatory Measures

Jul. 21, 2021

Vaccines and Testing in the Post-Pandemic Workplace: Answers to the Tough Questions

Jul. 21, 2021

Understanding Common Hacking Techniques and Forensic Analysis

Jul. 14, 2021

Vaccines and Testing in the Post-Pandemic Workplace: Understanding the Legal Framework and Making a Balanced Plan

Jul. 14, 2021

Tips on Building Excitement for a New Code From Oerlikon Compliance Head

Jul. 7, 2021

A Fake Zoom Invite Hack: What Happened and Eleven Lessons

Jul. 7, 2021

CISA and DHS Counsel Explain Cybersecurity Executive Order’s Key Provisions

Jul. 7, 2021

How Law Firms Can Prevent, Detect and Respond to Ransomware Attacks

Jul. 7, 2021

Digital Identity Management in a Post-Pandemic World: SolarWinds, Zero Trust and the Challenges Ahead

Jun. 30, 2021

DOL Begins Cyber Audits to Protect U.S. Workers’ Retirement Savings

Jun. 2, 2021

Post-COVID Compliance Strategies: Dealing With Persistent Heightened Risks

May 26, 2021

Task Force Leader Addresses Proposed Mandatory Reporting of Ransomware Payments

May 26, 2021

CISA and DHS Counsel Explain Cybersecurity Executive Order’s Key Provisions

May 19, 2021

Cybersecurity in a 5G World: Tackling the Challenges With Revised Strategies

May 19, 2021

Task Force Leader Discusses How to Beat Ransomware in a Year

May 12, 2021

Cybersecurity in a 5G World: Vulnerabilities and Challenges

May 12, 2021

How Law Firms Can Prevent, Detect and Respond to Ransomware Attacks

Apr. 7, 2021

Former Twitter and eBay Counsel Talks Overblown Fears, Third-Party Data Management, and CDA Section 230

Apr. 7, 2021

Did Clubhouse Sacrifice Privacy for Innovation? How to Find the Balance 

Mar. 31, 2021

How Do You Put a System of Controls in Place When Your Target Keeps Moving?

Mar. 24, 2021

Digital Identity Management in a Post-Pandemic World: A Framework for Identity-Centric Cybersecurity

Mar. 17, 2021

Digital Identity Management in a Post-Pandemic World: SolarWinds, Zero Trust and the Challenges Ahead

Feb. 24, 2021

Cargill Compliance Director Discusses Putting Training Data to Work

Feb. 17, 2021

A Fake Zoom Invite Hack: Eight More Lessons

Feb. 10, 2021

A Fake Zoom Invite Hack: What Happened and Three Lessons

Feb. 3, 2021

Expect Continuing Regulatory Focus on Cybersecurity and Data Protection in 2021

Feb. 3, 2021

How to Prevent and Handle Disputes Over Ransomware Insurance Claims

Jan. 13, 2021

Checklist for IoT Security Audits

Jan. 13, 2021

Cybersecurity Resolutions for 2021

Dec. 16, 2020

How Will the Biden Administration’s Approach to Cybersecurity Impact the Private Sector?

Nov. 25, 2020

Steps to Take After OFAC and FinCEN’s Warnings on Ransomware Payoffs

Nov. 25, 2020

Managing Ransomware’s Mutation Into a Public Data Breach

Nov. 11, 2020

The Intelligent Workplace in the Age of a Pandemic: Six Privacy and Security Safeguards

Nov. 4, 2020

A Guided Tour of Enterprise IoT Device Hazards

Oct. 28, 2020

The Intelligent Workplace in the Age of a Pandemic: Balancing Innovation and Risk

Oct. 21, 2020

Steps to Take After OFAC and FinCEN’s Warnings on Ransomware Payoffs

Oct. 14, 2020

H&M’s $41M GDPR Fine Underscores Importance of Employee Data Handling

Oct. 7, 2020

How to Address Intensifying Enterprise IoT Security Risks

Sep. 23, 2020

Identifying and Preventing Ransomware Attacks

Sep. 16, 2020

How Can Your Firm Avoid Being the Next Target of a Cultural Engineering Attack?

Sep. 16, 2020

Twelve Steps for Engaging the Board of Directors and Implementing a Long-Term Cybersecurity Plan

Sep. 9, 2020

Action Steps to Respond to Ransomware Attacks

Aug. 12, 2020

Not Just TikTok: How Companies Can Mitigate Risk of Employee Social Media Use

Jul. 29, 2020

Evolution and Mitigation of Insider Cyber Threats During COVID-19

Jul. 22, 2020

Majority of In-House Counsel Satisfied With Compensation, but Gender Gap Remains

Jul. 8, 2020

Privacy Compliant Return-to-Work Checklist

Jun. 24, 2020

Balancing Privacy Rights and Innovation in Digital Contact Tracing

Jun. 10, 2020

How Compliance Departments Are Responding to COVID‑19

Jun. 3, 2020

How CISOs Can Use Digital Asset Metrics to Tell a Coherent Cyber Story to the Board

Jun. 3, 2020

Re-Evaluating Cybersecurity in the Remote Work Environment

May 27, 2020

How to Facilitate a Safe and Privacy Compliant Return to Work: Contact Tracing

May 20, 2020

How to Facilitate a Safe and Privacy Compliant Return to Work: Policies and Protocols

May 13, 2020

How to Facilitate a Safe and Privacy Compliant Return to Work: Laws and Guidance

May 6, 2020

Managing Ransomware’s Mutation Into a Public Data Breach

Apr. 29, 2020

Understanding Insider Trading Based on Data Breaches Amidst Heightened Regulatory Scrutiny

Apr. 29, 2020

The Pandemic Effect: How Compliance and Enforcement Are Evolving

Apr. 22, 2020

Morrisons Ruling Lets U.K. Employers Off the Hook for Rogue Employee Data Leaks

Apr. 8, 2020

Wide-Ranging Lessons From Notable Breaches in Q1

Apr. 8, 2020

DOJ Guidance on How Companies Should Pursue Stolen Data on the Dark Web

Apr. 1, 2020

Investigation Strategies During Social Distancing

Mar. 25, 2020

Companywide Work From Home: Six Cybersecurity Considerations

Mar. 18, 2020

Business Considerations for Responding to the Coronavirus Outbreak

Feb. 19, 2020

Preparing for and Responding to Ransomware Attacks

Jan. 29, 2020

30 Creative Ideas for Compliance Messaging

Jan. 15, 2020

How Compliance and HR Can Work Together

Jan. 15, 2020

When Does Social Engineering Fraud Qualify for Insurance Coverage?

Dec. 18, 2019

FTC Spyware Takedown Highlights Employee Monitoring Privacy Shifts

Oct. 30, 2019

Guide to Cybersecurity Training: Assessing Effectiveness and Avoiding Pitfalls

Oct. 23, 2019

CFTC Issues $1.5-Million Fine After Phishing Attack

Oct. 23, 2019

Guide to Cybersecurity Training: What to Cover and Implementation Strategies

Oct. 16, 2019

Guide to Cybersecurity Training: Program Hallmarks and Whom to Train

Oct. 9, 2019

DOJ Spotlights Emerging Issues and Protection Strategies Around Business Email Compromise Attacks

Sep. 25, 2019

Hallmarks of High-Impact Compliance Programs and Compensation Trends for Those Who Implement Them

Sep. 25, 2019

Strategies and Tactics for Conducting an Effective Tabletop Exercise (Part Two of Two)

Aug. 7, 2019

Report Shows Strategic Buy-In From Executive Leadership Is the Key Driver of Successful Risk Mitigation

Jul. 31, 2019

Takeaways From the U.K. ICO’s FaceApp Warning

Jun. 26, 2019

Employee Privacy and Off-Duty Conduct: Balancing Company Interests Against Employee Rights

May 15, 2019

How the World’s Most Ethical Companies Are Aligning Corporate Culture and Strategy

Apr. 24, 2019

Jeopardy, Coasters and the Behavioral Clock: Compliance Leaders at Fresenius and Pearson Discuss Effective Long- and Short-Term Initiatives

Apr. 17, 2019

GPEN Report Highlights Key Areas for Data Privacy Improvement

Apr. 17, 2019

China Establishes Certification Scheme for Mobile App Operators

Apr. 10, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Five Risk-Mitigation Strategies

Apr. 3, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Understanding the Legal Landscape

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness, According to Experian Survey

Feb. 20, 2019

Fixing the Chinks in Companies’ Cyber Armor: Executives

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 13, 2019

FINRA Report Addresses Common Cybersecurity Risks and Recommends Mitigation Measures

Jan. 16, 2019

Key Cyber Threats and Targets for 2019

Dec. 5, 2018

Answers to Four Critical Questions on Privilege in Internal Investigations

Dec. 5, 2018

Tips from EY’s Forensics Team on Recognizing and Preventing BEC Attacks

Oct. 24, 2018

California Enacts Groundbreaking IoT Law and Requires Disclosure of Bot Use

Oct. 17, 2018

Risks and Rewards of Bluetooth Technology

Oct. 3, 2018

Lax Privacy Policies, Security Measures and Vendor Oversight Lead to FTC Settlement for Mobile Phone Manufacturer

Sep. 5, 2018

Twenty Steps Toward Achieving an Effective Social Media Policy

Aug. 22, 2018

Protecting Against the Security Risks of Departing Employees

Aug. 15, 2018

How to Build a Cybersecurity Culture Using People, Processes and Technology

Aug. 1, 2018

Checklist for an Effective Employee Monitoring Program

Jul. 11, 2018

Ransomware Lessons From the Trenches of the MedStar Attack

Jun. 6, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Two of Three)

May 30, 2018

Understanding the Intersection of Law and Artificial Intelligence

May 16, 2018

Crafting a Multinational Employer Social Media Policy After Cambridge Analytica

Apr. 18, 2018

Ten Common Post-Breach Public Relations Failures and How to Avoid Them

Apr. 18, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Vendors and M&A (Part Three of Three)

Mar. 28, 2018

FTC Recommends Greater Transparency, Better Recordkeeping and Further Streamlining of Mobile Security Practices

Mar. 28, 2018

Beware of False Friends: A Hedge Fund Manager’s Guide to Social Engineering Fraud

Mar. 14, 2018

FTC Enters Into Stiff Settlement With PayPal for Venmo’s Deceptive Practices, but Eases up on a 2009 Sears Order 

Mar. 14, 2018

Identifying and Preparing for Ransomware Threats (Part Two of Two)

Feb. 28, 2018

Identifying and Preparing for Ransomware Threats (Part One of Two)

Feb. 14, 2018

NY AG and HHS Flex Regulatory Muscles in Recent Protected Health Information Breach Settlements

Apr. 5, 2017

Effective and Compliant Employee Monitoring (Part One of Two) 

Dec. 20, 2017

Benchmarking Employee Monitoring Policies for Practical Approaches

Oct. 11, 2017

FTC Launches Stick With Security Series, Adding Detail and Guidance to Its Start With Security Guide (Part Two of Two)

Oct. 11, 2017

Creating Tomorrow’s Code, Today: Designing an Effective Mobile-First Code of Conduct

Sep. 27, 2017

New Criteria for Employee Monitoring Practices in Light of ECHR Decision

Sep. 21, 2016

Managing Data Privacy Challenges While Conducting Due Diligence and Investigations in China (Part Two of Two)

Jul. 26, 2017

What the Financial Industry Should Know to Recognize and Combat Cyber Threats (Part One of Two)

Jul. 26, 2017

Overcoming the Challenges and Reaping the Benefits of Multi-Factor Authentication in the Financial Sector (Part One of Two)

May 31, 2017

Defending Against the Rising Threat of Ransomware in the Wake of WannaCry

May 17, 2017

Executive Order on Cybersecurity Signed Amidst Massive Worldwide Ransomware Attack

Apr. 19, 2017

Effective and Compliant Employee Monitoring (Part Two of Two)

Apr. 19, 2017

The Wisdom of Planning Ahead: The Duty to Preserve Backup Tapes, Mobile Devices and Instant Messages

Apr. 19, 2017

Goodbye to the Blame Game: Forging the Connection Between Companies and Law Enforcement in Incident Response

Apr. 5, 2017

Best Practices for Mitigating Compliance Risks When Investment Advisers Use Social Media 

Apr. 5, 2017

Multimillion-Dollar Scheme Serves As Backdrop for Lessons on Preventing and Mitigating Phishing Attacks

Mar. 22, 2017

What It Takes to Establish Compliant Social Media Policies for the Workplace

Mar. 8, 2017

Preparing For Ransomware Attacks As Part of the Board’s Fiduciary Duty

Mar. 8, 2017

A Real-Life Scenario Offers Lessons on How to Handle a Breach From the Inside

Jan. 25, 2017

Tracking Consumer Data: DAA Guidance Applies Core Principles to Cross-Device Technology

Jan. 11, 2017

Ten Cybersecurity Priorities for 2017

Jan. 11, 2017

FTC Priorities for 2017 and Beyond

Nov. 2, 2016

Advice From Blackstone and Tiffany CISOs on Fighting Cybercrime

Oct. 19, 2016

Finding the Best Ways to Secure Digital Transactions in a Mobile World 

Oct. 19, 2016

SEC Emphasizes Protecting Information From More Than Just Cyber Threats in Deutsche Bank Case

Sep. 21, 2016

Staying Cybersecure Without Mobile Device Management

Aug. 24, 2016

Cybersecurity Due Diligence in M&A Is No Longer Optional

Aug. 3, 2016

Is Pokémon Go Pushing the Bounds of Mobile App Privacy and Security?

Aug. 3, 2016

Procedures for Hedge Fund Managers to Safeguard Trade Secrets From Rogue Employees 

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jul. 20, 2016

Using Data Analytics to Combat Internal Cyber Threats

Jul. 6, 2016

Technology Leader Discusses How to Deal With the Growing Threat of Ransomware 

May 25, 2016

Do You Know Where Your Employees Are? Tackling the Privacy and Security Challenges of Remote Working Arrangements

Apr. 27, 2016

Mitigating the Risks of Using Social Media in the Workplace

Apr. 27, 2016

Regulators Speak Candidly About Cybersecurity Trends, Priorities and Coordination

Apr. 13, 2016

The Regulators’ View of Best Practices for Social Media and Mobile Apps

Mar. 30, 2016

Twenty Ways a Company Can Use Behavioral Psychology to Improve Compliance

Mar. 30, 2016

How Law Firms Should Strengthen Cybersecurity to Protect Themselves and Their Clients

Mar. 16, 2016

Designing, Implementing and Assessing an Effective Employee Cybersecurity Training Program (Part Three of Three)

Mar. 2, 2016

Designing, Implementing and Assessing an Effective Employee Cybersecurity Training Program (Part Two of Three)

Feb. 17, 2016

Designing, Implementing and Assessing an Effective Employee Cybersecurity Training Program (Part One of Three)

Feb. 17, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part Two of Two)

Feb. 3, 2016

Minimizing Breach Damage When the Rubber Hits the Road

Feb. 3, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part One of Two)

Jan. 6, 2016

Keeping Up with Technology and Regulatory Changes in Online Advertising to Mitigate Risks

Jan. 6, 2016

Cybersecurity and Whistleblowing Converge in a New Wave of SEC Activity

Dec. 9, 2015

The Multifaceted Role of In-House Counsel in Cybersecurity 

Dec. 9, 2015

Avoiding Privacy Pitfalls While Using Social Media for Internal Investigations

Nov. 11, 2015

How to Reduce Cybersecurity Risks of Bring Your Own Device Policies (Part Two of Two)

Oct. 28, 2015

Privacy and Data Security Considerations for Life Sciences and Health Technology Companies (Part Two of Two)

Oct. 14, 2015

How to Reduce the Cybersecurity Risks of Bring Your Own Device Policies (Part One of Two)

Oct. 14, 2015

Eight Ways Compliance Officers Can Build Relationships With the “Middle”

Sep. 16, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part Two of Two)  

Aug. 26, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part One of Two)

Aug. 12, 2015

Navigating the Evolving Mobile Arena Landscape (Part Two of Two)

Aug. 12, 2015

Can an Employee Be Liable for Inadvertently Providing Security Details to a Fraudulent Caller?

Jul. 29, 2015

How to Prevent and Manage Ransomware Attacks (Part Two of Two)

Jul. 29, 2015

How to Secure Evolving Mobile Technology and the Data It Collects (Part One of Two)

Jul. 15, 2015

How to Prevent and Manage Ransomware Attacks (Part One of Two)

May 6, 2015

Top Private Practitioners and Public Officials Detail Hot Topics in Cybersecurity and Best Practices for Government Investigations

Apr. 8, 2015

Strategies for Preventing and Handling Cybersecurity Threats from Employees

May 21, 2025

Update on Digital Governance in India and China

May 7, 2025

Benchmarking AI Governance Practices and Challenges

Apr. 30, 2025

NAVEX Statistics on Internal Reporting and Substantiation

Apr. 23, 2025

Redefining Compliance From a Consumer-Centric Obligation to Product-Embedded Enablement

Apr. 16, 2025

Checklist for AI Procurement

Apr. 9, 2025

Data Clean Rooms and De-Identified Data Are Among Concerns in Navigating State Privacy Laws

Apr. 9, 2025

Six Steps to Address the SEC’s Trump Era Cyber Enforcement Priorities

Apr. 2, 2025

Statistics on Privacy Staffing, Budgets and Compliance Culture

Apr. 2, 2025

2025 LRN Effectiveness Survey Finds Lags in Third-Party Diligence

Mar. 19, 2025

Assessing and Managing AI’s Transformation of Cybersecurity in 2025

Mar. 12, 2025

How CPOs Can Manage Evolving Privacy Risk and Add Value to Their Organizations

Mar. 12, 2025

The Algorithmic CCO: Practical Steps for Implementing AI in Compliance

Mar. 5, 2025

The Algorithmic CCO: AI’s Role in Shaping the Future of Hedge Fund Governance

Mar. 5, 2025

FTC Settlement Spotlights Security of APIs Proliferating Across the Internet

Feb. 26, 2025

Former NIST Leader Discusses Data Governance As Master Key to a Trio of Frameworks

Feb. 26, 2025

The Tension Between Data Scraping and Data Protection in an AI-Driven World

Feb. 26, 2025

Survey Finds Increased Value in Having a Culture of Compliance

Feb. 19, 2025

Transforming Security and Privacy Workloads With Generative AI: A Comprehensive Framework

Feb. 12, 2025

AI Governance: Striking the Balance Between Innovation, Ethics and Accountability

Jan. 29, 2025

Unifying Risk Assessments: Breaking Silos to Enhance Efficiency and Manage Risk

Jan. 22, 2025

How Internal Investigations Can Let the Compliance Team Shine

Jan. 22, 2025

Nine Cybersecurity Resolutions for 2025

Jan. 15, 2025

Children’s Privacy Grows Up: Examining New Laws That Now Protect Older Teens

Jan. 8, 2025

Loose Lips Sink Ships: Maintaining Confidentiality in Investigations

Jan. 8, 2025

Website Privacy Compliance Statistics and Practical Takeaways

Dec. 18, 2024

Transparency Needed, This Time in Roles for Privacy Professionals

Dec. 18, 2024

SEC Stresses Cybersecurity, AI and Crypto in Its 2025 Exam Priorities

Dec. 11, 2024

Preparing for U.S. State Law Privacy Compliance in 2025

Dec. 4, 2024

Checklist for Conducting Technical Privacy Reviews

Nov. 13, 2024

To Work Effectively, CCOs Need Authority, Autonomy and Information

Oct. 9, 2024

What CCOs Should Know About the DOJ’s Efforts to Curtail Criminal Use of AI

Oct. 2, 2024

How to Manage AI Procurement: Five Steps

Sep. 25, 2024

Outgoing CPPA Board Member Discusses Rulemaking and Looming Privacy Issues

Sep. 18, 2024

How to Manage AI Procurement: Leadership and Preparation

Sep. 4, 2024

Making the Business Case for Privacy

Sep. 4, 2024

Cybersecurity Obligations in E.U.’s Digital Laws: AI Act, CRA and NIS2

Aug. 21, 2024

Navigating U.S. Privacy Laws in Internal Investigations

Aug. 21, 2024

How to Select the Latest Cloud Security Tools and Platforms

Aug. 7, 2024

How Privacy Efforts Can Boost Revenue

Jul. 31, 2024

How Hedge Funds Are Approaching AI Use

Jul. 31, 2024

Restricting Super Users and Zombie IDs to Increase Cloud Security

Jul. 24, 2024

Compliance Program Implementation: Compliance Calendars and Testing

Jul. 17, 2024

FCC Forfeiture Orders Underline Need for Vigilance on Geolocation Sharing

Jun. 26, 2024

Measures for Complying With 19 (and Counting) State Privacy Laws

Jun. 19, 2024

Navigating Recent Changes to China’s Data Privacy Laws in Internal Investigations

Jun. 12, 2024

Six Steps for Improving Cloud Security From CSRB’s Report on Microsoft Intrusion

Jun. 5, 2024

How to Address the Colorado AI Act’s “Complex Compliance Regime”

May 29, 2024

Testing Is an Integral Component of Compliance Programs

May 8, 2024

Answers to Top Questions About the E.U. AI Act: Practical Steps and What’s Next

May 8, 2024

Survey Finds Cybersecurity Budgets Rising and Increased Incident Response Confidence

May 1, 2024

Answers to Top Questions About the E.U. AI Act: Risk Tiers and Big-Player Transparency

Apr. 24, 2024

Answers to Top Questions About the E.U. AI Act: Reach and Unique Requirements

Apr. 17, 2024

AI Governance Strategies for Privacy Pros

Apr. 17, 2024

How to Achieve Privacy by Design With a Technical Privacy Review

Apr. 3, 2024

Addressing the Operational Complexities of Complying With the Washington My Health My Data Act

Apr. 3, 2024

Crafting Effective Mobile Device Policies to Satisfy Regulatory Expectations

Mar. 27, 2024

Checklist Covering CSRB Recommendations on Five Areas for Strengthening Cyber Defenses

Mar. 13, 2024

Fostering Collaboration and Communication Between Security and Compliance

Mar. 6, 2024

Scraping Battles: Global Privacy Regulators Urge Safeguards to Stop Data Scraping

Feb. 28, 2024

Data Retention and Destruction Lessons From FTC’s Blackbaud Case

Feb. 28, 2024

Cybersecurity Practices for PE Sponsors and Their Portfolio Companies: Incident Prevention and Response

Feb. 28, 2024

Legal and Ethical Issues in Use of Biometrics: FIDO, Identity-Proofing and Other Options

Feb. 21, 2024

Tracking Technologies: A 360‑Degree Governance Plan

Feb. 21, 2024

Scraping Battles: Meta Loses Legal Effort to Halt Harvesting of Personal Profiles

Feb. 21, 2024

Legal and Ethical Issues in Use of Biometrics: Modality Selection, Implementation and State Laws

Jan. 31, 2024

Compliance 5.0: A Culture-Centered Approach

Jan. 17, 2024

2024 SEC Examination Priorities: New Approaches to Old Areas of Concern

Jan. 10, 2024

Ten Cybersecurity Resolutions for 2024

Jan. 3, 2024

Amendment to NYDFS Cyber Regulation Brings New Mandates: First Compliance Steps

Dec. 13, 2023

Amendment to NYDFS Cyber Regulation Brings New Mandates: Governance Provisions

Dec. 13, 2023

A 2023 Cyber Regulation Look-Back and 2024 Risk-Management Strategies

Dec. 6, 2023

Dos and Don’ts for Employee Use of Generative AI

Nov. 29, 2023

How Cybersecurity Professionals Can Handle Three Common Misconceptions

Nov. 22, 2023

Task 6: Adapting the Privacy Program to New Laws

Nov. 15, 2023

Navigating NIST’s AI Risk Management Framework

Nov. 15, 2023

Navigating SEC Cybersecurity Enforcement in a Post-SolarWinds World

Nov. 8, 2023

Top Tips for Effective GC Succession Planning and Training

Nov. 8, 2023

Understanding the Growing Use of PETs

Nov. 1, 2023

Examining Security Mandates, Including California’s Draft Audit Regulations, in State Privacy Laws

Nov. 1, 2023

Checklist for Selecting Privacy Tech Solutions

Oct. 25, 2023

U.K. Equifax Fine Calls for Stricter Parent-Subsidiary Data-Sharing Processes

Oct. 18, 2023

IBM, eBay and Walgreens CPOs Outline 10 Steps for Building AI Governance

Oct. 11, 2023

Shaping AI Policy to Address Risks to U.S. Citizens and National Security

Oct. 11, 2023

Benchmarking the Impact of State Privacy Laws on Digital Advertising

Oct. 4, 2023

Will California’s New Law Aimed at Data Brokers Require a “Delete Me” Button on All Websites?

Sep. 27, 2023

CSRB Report on Lapsus$ Attacks: Moving Beyond MFA, Building Resilience and Mitigating Third-Party Threats

Sep. 20, 2023

CSRB Report on Lapsus$ Attacks: Key Takeaways and Law Enforcement Cooperation

Sep. 20, 2023

NYC AI Audit Law: A Best Practice Guide, From Choosing an Auditor to Avoiding Enforcement

Sep. 13, 2023

NYC AI Audit Law: What Five Companies Published – and How Others Avoid It

Sep. 13, 2023

Key Terms and Negotiation Issues in Data Processing Agreements

Sep. 6, 2023

Navigating the SEC’s Newly Adopted Cybersecurity Disclosure and Controls Regime

Sep. 6, 2023

E.U. Coordinated Enforcement Framework Focuses on DPOs

Aug. 16, 2023

Checklist for Framing and Assessing Third-Party Risk

Aug. 16, 2023

Why Companies Unintentionally Fail to Honor Opt-Outs

Aug. 9, 2023

Go Phish: Employee Training Key to Fighting Social Engineering Attacks

Aug. 9, 2023

Key Legal and Business Issues in AI-Related Contracts

Aug. 9, 2023

Selecting the Latest Privacy Tech Solutions: How to Kick the Tires and Decide

Aug. 2, 2023

Innovation and Accountability: Asking Better Questions in Implementing Generative AI

Aug. 2, 2023

Selecting the Latest Privacy Tech Solutions: Four Preparatory Steps

Jul. 26, 2023

NAVEX Shares Benchmarking Data in 2023 State of Risk and Compliance Report

Jul. 12, 2023

Stolen Credentials, Phishing and Vulnerability Exploits Are Key Attack Vectors, According to Verizon Data Breach Report

Jul. 12, 2023

Analyzing 2023’s New State Privacy Laws: Oregon and Delaware Join the Strictest Tier

Jun. 28, 2023

CPOs Weigh In on Navigating Myriad Privacy and Security Laws Amid Dizzying Technological Advancements

Jun. 14, 2023

Deciphering California and U.K. Children’s Codes and Compliance Obligations

May 31, 2023

How CPOs Communicate Privacy’s Value to the Board

May 24, 2023

2. First Independent Certification of Responsible AI Launches

May 17, 2023

Understanding Cyberattacks on Digital Asset Platforms

May 3, 2023

VMware CPO Discusses the Evolution of the Privacy Role

Apr. 19, 2023

NIST Advances Soft Law for AI While World Awaits Hard Laws

Apr. 12, 2023

First Independent Certification of Responsible AI Launches

Apr. 5, 2023

Verizon Report Details Evolution of Threats and Provides Cybersecurity Program Advice

Mar. 1, 2023

The Impact of New York City’s New Wage Transparency Law on Hiring

Mar. 1, 2023

Getting Used to Zero Trust? Meet Zero Copy

Feb. 22, 2023

Lessons From the Multinational Takedown of Hive Ransomware: Coordination and Defensive Priorities

Feb. 15, 2023

Advice From a CISO and Lawyer on Best Practices in Information and Data Governance

Feb. 15, 2023

Lessons From the Multinational Takedown of Hive Ransomware: A Broad Impact

Feb. 15, 2023

Impact of Emerging Technologies on Financial Crime Risk Management

Feb. 8, 2023

AI Governance Gets Real: Core Compliance Strategies

Feb. 1, 2023

AI Governance Gets Real: Tips From a Chat Platform on Building a Program

Jan. 11, 2023

Something’s Gotta Give: Navigating Auditor Inquiries in Investigations (Part Two of Two)

Jan. 11, 2023

Ten Cybersecurity Resolutions for Financial Services Firms in 2023

Jan. 4, 2023

Something’s Gotta Give: Navigating Auditor Inquiries in Investigations (Part One of Two)

Dec. 14, 2022

Taking Compliance Policies From Dense and Dry to Effective and Engaging

Dec. 7, 2022

Google Settlement Shows DOJ's Increased Focus on Data Preservation

Dec. 7, 2022

How Lawyers Can Leverage the Shifting Environment to Enhance Compliance Programs

Oct. 19, 2022

A New Era of Cyber Incident Reporting and Cybersecurity Regulation: How Companies Should Prepare and Engage

Oct. 12, 2022

A New Era of Cyber Incident Reporting and Cybersecurity Regulation: Key Provisions

Oct. 5, 2022

The Great Resignation: Cyber Risks in the Crypto Sector

Sep. 28, 2022

The Increasing Threat of Supply Chain Cyberattacks: How to Avoid Being a Statistic

Sep. 28, 2022

Using Software Bills of Materials to Bolster Security in Contracting

Sep. 14, 2022

Robinhood Resolution a First for Cryptocurrency Enforcement in NY

Sep. 07, 2022

Cyber Crisis Communications – “No Comment” Is Not an Option

Sep. 07, 2022

Four Steps to Secure Open-Source Software After CSRB’s Log4j Investigation

Aug. 17, 2022

SEC Cyber Rules: How to Prepare for the New 10-K Disclosure Mandates

Aug. 10, 2022

SEC Cyber Rules: How to Prepare for the New 8-K Incident Mandate

Jul. 27, 2022

Designing a Privacy Center to Build Trust and Facilitate Business Growth

Jul. 20, 2022

Corporate Compliance and Enforcement Hot Topics With IBM VP Una Dean

Jul. 13, 2022

Handling Evolving Post-Pandemic Employee Privacy Issues

Jul. 13, 2022

New AI Rules: Five Compliance Takeaways

Jun. 22, 2022

New AI Rules: States Require Notice and Records, Feds Urge Monitoring and Vetting

Jun. 15, 2022

Behavioral Science in Compliance Programs: Learning From the Data and Changing the Perspective

Jun. 15, 2022

New AI Rules: NYC First to Mandate Audit

Jun. 8, 2022

Behavioral Science in Compliance Programs: Concepts and Examples

Jun. 1, 2022

Roadmap for Building an Efficient Global Privacy Program: Maintenance

May 18, 2022

Roadmap for Building an Efficient Global Privacy Program: Buy-In, Scalability and Outside Resources

May 18, 2022

Navigating the Intersection of Blockchain and Data Privacy Laws

May 11, 2022

Roadmap for Building an Efficient Global Privacy Program: Scope and Prioritization

May 4, 2022

Cybersecurity and Privacy Teams Join to Create Data Governance Councils

May 4, 2022

Roadmap for Building an Efficient Global Privacy Program: Organizational Structure

Apr. 20, 2022

GCs Discuss Crisis Management, Investigations, Individual Accountability and ESG

Apr. 6, 2022

How to Measure Whether Your Company Is Ready to Catch Lots of Phish

Mar. 30, 2022

Drafting Data and Cybersecurity Provisions in Third-Party Vendor Agreements

Mar. 30, 2022

As Email Scams Surge, Training Lessons From 115 Million Phishing Messages

Mar. 30, 2022

The Parallels and Distinctions Between Investigations and Culture Reviews

Mar. 16, 2022

Securing Emerging Technologies Without Hampering Innovation: Government Initiatives and How Companies Can Adapt

Mar. 9, 2022

Securing Emerging Technologies Without Hampering Innovation: Private Sector Challenges

Mar. 9, 2022

Examining the Burdens and Benefits of a Remote Regulatory Environment

Mar. 2, 2022

Prioritizing Public-Private Partnerships in an Increasingly Complex Regulatory Environment

Feb. 23, 2022

Ad Industry’s Third-Party Data Use Grew Despite Impending Cookie Shutdown

Feb. 16, 2022

Evolving Career Path and Rising Compensation for CISOs

Feb. 9, 2022

Leveraging Partnerships to Operationalize Privacy Programs

Jan. 26, 2022

Personal Liability and Compliance Resourcing Are Top Concerns Among CCOs, Surveys Show

Jan. 26, 2022

Lessons From SolarWinds

Jan. 19, 2022

Privacy Resolutions for 2022

Jan. 12, 2022

Cybersecurity Resolutions for 2022

Jan. 12, 2022

Ten Tips to Prepare for and Navigate Ransomware Decisions

Jan. 5, 2022

Using Technology to Build in Data Governance for Improved Security and Privacy

Jan. 5, 2022

A Guide to Privacy Frameworks: Implementation and Maintenance

Dec. 15, 2021

A Guide to Privacy Frameworks: Finding the Best Fit

Dec. 15, 2021

Understanding Differential Privacy

Dec. 15, 2021

To Pay or Not to Pay? Empirical Studies Show Keys to Ransomware Decisions

Dec. 8, 2021

A Guide to Privacy Frameworks: Examining Options

Dec. 8, 2021

Privacy Tech Products Hold Promise but Sector Faces Hurdles

Dec. 8, 2021

Managing Compliance Scope Creep

Nov. 17, 2021

Data Localization: Cybersecurity Challenges Abound

Nov. 17, 2021

Practical Approaches to Conducting Transfer Impact Assessments Under the GDPR

Nov. 10, 2021

Data Localization: New Compliance Headaches and Costs Across the Globe

Nov. 10, 2021

How In-House Expertise Can Help Outside Counsel

Nov. 3, 2021

Data Localization: Laws Spread and Enforcement Rises

Oct. 27, 2021

IOSCO Issues Final Guidance on AI and Machine Learning

Oct. 20, 2021

U.K. Data Privacy Officers Discuss Challenges and Concerns

Oct. 13, 2021

New Pressures Shift Best Practices for Ransomware Crisis Communications

Oct. 6, 2021

Lessons From HPE’s Anti-Corruption Purchase Order Analytics on the Role for Humans in Data Interpretation

Sep. 22, 2021

Examining the Intersection of Voiceprints and Data Privacy Laws

Sep. 8, 2021

Imperva’s Global Data Privacy Officer Discusses Privacy by Design

Aug. 25, 2021

Privacy Resolutions for 2021

Jul. 14, 2021

Tips on Building Excitement for a New Code From Oerlikon Compliance Head

Jul. 7, 2021

Implementing NSA-CISA-FBI Advisory Mitigation Tactics for Vulnerabilities Exploited by Russia

Jul. 7, 2021

CISA and DHS Counsel Explain Cybersecurity Executive Order’s Key Provisions

Jul. 7, 2021

Wray Highlights Benefits of FBI Coordination With Public and Private Sectors

Jun. 23, 2021

How the NYDFS Drives Cybersecurity in the Financial Services Industry

Jun. 16, 2021

Leveraging Policies and Culture: A Recipe for Success

Jun. 9, 2021

Post-COVID Compliance Strategies: White Collar Investigations and Enforcement

Jun. 2, 2021

AI Compliance Playbook: Adapting the Three Lines Framework for AI Innovations

Jun. 2, 2021

Post-COVID Compliance Strategies: Dealing With Persistent Heightened Risks

May 26, 2021

CISA and DHS Counsel Explain Cybersecurity Executive Order’s Key Provisions

May 5, 2021

Doing More With Less: Tools for Managing Third-Party Risk With Scarce Resources

May 5, 2021

Balancing Legalese and Simplicity in Modern Privacy Policies

Apr. 28, 2021

First 100 Days As GC/CCO: Managing Daily Work, Performing Risk Assessments and Looking Ahead

Apr. 28, 2021

AI Compliance Playbook: Understanding Algorithm Audits

Apr. 28, 2021

Implementing NSA-CISA-FBI Advisory Mitigation Tactics for Vulnerabilities Exploited by Russia

Apr. 21, 2021

First 100 Days As GC/CCO: Developing Knowledge and Forging Key Relationships

Apr. 21, 2021

AI Compliance Playbook: Seven Questions to Ask Before Regulators or Reporters Do

Apr. 14, 2021

First 100 Days As GC/CCO: Preparing for the Role and Setting the Tone

Apr. 14, 2021

Advice From CISOs on How to Succeed in the Role

Apr. 14, 2021

AI Compliance Playbook: Traditional Risk Controls for Cutting-Edge Algorithms

Apr. 7, 2021

Former Twitter and eBay Counsel Talks Overblown Fears, Third-Party Data Management, and CDA Section 230

Mar. 31, 2021

How Do You Put a System of Controls in Place When Your Target Keeps Moving?

Mar. 3, 2021

Preserving the Privilege for In-House Counsel: Internal Investigations and Depositions

Feb. 24, 2021

Cargill Compliance Director Discusses Putting Training Data to Work

Feb. 17, 2021

Wray Highlights Benefits of FBI Coordination With Public and Private Sectors

Feb. 3, 2021

Expect Continuing Regulatory Focus on Cybersecurity and Data Protection in 2021

Jan. 20, 2021

eDiscovery in Multi-Jurisdictional Investigations: Preparing to Play Multi-Level Chess

Jan. 20, 2021

Privacy Resolutions for 2021

Jan. 13, 2021

Can the Cybersecurity Industry Improve Cooperation to Beat Threats?

Jan. 13, 2021

Cybersecurity Resolutions for 2021

Jan. 6, 2021

Privacy and Security Risks in International Arbitration: Managing Remote Proceedings

Jan. 6, 2021

Maintaining Privacy While Staying Competitive in an Evolving Regulatory Landscape

Jan. 6, 2021

Six Practical Tips for Building an Effective Privacy Risk Assessment Program

Dec. 16, 2020

Privacy and Security Risks in International Arbitration: Threats and the Information Security Protocol

Dec. 16, 2020

How Will the Biden Administration’s Approach to Cybersecurity Impact the Private Sector?

Dec. 16, 2020

AI for Compliance: Building a Model

Dec. 2, 2020

How CCOs Can Avoid Personal Liability for an Organization’s Compliance Failures

Nov. 11, 2020

AI for Compliance: Foundations

Oct. 21, 2020

How Lockheed Uses Big Data to Evaluate Risk at Small Worksites

Oct. 7, 2020

Tips and New Benchmarks for Creating Effective Tabletop Exercises

Sep. 16, 2020

Four Principles Underlying Microsoft’s Compliance Analytics Program

Sep. 16, 2020

Twelve Steps for Engaging the Board of Directors and Implementing a Long-Term Cybersecurity Plan

Sep. 9, 2020

IOSCO Offers Six Risk Mitigation Measures for AI and Machine Learning

Sep. 2, 2020

Business Continuity Plans, Budgets and More: Hot Compliance Topics for Investment Advisers

Aug. 5, 2020

How to Achieve Trustworthy AI Using the European Commission’s Final Assessment List

Jul. 29, 2020

Remote Forensic Data Collection Steps Into the Spotlight

Jul. 29, 2020

Evolution and Mitigation of Insider Cyber Threats During COVID-19

Jul. 22, 2020

Business Continuity Planning: Key Provisions and Third-Party Considerations

Jul. 22, 2020

Majority of In-House Counsel Satisfied With Compensation, but Gender Gap Remains

Jul. 15, 2020

Business Continuity Planning: How to Update a BCP With Lessons Learned From the Pandemic

Jul. 8, 2020

Getting Board Buy-In for Edge Cybersecurity Initiatives Post COVID‑19

Jun. 24, 2020

Perspectives From the Public and Private Sectors on Information Sharing During COVID-19

Jun. 3, 2020

Preserving Privilege in Audits and Internal Investigations

Jun. 3, 2020

How CISOs Can Use Digital Asset Metrics to Tell a Coherent Cyber Story to the Board

May 27, 2020

Insights on Building a Compliance Program at a New Company

May 13, 2020

NIST Privacy Framework: Privacy Controls for an Era of Digital Transformation

May 6, 2020

How Asset Managers and Others Can Mitigate Pandemic-Related Operational Risks and Maintain Business Continuity

May 6, 2020

NIST Privacy Framework: Insights on New Tool for Managing Privacy Risks

Apr. 29, 2020

The Pandemic Effect: How Compliance and Enforcement Are Evolving

Apr. 15, 2020

Report on CCO Liability Calls for More Regulatory Cooperation

Apr. 1, 2020

When Do Force Majeure Clauses Excuse Performance?

Apr. 1, 2020

Investigation Strategies During Social Distancing

Mar. 25, 2020

Companywide Work From Home: Six Cybersecurity Considerations

Mar. 18, 2020

Business Considerations for Responding to the Coronavirus Outbreak

Mar. 18, 2020

The Ongoing Complexity of Vendor Risk: Top 5 Considerations for C-Level Leaders

Mar. 11, 2020

NIST’s New IoT Standard: Inspiring a Wave of New Device Security Guidance

Mar. 4, 2020

NIST’s New IoT Standard: Boosting Security As States Launch Laws

Feb. 26, 2020

Tips From Ponemon/Experian Survey on Building an Incident Response Plan That Fosters Confidence

Feb. 26, 2020

Eleven Key Components of an Effective Privacy Program

Feb. 12, 2020

Compliance Records Are a Strategic Gold Mine

Feb. 5, 2020

Defining, Implementing and Documenting “Reasonable Security”

Jan. 29, 2020

30 Creative Ideas for Compliance Messaging

Jan. 15, 2020

How Compliance and HR Can Work Together

Jan. 8, 2020

How eBay and PayPal Use Key Performance Indicators to Evaluate and Improve Privacy Programs

Dec. 11, 2019

Not Just GDPR: Examining the Other European Privacy Laws 

Dec. 11, 2019

How to Handle E.U. Data Subject Access Requests

Dec. 4, 2019

U.K. and U.S. Sign First E-Evidence Pact Under the CLOUD Act: A Look at the Privacy Protections

Nov. 20, 2019

AI for Fund Managers and Beyond: How to Automate the Legal Department and Maintain Privacy

Nov. 13, 2019

AI for Fund Managers and Beyond: Government Guidance

Nov. 6, 2019

AI for Fund Managers and Beyond: How to Use It to Streamline Operations

Oct. 16, 2019

How Uber, eBay and Pitney Bowes Built Principles-Based Global Privacy Programs

Oct. 2, 2019

CCPA Close-Up: Review of Amendments and How to Prepare for Compliance

Oct. 2, 2019

Preserving Customer Goodwill After a Breach

Sep. 25, 2019

Hallmarks of High-Impact Compliance Programs and Compensation Trends for Those Who Implement Them

Aug. 14, 2019

Report Weighs In on Understanding and Mitigating Rising Data Breach Costs

Aug. 7, 2019

Lessons From SDNY Ruling on How to Preserve Privileged Communications With Attorney Consultants

Aug. 7, 2019

Report Shows Strategic Buy-In From Executive Leadership Is the Key Driver of Successful Risk Mitigation

Jul. 31, 2019

The Growing Role of the Chief Data Officer: Compliance and Third Parties

Jul. 24, 2019

The Growing Role of the Chief Data Officer: Reporting Structures and Budget

Jul. 17, 2019

Maine Enacts Sweeping Broadband Customer Privacy Law

Jul. 17, 2019

The Growing Role of the Chief Data Officer: Skill Sets, Priorities and Collaboration

Jun. 19, 2019

Tips From Lockheed and Groupon on Developing GC-CISO Partnerships to Improve Security and Incident Response

Jun. 12, 2019

CCPA Priorities: Tackling Data Subject Rights Requests and Vendors

Jun. 5, 2019

CCPA Priorities: Turning Legislation Prep Into a Program Shift

May 22, 2019

Social Engineering, Attacks on Cloud-Based Email on the Rise, Verizon Data Breach Report Finds

May 15, 2019

How the World’s Most Ethical Companies Are Aligning Corporate Culture and Strategy

May 15, 2019

What Does It Mean to Be Technologically Competent?

May 8, 2019

Making the Case for Increased Privacy Budgets Using Data and Diplomacy

May 1, 2019

Fresenius and Pearson Compliance Directors Discuss Corporate Community-Building

Apr. 24, 2019

Jeopardy, Coasters and the Behavioral Clock: Compliance Leaders at Fresenius and Pearson Discuss Effective Long- and Short-Term Initiatives

Apr. 17, 2019

GPEN Report Highlights Key Areas for Data Privacy Improvement

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness, According to Experian Survey

Mar. 20, 2019

A Quick-Start Guide to Creating a Compliance Champion Program

Mar. 6, 2019

Preparing for the CCPA: Best Practices and Understanding Enforcement

Feb. 27, 2019

Preserving Privilege in Communications Involving In-House Counsel

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 13, 2019

FINRA Report Addresses Common Cybersecurity Risks and Recommends Mitigation Measures

Jan. 16, 2019

How a New Ethics Rule and Error in Manafort Case Highlight the Importance of Lawyers’ Technology Competence

Jan. 16, 2019

GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part Two of Two)

Jan. 9, 2019

Ten Cyber and Privacy Resolutions for the New Year

Jan. 9, 2019

GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part One of Two)

Dec. 19, 2018

Ponemon Report Cites Third-Party Risk Management Shortfalls and Offers Best Practices

Dec. 19, 2018

Ten Steps for Effective Crisis Communications

Dec. 5, 2018

Answers to Four Critical Questions on Privilege in Internal Investigations

Nov. 14, 2018

How Privacy Professionals Can Benefit Cybersecurity Programs: Practical Tips From Gap and Privacy Panacea

Nov. 14, 2018

A Roadmap to Preparing for and Managing a Cyber Investigation

Nov. 7, 2018

How GoDaddy Built an Effective Privacy Program

Oct. 10, 2018

Fifteen Tips for an Effective Cybersecurity Board Presentation

Sep. 12, 2018

Information Sharing in the Private Sector: Lessons From the Financial Services Industry

Aug. 22, 2018

How to Maximize a Cybersecurity Budget in a Time of Change

Aug. 22, 2018

Protecting Against the Security Risks of Departing Employees

Aug. 15, 2018

How to Build a Cybersecurity Culture Using People, Processes and Technology

Aug. 8, 2018

Essential Cyber, Tech and Privacy M&A Due Diligence Considerations

Jul. 11, 2018

GDPR Essentials for the Financial Sector: Benchmarking and Assessing the Risks (Part One of Three)

Jul. 18, 2018

GDPR Essentials for the Financial Sector: Compliance Steps (Part Two of Three)

Jul. 25, 2018

Companies Face Increasing Cost of a Data Breach and an Inability to Detect Incidents Promptly, Surveys Show

Jul. 25, 2018

GDPR Essentials for the Financial Sector: Staying Compliant and Special Challenges (Part Three of Three)

Jul. 18, 2018

Overcoming Barriers to Cross-Border Data Flows, Contract Provisions and Other Digital Transformation Issues

Jun. 20, 2018

Managing Cyber Investigations: A CISO and In-House Counsel Discuss Best Practices for Real-Life Scenarios

Jun. 6, 2018

Analyzing New and Amended State Breach Notification Laws

Jun. 6, 2018

What Lawyers Need to Know About Security Technologies and Techniques (Part Two of Three)

May 30, 2018

Understanding the Intersection of Law and Artificial Intelligence

May 9, 2018

How Financial Services Firms Should Structure Their Cybersecurity Programs

May 2, 2018

Lessons on Litigation Privilege in Internal Investigations from the U.K.’s Bilta v. Royal Bank of Scotland Case

Apr. 18, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Vendors and M&A (Part Three of Three)

Apr. 11, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: Assessments and Incident Response (Part Two of Three)

Mar. 28, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: It Starts With Governance (Part One of Three)

Mar. 28, 2018

EY Global Data Analytics Survey Finds Lack of GDPR Preparedness and Need for Cross-Functional Collaboration

Mar. 14, 2018

How Will the GDPR Affect Due Diligence?

Feb. 28, 2018

Financial Firms Must Supervise Their IT Providers to Avoid CFTC Enforcement Action

Jan. 31, 2018

Five Strategies a Privacy Attorney Uses to Bridge the Gap With Tech Teams

Jan. 17, 2018

Ten Cybersecurity Resolutions for 2018

Jan. 17, 2018

NIST Program Manager Explains Pending Changes to Its Cybersecurity Framework

Apr. 5, 2017

Effective and Compliant Employee Monitoring (Part One of Two) 

Dec. 20, 2017

How to Make the Most of Limited Resources When Planning the Compliance Budget

Dec. 20, 2017

Benchmarking Employee Monitoring Policies for Practical Approaches

Dec. 6, 2017

Gathering and Analyzing Compliance Data

Nov. 8, 2017

IBM Cybersecurity Counsel Offers Techniques for Speaking the Same Language as the C-Suite When Managing Cyber Risk

Nov. 8, 2017

Managing Data Privacy Across Multiple Jurisdictions

Nov. 8, 2017

How to Mitigate the Risks of Open-Source Software (Part Two of Two)

Oct. 11, 2017

FTC Launches Stick With Security Series, Adding Detail and Guidance to Its Start With Security Guide (Part Two of Two)

Sep. 27, 2017

Deloitte Survey Shows Getting Skilled Cybersecurity Talent and Addressing Cyber Threats Among the Top Challenges for Financial Institutions

Sep. 27, 2017

Audit of Websites’ Security, Privacy and Consumer Practices Reveals Deficiencies Despite Overall Progress

Aug. 23, 2017

Tips From Google, Chase and P&G Privacy Officers on Developing Strong Privacy Leadership and When to Use Outside Counsel

Aug. 23, 2017

SEC Report Cites Cybersecurity Progress Along With Gaps in Training and Compliance

Aug. 9, 2017

What the Financial Sector Should Know to Recognize and Combat Cyber Threats (Part Two of Two)

Sep. 7, 2016

Understanding Data Privacy and Cybersecurity in China (Part One of Two)

Jul. 6, 2016

Understanding the Far-Reaching Impact of Chinese State Secrets Laws on Data Flow 

Aug. 3, 2016

Six State Secrets and Data Privacy Considerations in Chinese Internal Investigations 

Sep. 21, 2016

Managing Data Privacy Challenges While Conducting Due Diligence and Investigations in China (Part Two of Two)

Dec. 9, 2015

Proactive Steps to Protect Your Company in Anticipation of Future Data Security Litigation (Part Two of Two)

Jul. 29, 2015

Analyzing and Complying with Cyber Law from Different Vantage Points (Part Two of Two)

Jul. 26, 2017

How the CCO Can Use SEC Guidance to Tackle Cyber Threats 

Jul. 12, 2017

A Discussion With eHarmony’s GC About the Role of In-House Counsel in Cybersecurity

Jul. 12, 2017

How Small Businesses Can Maximize Cybersecurity Protections and Prioritize Their Spending

Jun. 28, 2017

Surveys Show Cyber Risk Remains High for Financial Services Despite Preventative Steps

Jun. 28, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part Two of Two)

Jun. 28, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part Two of Two)

Jun. 14, 2017

How Internal Audit Can Improve Cybersecurity 

Jun. 14, 2017

Cyber Crisis Communication Plans: What Works and What to Avoid (Part One of Two)

Jun. 14, 2017

Building an Enterprise-Wide Cyber Risk Management Program: Perspectives From the C-Suite (Part One of Two)

May 31, 2017

One Year Until GDPR Enforcement: Five Steps Companies Should Take Now

May 31, 2017

Using Big Data Legally and Ethically While Leveraging Its Value (Part Two of Two)

May 31, 2017

Advice on Incorporating Cybersecurity in eDiscovery

May 31, 2017

Defending Against the Rising Threat of Ransomware in the Wake of WannaCry

May 17, 2017

Advice From CPOs on Nurturing Privacy Programs on Any Budget

May 17, 2017

Using Big Data Legally and Ethically While Leveraging Its Value (Part One of Two)

May 3, 2017

Infrastructure Cybersecurity Challenges: A View Through the Oil and Gas Pipeline Lens

May 3, 2017

Compliance Implications of Brexit 

Apr. 19, 2017

Effective and Compliant Employee Monitoring (Part Two of Two)

Apr. 19, 2017

How to Ensure Cyber Risks Do Not Derail an IPO

Mar. 22, 2017

Forensic Firms: Effective Vetting and Collaboration (Part Three of Three)

Mar. 8, 2017

Preparing For Ransomware Attacks As Part of the Board’s Fiduciary Duty

Mar. 8, 2017

Forensic Firms: Key Contract Considerations and Terms (Part Two of Three)

Feb. 22, 2017

Forensic Firms: Understanding and Leveraging Their Expertise From the Start (Part One of Three)

Feb. 22, 2017

Strategies for In-House Counsel Responsible for Privacy and Data Security 

Feb. 8, 2017

Getting to Know the DPO and How to Adapt Corporate Structure to Comply With GDPR Requirements for the Role (Part Two of Two)

Feb. 8, 2017

Protecting Attorney-Client Privilege and Attorney Work Product While Cooperating With the Government: Establishing Privilege and Work Product in an Investigation (Part One of Three)

Jan. 25, 2017

Getting to Know the DPO and Adapting Corporate Structure to Comply With the GDPR (Part One of Two)

Jan. 25, 2017

Triaging Security Projects in the Current Legal Landscape

Jan. 11, 2017

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part Two of Two)

Jan. 11, 2017

Tech Meets Legal Spotlight: Advice on Working With Information Security

Jan. 11, 2017

Ten Cybersecurity Priorities for 2017

Dec. 14, 2016

Advice From Compliance Officers on Getting the C-Suite to Show You the Money for Your Data Privacy Program

Dec. 14, 2016

How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part One of Two)

Dec. 14, 2016

Presidential Commission Recommends Ways For Public and Private Sectors to Improve Cybersecurity 

Nov. 30, 2016

Using a Risk Assessment as a Critical Component of a Robust Cybersecurity Program (Part Two of Two)

Nov. 16, 2016

WilmerHale Attorneys Explain the Evolving Cybersecurity Environment of the Energy Sector

Nov. 16, 2016

Increasing Role of Counsel Among Operational Shifts Highlighted by Cyber Risk Management Survey

Nov. 2, 2016

FBI Veteran Discusses Using Law Enforcement’s Cyber Resources to Improve Security and Obtain Board Buy-In

Nov. 2, 2016

Guide to Getting Your Security Program Certified Under ISO 27001

Oct. 5, 2016

Examining Newly Released Privacy and Security Guidance for the Fast-Driving Development of Autonomous Cars

Oct. 19, 2016

Demystifying the FTC’s Reasonableness Requirement in the Context of the NIST Cybersecurity Framework (Part One of Two)

Oct. 19, 2016

Privacy Leaders Share Key Considerations for Incorporating a Privacy Policy in the Corporate Culture 

Oct. 19, 2016

Taking Action to Refocus on Security: Conversation With a CIO 

Oct. 5, 2016

ISAO Organization Releases a Roadmap to Cyber Threat Information Sharing 

Sep. 21, 2016

Seven Overlooked Business Costs of a Cyber Breach and Strategies for Avoiding Them

Sep. 21, 2016

What Private Companies Can Learn From the OPM Data Breaches

Sep. 7, 2016

Using Information Sharing to Combat Cyber Crime While Protecting Privacy 

Sep. 7, 2016

Navigating Online Identity Management’s Risks and Regulations

Aug. 24, 2016

How GE’s Global CPO Approaches Shifting Regulations With Dynamic Implications 

Aug. 24, 2016

Fulfilling the Ethical Duty of Technology Competence for Attorneys

Aug. 3, 2016

How Cyber Stakeholders Can Speak the Same Language (Part Two of Two)

Jul. 20, 2016

How the Financial Services Industry Can Manage Cyber Risk

Jul. 20, 2016

Challenges Facing Chief Privacy Officers

Jul. 20, 2016

How Cyber Stakeholders Can Speak the Same Language (Part One of Two)

Jul. 6, 2016

Law Enforcement on Cybersecurity Matters: Corporate Friend or Foe? (Part Two of Two)

Jun. 22, 2016

Law Enforcement on Cybersecurity Matters: Corporate Friend or Foe? (Part One of Two)

Jun. 22, 2016

How to Avoid Common Mistakes and Manage the First 48 Hours Post-Breach

Jun. 8, 2016

Minimizing Class Action Risk in Breach Response

Jun. 8, 2016

Foreign Business Chambers Sign Open Letter Against Chinese Cybersecurity Regulatory Changes

Jun. 8, 2016

Eight Attributes In-House Counsel Look For in Outside Cybersecurity Counsel

May 25, 2016

Do You Know Where Your Employees Are? Tackling the Privacy and Security Challenges of Remote Working Arrangements

May 25, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: Does Your Plan Work? (Part Three of Three)

May 11, 2016

Google, CVS and the FBI Share Advice on Interacting With Law Enforcement After a Breach

May 11, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: Seven Key Components (Part Two of Three)

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Apr. 27, 2016

Regulators Speak Candidly About Cybersecurity Trends, Priorities and Coordination

Apr. 13, 2016

A Look Inside the Cybersecurity and Privacy Law Department of a Top Defense Company

Apr. 13, 2016

Study Analyzes How Companies Can Overcome Cybersecurity Challenges and Create Business Value

Mar. 30, 2016

How Law Firms Should Strengthen Cybersecurity to Protect Themselves and Their Clients

Mar. 30, 2016

Twenty Ways a Company Can Use Behavioral Psychology to Improve Compliance

Mar. 30, 2016

Steps for Companies to Take This Week, This Month and This Year to Meet the Challenges of International Cyberspace Governance

Mar. 16, 2016

CSIS’ James Lewis Discusses Balancing Law Enforcement and Privacy

Mar. 2, 2016

Implementing a Privacy by Design Program to Protect Corporate and Consumer Information

Mar. 2, 2016

How the American Energy Industry Approaches Security and Emphasizes Information Sharing

Feb. 17, 2016

Cybersecurity Preparedness Is Now a Business Requirement

Jan. 20, 2016

How In-House Counsel, Management and the Board Can Collaborate to Manage Cyber Risks and Liability (Part One of Two)

Jan. 20, 2016

Defining, Documenting and Measuring Compliance Program Effectiveness

Jan. 6, 2016

Opportunities and Challenges of the Long-Awaited Cybersecurity Act of 2015

Jan. 6, 2016

How the Financial Services Sector Can Meet the Cybersecurity Challenge: A Plan for Building a Cyber-Compliance Program (Part Two of Two)

Dec. 9, 2015

Building a Strong Cyber Insurance Policy to Weather the Potential Storm (Part Two of Two)

Dec. 9, 2015

The Multifaceted Role of In-House Counsel in Cybersecurity 

Dec. 9, 2015

Avoiding Privacy Pitfalls While Using Social Media for Internal Investigations

Nov. 25, 2015

Proactive Steps to Protect Your Company in Anticipation of Future Data Security Litigation (Part One of Two)

Nov. 25, 2015

Building a Strong Cyber Insurance Policy to Weather the Potential Storm (Part One of Two)

Nov. 11, 2015

Target Privilege Decision Delivers Guidance for Post-Data Breach Internal Investigations

Nov. 11, 2015

What Companies Can Learn from Cybersecurity Resources in Pittsburgh

Oct. 28, 2015

Mastercard and U.S. Bancorp Execs Share Tips for Awareness and Prevention of Mushrooming Cyber Risk (Part Two of Two)

Oct. 14, 2015

Eight Ways Compliance Officers Can Build Relationships With the “Middle”

Oct. 14, 2015

Energy Industry Demonstrates Public-Private Cybersecurity Coordination

Sep. 30, 2015

Protecting the Crown Jewels Using People, Processes and Technology 

Sep. 30, 2015

Protecting and Enforcing Trade Secrets in a Digital World

Sep. 16, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part Two of Two)  

Sep. 16, 2015

How the Legal Industry Is Sharing Information to Combat Cyber Threats

Aug. 26, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part One of Two)

Aug. 12, 2015

How the Hospitality Industry Confronts Cybersecurity Threats that Never Take Vacations

Jul. 29, 2015

How to Prevent and Manage Ransomware Attacks (Part Two of Two)

Jul. 1, 2015

SEC Commissioner Says Public-Private Partnership Is Key to Effective Cybersecurity

Jul. 1, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part Two of Two)

Jun. 17, 2015

In a Candid Conversation, FBI Director James Comey Discusses Cooperation among Domestic and International Cybersecurity Law Enforcement Communities (Part Two of Two)

Jun. 17, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part One of Two)

Jun. 3, 2015

Private and Public Sector Perspectives on Producing Data to the Government

Jun. 3, 2015

In a Candid Conversation, FBI Director James Comey Talks About the “Evil Layer Cake” of Cybersecurity Threats (Part One of Two)

May 20, 2015

DOJ Encourages Cyber Incident Reporting and Advance Planning with Best Practices Guidance

May 20, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part Two of Two)

May 20, 2015

Weil Gotshal Attorneys Advise on Key Ways to Anticipate and Counter Cyber Threats

May 6, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part One of Two)

Apr. 22, 2015

Shifting to Holistic Information Governance and Managing Information as an Asset

Apr. 8, 2015

How Can a Company Mitigate Cyber Risk with Cross-Departmental Decisionmaking?

Apr. 8, 2015

Ten Actions for Effective Data Risk Management

Most-Read Articles

  • Apr. 16, 2025
    Sale of 23andMe’s Genetic Data: Implications of the Motions for a Privacy Ombudsman and State Laws
    • Data Privacy Litigation
  • Apr. 16, 2025
    Checklist for AI Procurement
    • Artificial Intelligence
  • May 7, 2025
    DOJ Guidance on Bulk Sensitive Data Rules: Enforcement Grace Period and Prohibited Transactions
    • DOJ Enforcement
  • Feb. 12, 2025
    AI Governance: Striking the Balance Between Innovation, Ethics and Accountability
    • Artificial Intelligence
  • Apr. 30, 2025
    Connecticut AG’s Report Reveals Privacy Enforcers Reaching Deeper Into Their State Laws
    • State Laws

Women to Watch: Contributions, Achievements and Observations of Outstanding Female Professionals

To mark International Women’s Day, women editors and reporters at ION Analytics interviewed outstanding women in the industries and jurisdictions we cover. In this part, Law Report Group editors Jill Abitbol, Robin L. Barton and Megan Zwiebel profile notable women in data privacy, cybersecurity, private funds and anti-corruption law, including Anne-Gabrielle Haie, Jessica Lee, Micaela McMurrough, Laura Perkins, Amanda Raad, Madelyn Calabrese, Ranah Esmaili and Genna Garver. Enjoy reading their inspiring remarks here.


Celebrating Data Privacy Day 2025

Read the full brief here.


Cybersecurity Awareness Month

Read the full brief here.


Spotlight on Trailblazing Women

To mark International Women’s Day 2024, women editors and reporters of ION Analytics interviewed outstanding women in the industries and jurisdictions we cover. In this part, Jill Abitbol, Managing Editor of the Cybersecurity Law Report and Anti-Corruption Report, features notable women in data privacy, cybersecurity, white collar defense, compliance and anti-corruption law, including Christina Montgomery, Leslie Shanklin, Palmina Fava, Alexandra Ross and Lucinda Low. Enjoy reading their inspiring remarks here.


We Celebrate Data Privacy Day 2024

Read the full brief here.


Spotlight on Trailblazing Women

In honor of International Women’s Day, some of ION Analytics' editorial teams led by women interviewed notable women in the markets and industries we cover. In this part, the Cybersecurity Law Report highlighted notable women in compliance and hedge fund, data privacy and cybersecurity, and anti-corruption law, including Amii Barnard-Bahn, Abigail Bell, Genna Garver, Jane Horvath, Barbara Li, Amy Mushahwar, Mara Senn and Carol Widger. The interviews are here.

 


 

 


Webinar on Compliant International Data Transfers

Listen here to our discussion with our colleagues at Ethos Privacy, which took place on March 1, 2022, on how to approach international data transfer challenges. 


Webinar on Getting a Handle on Vendor Contracts

A recording of the March 10 webinar can be accessed here. 


Cybersecurity Resolutions for 2021

In this quick take video, we talk about some of our cybersecurity resolutions for 2021.


Facial Recognition Concerns

In this short video, we discuss the privacy and bias concerns with facial recognition technology.


Planning for the Return to Work 

We discuss a few return-to-work privacy issues in this short video.


ACR and CSLR Spring Update 2020

The Senior Editors of the Anti-Corruption Report and the Cybersecurity Law Report recently teamed up to present an update on the trends and hot topics in the anti-corruption, cybersecurity and data privacy spaces since the beginning of the year and what the publications will be focusing on in the coming months. A complimentary download of the webinar is available here.


Upcoming Webinar: Companywide Work From Home - Cybersecurity and Privacy Best Practices

Please join us on Monday, March 23, 2020, from 12:00 p.m.- 12:30 p.m. EDT for a complimentary webinar discussing the cybersecurity and privacy challenges the shift to remote working has created and how to overcome them. Registration information for the webinar is here. 


Upcoming Webinar to Explore Best Practices for Alternative Data Use

Please join us on Wednesday, January 15, 2020, at 11:00 a.m. EST for a complimentary webinar hosted by our sister publication, the Hedge Fund Law Report, discussing issues relating to the use of alternative data by private fund managers. To register for the webinar, click here.


Upcoming HFLR/CSLR Webinar to Explore Strategies and Tactics for Conducting an Effective Tabletop Exercise

Please join the Hedge Fund Law Report and the Cybersecurity Law Report on Tuesday, July 30, 2019, at 1:00 p.m. ET for a complimentary webinar discussing the strategies and tactics companies can employ to conduct an effective tabletop exercise. GCs and CCOs are encouraged to invite their CISOs and CTOs to join as well. The webinar will be moderated by Shaw Horton, Associate Editor of the Hedge Fund Law Report, and will feature Luke Dembosky, partner at Debevoise, John “Four” Flynn, chief information security officer at Uber, and Jill Abitbol, Senior Editor of the Cybersecurity Law Report. Registration for the webinar is available here.


Anti-Corruption Webinar: How HPE Is Using Its New T&E Tool to Generate Compliance Metrics

Measuring the effectiveness of a compliance program can be tricky, but some companies are finding ways to use their existing internal controls to generate useful data. Join our sister publication the Anti-Corruption Report (ACR) for a complimentary webinar that explores Hewlett Packard Enterprises’ new travel-and-entertainment-approval tool. On Wednesday, March 27, 2019, from 1:00 p.m. to 2:00 p.m. EDT, the ACR’s Megan Zwiebel will interview Becky Rohr, vice-president of anti-corruption and global trade at Hewlett Packard Enterprises, about how they are using their T&E tool to measure and improve compliance. Registration information is here.

  • Privacy Policy
  • Terms of Use
  • About Us

© 2025 Mergermarket Limited. All rights reserved.

Sign inFree trialForgot password ×

Sorry, we do not recognise the username and password combination you have entered.

Please ensure you have typed your email address correctly and remember that passwords are case sensitive.

You are logged into a maximum of three different browsers/devices.

Please log in with one previously used and go to My Account to manage the browsers/devices you are using.

Forgotten password? Request Details


Not a user? Get a free trial

Thank you.

A reset link has been sent to the email address provided.

Please be aware that the time taken for mail to be delivered is dependent upon your Internet Service Provider. It should normally arrive within 5-15 minutes.

Request Details

Sorry, this email address is not recognised on our system


Thank you, we'll contact you about your trial