In-House Essentials
- Tech Meets Legal
- Cyber Leadership
- Employment
- Operations
Oct. 2, 2024
How to Manage AI Procurement: Five Steps
Sep. 25, 2024
Practical Strategies for Effective Consent Management
Sep. 18, 2024
How to Manage AI Procurement: Leadership and Preparation
Jul. 31, 2024
How Hedge Funds Are Approaching AI Use
Jul. 3, 2024
6) Governing AI
Jul. 3, 2024
3) Conducting Technical Privacy Reviews
Jun. 26, 2024
A Mock Cyber Incident Tabletop: Day Two and Beyond
May 22, 2024
SEC Enforcement Actions Target “AI Washing”
May 15, 2024
Applying AI in Information Security
Apr. 17, 2024
AI Governance Strategies for Privacy Pros
Apr. 3, 2024
Examining Utah’s Pioneering State AI Law
Mar. 27, 2024
SEC’s 2024 Regulatory Focus
Mar. 20, 2024
AI Drives Rise in Private Funds’ Use of Alternative Data
Mar. 20, 2024
Court Hands FTC Grounds to Curb Data Broker Sales
Feb. 21, 2024
Tracking Technologies: A 360‑Degree Governance Plan
Jan. 24, 2024
Emerging Cyber Threats and Defenses
Jan. 10, 2024
Ten Cybersecurity Resolutions for 2024
Dec. 20, 2023
Dos and Don’ts for Employee Use of Generative AI
Dec. 20, 2023
Key Legal and Business Issues in AI-Related Contracts
Dec. 20, 2023
NYC AI Audit Law Series
Dec. 6, 2023
Dos and Don’ts for Employee Use of Generative AI
Nov. 22, 2023
Task 3: Selecting New Technologies
Nov. 15, 2023
Navigating NIST’s AI Risk Management Framework
Nov. 8, 2023
Understanding the Growing Use of PETs
Nov. 1, 2023
Checklist for Selecting Privacy Tech Solutions
Sep. 27, 2023
The Good, Bad and Ugly of Summer’s Cyber Incidents
Aug. 16, 2023
Why Companies Unintentionally Fail to Honor Opt-Outs
Mar. 1, 2023
Getting Used to Zero Trust? Meet Zero Copy
Feb. 8, 2023
AI Governance Gets Real: Core Compliance Strategies
Feb. 1, 2023
Key Privacy Issues for 2023
Oct. 26, 2022
Takeaways From the New Push for a Federal AI Law
Aug. 24, 2022
New AI Rules
Aug. 10, 2022
Protecting Against Crypto Theft
Jul. 13, 2022
New AI Rules: Five Compliance Takeaways
Jun. 29, 2022
Navigating the Intersection of Digital Assets and AML
Jun. 15, 2022
New AI Rules: NYC First to Mandate Audit
May 11, 2022
The Evolving Crypto Regulatory Climate
Mar. 2, 2022
Blockchain Recordkeeping Stirs Privacy Concerns
Jan. 19, 2022
Privacy Resolutions for 2022
Jan. 5, 2022
Compliance Checklist for AI and Machine Learning
Dec. 15, 2021
Understanding Differential Privacy
Oct. 27, 2021
IOSCO Issues Final Guidance on AI and Machine Learning
Sep. 15, 2021
Essential Technology Contract Elements
Jun. 30, 2021
Using RegTech to Enhance Compliance
Apr. 28, 2021
AI Compliance Playbook: Understanding Algorithm Audits
Dec. 16, 2020
AI for Compliance: Building a Model
Nov. 11, 2020
AI for Compliance: Foundations
Jun. 17, 2020
The Current State and Future of AI Regulation
Mar. 11, 2020
The Keys to Encryption: Legal and Regulatory Framework
Dec. 11, 2019
How to Handle E.U. Data Subject Access Requests
Nov. 13, 2019
AI for Fund Managers and Beyond: Government Guidance
Sep. 4, 2019
Mitigating the Risks of Open-Source Software
Jul. 31, 2019
Takeaways From the U.K. ICO’s FaceApp Warning
Jul. 10, 2019
Can GDPR Hinder AI Made in Europe?
May 15, 2019
What Does It Mean to Be Technologically Competent?
Mar. 13, 2019
Mitigating the Risks of Open-Source Software
Oct. 17, 2018
Regulating AI: U.S., E.U. and Industry Laws and Guidance
Oct. 17, 2018
Risks and Rewards of Bluetooth Technology
Feb. 14, 2018
Using Technology to Comply With the GDPR
Oct. 25, 2017
How to Outsource Vulnerability Assessments to Hackers
Sep. 13, 2017
Negotiating an Effective Cloud Service Agreement
May 31, 2017
Advice on Incorporating Cybersecurity in eDiscovery
May 17, 2017
Tracking Data and Maximizing Its Potential
May 11, 2016
Privacy Concerns in a Cashless Society
Jun. 17, 2015
The Advantages of Sending Data Up to the Cloud
Apr. 8, 2015
Ten Actions for Effective Data Risk Management
Oct. 2, 2024
How to Manage AI Procurement: Five Steps
Sep. 25, 2024
Practical Strategies for Effective Consent Management
Sep. 18, 2024
How to Manage AI Procurement: Leadership and Preparation
Sep. 4, 2024
Making the Business Case for Privacy
Aug. 7, 2024
How Privacy Efforts Can Boost Revenue
Jul. 31, 2024
Challenges, Risks and Future of the CISO Role
Jul. 3, 2024
2) Choosing Privacy Tech Solutions
Jun. 26, 2024
A Mock Cyber Incident Tabletop: Day Two and Beyond
May 15, 2024
New E.U. Directive Expands Scope of Due Diligence
May 1, 2024
Navigating Ransomware’s Challenges
Apr. 17, 2024
AI Governance Strategies for Privacy Pros
Feb. 14, 2024
Mitigating CISO Personal Liability Post-SolarWinds
Jan. 31, 2024
Compliance 5.0: A Culture-Centered Approach
Jan. 24, 2024
Emerging Cyber Threats and Defenses
Jan. 10, 2024
Ten Cybersecurity Resolutions for 2024
Dec. 6, 2023
Dos and Don’ts for Employee Use of Generative AI
Nov. 22, 2023
Task 1: Board Presentations
Nov. 8, 2023
Understanding the Growing Use of PETs
Nov. 1, 2023
Checklist for Selecting Privacy Tech Solutions
Sep. 27, 2023
The Good, Bad and Ugly of Summer’s Cyber Incidents
Jul. 5, 2023
A Roadmap to the Final Regulations Under the CPRA
May 31, 2023
Colorado Controllers: The Final (Rules’) Frontier
May 31, 2023
How CPOs Communicate Privacy’s Value to the Board
Apr. 26, 2023
Ransomware Incident Response Checklist
Mar. 15, 2023
A Roadmap to the Final Regulations Under the CPRA
Mar. 1, 2023
Getting Used to Zero Trust? Meet Zero Copy
Feb. 1, 2023
Key Privacy Issues for 2023
Nov. 30, 2022
Understanding and Implementing Privacy Audits
Nov. 9, 2022
Lessons From the Conviction of Uber’s Former CISO
Oct. 19, 2022
GM CCO Talks Data, Culture, ESG and Scope Creep
Jun. 1, 2022
FINRA Clarifies Stance on CCO Supervisory Liability
May 4, 2022
Effective Use of Privacy Impact Assessments
Feb. 16, 2022
Evolving Career Path and Rising Compensation for CISOs
Jan. 19, 2022
Privacy Resolutions for 2022
Jan. 12, 2022
Cybersecurity Resolutions for 2022
Dec. 15, 2021
A Guide to Privacy Frameworks: Finding the Best Fit
Dec. 8, 2021
Managing Compliance Scope Creep
Dec. 8, 2021
A Guide to Privacy Frameworks: Examining Options
Nov. 10, 2021
How In-House Expertise Can Help Outside Counsel
Oct. 27, 2021
IOSCO Issues Final Guidance on AI and Machine Learning
Sep. 22, 2021
Jacki Cheslow on IEEE’s Remote Program Assessment
Jul. 28, 2021
Incident Response in the Financial Services Industry
Jun. 16, 2021
Leveraging Policies and Culture: A Recipe for Success
Apr. 14, 2021
Advice From CISOs on How to Succeed in the Role
Jan. 13, 2021
Cybersecurity Resolutions for 2021
Dec. 16, 2020
AI for Compliance: Building a Model
Nov. 11, 2020
AI for Compliance: Foundations
Jun. 10, 2020
How Compliance Departments Are Responding to COVID‑19
Feb. 26, 2020
Eleven Key Components of an Effective Privacy Program
Feb. 12, 2020
Compliance Records Are a Strategic Gold Mine
Jan. 29, 2020
30 Creative Ideas for Compliance Messaging
Dec. 11, 2019
How to Handle E.U. Data Subject Access Requests
Sep. 11, 2019
Using “Red-Teaming” to Test and Improve Cyber Defenses
Jul. 17, 2019
How to Establish an Efficient Incident Response Plan
Jul. 17, 2019
Maine Enacts Sweeping Broadband Customer Privacy Law
May 29, 2019
Keeping CISOs and the C-Suite Off the Witness Stand
Apr. 3, 2019
FCA Evaluates Firms’ Cyber Resilience
Feb. 20, 2019
Fixing the Chinks in Companies’ Cyber Armor: Executives
Dec. 19, 2018
Interim Response Lessons From the Marriott Breach
Nov. 7, 2018
How GoDaddy Built an Effective Privacy Program
Jan. 31, 2018
How to Make the Most of Limited Compliance Resources
Nov. 8, 2017
Managing Data Privacy Across Multiple Jurisdictions
Jul. 26, 2017
How the CCO Can Use SEC Guidance to Tackle Cyber Threats
Jul. 20, 2016
Challenges Facing Chief Privacy Officers
Sep. 4, 2024
Making the Business Case for Privacy
Aug. 21, 2024
Navigating U.S. Privacy Laws in Internal Investigations
Jun. 26, 2024
A Mock Cyber Incident Tabletop: Day Two and Beyond
May 1, 2024
Navigating Ransomware’s Challenges
Mar. 20, 2024
AI Drives Rise in Private Funds’ Use of Alternative Data
Jan. 24, 2024
Emerging Cyber Threats and Defenses
Jan. 10, 2024
Ten Cybersecurity Resolutions for 2024
Nov. 22, 2023
Task 4: Data Requests
Nov. 1, 2023
Compliance Challenges in Records Management
Sep. 27, 2023
The Good, Bad and Ugly of Summer’s Cyber Incidents
Aug. 30, 2023
Ransomware Incident Response Checklist
Aug. 30, 2023
Checklist for Addressing Employee Data Rights Requests
Aug. 23, 2023
3. Location Data Series
Jul. 26, 2023
Checklist for Addressing Employee Data Rights Requests
Jul. 12, 2023
SEC Remains Focused on Off-Channel Communications
Jul. 5, 2023
Employee Data Under the CPRA Series
Jun. 14, 2023
Messaging Apps Come Under Increasing Regulatory Scrutiny
Apr. 26, 2023
Ransomware Incident Response Checklist
Nov. 30, 2022
Navigating Evolving Social Media Risks
Nov. 23, 2022
6) Ransomware Evolution
Nov. 16, 2022
Compliance Checklist for Consumer and Employee DSARs
Oct. 19, 2022
GM CCO Talks Data, Culture, ESG and Scope Creep
Sep. 14, 2022
Shaping the BIPA Landscape: Avoiding Liability
Aug. 24, 2022
Employee Data Under the CPRA
Aug. 10, 2022
Protecting Against Crypto Theft
Jul. 13, 2022
Handling Evolving Post-Pandemic Employee Privacy Issues
Jun. 29, 2022
Navigating the Intersection of Digital Assets and AML
May 25, 2022
Ransomware and Sanctions in the Time of War
Feb. 16, 2022
Evolving Career Path and Rising Compensation for CISOs
Jan. 26, 2022
Lessons From SolarWinds
Jan. 12, 2022
Cybersecurity Resolutions for 2022
Feb. 17, 2021
A Fake Zoom Invite Hack: Eight More Lessons
Feb. 10, 2021
A Fake Zoom Invite Hack: What Happened and Three Lessons
Jan. 13, 2021
Cybersecurity Resolutions for 2021
Jan. 13, 2021
Checklist for IoT Security Audits
Nov. 25, 2020
Managing Ransomware’s Mutation Into a Public Data Breach
Nov. 4, 2020
A Guided Tour of Enterprise IoT Device Hazards
Sep. 23, 2020
Identifying and Preventing Ransomware Attacks
Sep. 9, 2020
Action Steps to Respond to Ransomware Attacks
Jul. 8, 2020
Privacy Compliant Return-to-Work Checklist
Jun. 10, 2020
How Compliance Departments Are Responding to COVID‑19
Apr. 8, 2020
Wide-Ranging Lessons From Notable Breaches in Q1
Apr. 1, 2020
Investigation Strategies During Social Distancing
Feb. 19, 2020
Preparing for and Responding to Ransomware Attacks
Jan. 29, 2020
30 Creative Ideas for Compliance Messaging
Jan. 15, 2020
How Compliance and HR Can Work Together
Oct. 23, 2019
CFTC Issues $1.5-Million Fine After Phishing Attack
Jul. 31, 2019
Takeaways From the U.K. ICO’s FaceApp Warning
Feb. 20, 2019
Fixing the Chinks in Companies’ Cyber Armor: Executives
Jan. 16, 2019
Key Cyber Threats and Targets for 2019
Oct. 17, 2018
Risks and Rewards of Bluetooth Technology
Jan. 11, 2017
Ten Cybersecurity Priorities for 2017
Jan. 11, 2017
FTC Priorities for 2017 and Beyond
Sep. 21, 2016
Staying Cybersecure Without Mobile Device Management
Aug. 24, 2016
Cybersecurity Due Diligence in M&A Is No Longer Optional
Jul. 20, 2016
Using Data Analytics to Combat Internal Cyber Threats
Oct. 2, 2024
How to Manage AI Procurement: Five Steps
Sep. 18, 2024
How to Manage AI Procurement: Leadership and Preparation
Sep. 4, 2024
Making the Business Case for Privacy
Aug. 21, 2024
Navigating U.S. Privacy Laws in Internal Investigations
Aug. 7, 2024
How Privacy Efforts Can Boost Revenue
Jul. 31, 2024
How Hedge Funds Are Approaching AI Use
Apr. 17, 2024
AI Governance Strategies for Privacy Pros
Feb. 21, 2024
Tracking Technologies: A 360‑Degree Governance Plan
Jan. 31, 2024
Compliance 5.0: A Culture-Centered Approach
Jan. 10, 2024
Ten Cybersecurity Resolutions for 2024
Dec. 6, 2023
Dos and Don’ts for Employee Use of Generative AI
Nov. 22, 2023
Task 6: Adapting the Privacy Program to New Laws
Nov. 15, 2023
Navigating NIST’s AI Risk Management Framework
Nov. 8, 2023
Understanding the Growing Use of PETs
Nov. 1, 2023
Checklist for Selecting Privacy Tech Solutions
Aug. 16, 2023
Checklist for Framing and Assessing Third-Party Risk
Aug. 16, 2023
Why Companies Unintentionally Fail to Honor Opt-Outs
May 31, 2023
How CPOs Communicate Privacy’s Value to the Board
Mar. 1, 2023
Getting Used to Zero Trust? Meet Zero Copy
Feb. 8, 2023
AI Governance Gets Real: Core Compliance Strategies
Jul. 13, 2022
New AI Rules: Five Compliance Takeaways
Jul. 13, 2022
Handling Evolving Post-Pandemic Employee Privacy Issues
Jun. 15, 2022
New AI Rules: NYC First to Mandate Audit
Feb. 16, 2022
Evolving Career Path and Rising Compensation for CISOs
Jan. 26, 2022
Lessons From SolarWinds
Jan. 19, 2022
Privacy Resolutions for 2022
Jan. 12, 2022
Cybersecurity Resolutions for 2022
Dec. 15, 2021
A Guide to Privacy Frameworks: Finding the Best Fit
Dec. 15, 2021
Understanding Differential Privacy
Dec. 8, 2021
A Guide to Privacy Frameworks: Examining Options
Dec. 8, 2021
Managing Compliance Scope Creep
Nov. 17, 2021
Data Localization: Cybersecurity Challenges Abound
Nov. 10, 2021
How In-House Expertise Can Help Outside Counsel
Nov. 3, 2021
Data Localization: Laws Spread and Enforcement Rises
Oct. 27, 2021
IOSCO Issues Final Guidance on AI and Machine Learning
Aug. 25, 2021
Privacy Resolutions for 2021
Jun. 16, 2021
Leveraging Policies and Culture: A Recipe for Success
Apr. 28, 2021
AI Compliance Playbook: Understanding Algorithm Audits
Apr. 14, 2021
Advice From CISOs on How to Succeed in the Role
Jan. 20, 2021
Privacy Resolutions for 2021
Jan. 13, 2021
Cybersecurity Resolutions for 2021
Dec. 16, 2020
AI for Compliance: Building a Model
Nov. 11, 2020
AI for Compliance: Foundations
Jul. 29, 2020
Remote Forensic Data Collection Steps Into the Spotlight
Apr. 1, 2020
When Do Force Majeure Clauses Excuse Performance?
Apr. 1, 2020
Investigation Strategies During Social Distancing
Feb. 26, 2020
Eleven Key Components of an Effective Privacy Program
Feb. 12, 2020
Compliance Records Are a Strategic Gold Mine
Jan. 29, 2020
30 Creative Ideas for Compliance Messaging
Jan. 15, 2020
How Compliance and HR Can Work Together
Dec. 11, 2019
Not Just GDPR: Examining the Other European Privacy Laws
Dec. 11, 2019
How to Handle E.U. Data Subject Access Requests
Nov. 13, 2019
AI for Fund Managers and Beyond: Government Guidance
Oct. 2, 2019
Preserving Customer Goodwill After a Breach
Jul. 17, 2019
Maine Enacts Sweeping Broadband Customer Privacy Law
May 15, 2019
What Does It Mean to Be Technologically Competent?
Jan. 9, 2019
Ten Cyber and Privacy Resolutions for the New Year
Dec. 19, 2018
Ten Steps for Effective Crisis Communications
Nov. 7, 2018
How GoDaddy Built an Effective Privacy Program
Mar. 14, 2018
How Will the GDPR Affect Due Diligence?
Jan. 17, 2018
Ten Cybersecurity Resolutions for 2018
Dec. 6, 2017
Gathering and Analyzing Compliance Data
Nov. 8, 2017
Managing Data Privacy Across Multiple Jurisdictions
Jul. 26, 2017
How the CCO Can Use SEC Guidance to Tackle Cyber Threats
Jun. 14, 2017
How Internal Audit Can Improve Cybersecurity
May 31, 2017
Advice on Incorporating Cybersecurity in eDiscovery
May 3, 2017
Compliance Implications of Brexit
Apr. 19, 2017
How to Ensure Cyber Risks Do Not Derail an IPO
Jan. 11, 2017
Ten Cybersecurity Priorities for 2017
Jul. 20, 2016
Challenges Facing Chief Privacy Officers
Jun. 8, 2016
Minimizing Class Action Risk in Breach Response
Feb. 17, 2016
Cybersecurity Preparedness Is Now a Business Requirement
Apr. 8, 2015
Ten Actions for Effective Data Risk Management
Most-Read Articles
-
Sep. 4, 2024
Navigating Government Investigations of Privacy Practices -
Sep. 4, 2024
Cybersecurity Obligations in E.U.’s Digital Laws: AI Act, CRA and NIS2 -
Sep. 18, 2024
How to Manage AI Procurement: Leadership and Preparation -
Sep. 18, 2024
FTC Signals Stricter Children’s Enforcement in NGL Labs Settlement: Key Violations and Settlement Terms -
Oct. 2, 2024
How to Manage AI Procurement: Five Steps
Spotlight on Trailblazing Women
To mark International Women’s Day 2024, women editors and reporters of ION Analytics interviewed outstanding women in the industries and jurisdictions we cover. In this part, Jill Abitbol, Managing Editor of the Cybersecurity Law Report and Anti-Corruption Report, features notable women in data privacy, cybersecurity, white collar defense, compliance and anti-corruption law, including Christina Montgomery, Leslie Shanklin, Palmina Fava, Alexandra Ross and Lucinda Low. Enjoy reading their inspiring remarks here.
We Celebrate Data Privacy Day 2024
Read the full brief here.
Spotlight on Trailblazing Women
In honor of International Women’s Day, some of ION Analytics' editorial teams led by women interviewed notable women in the markets and industries we cover. In this part, the Cybersecurity Law Report highlighted notable women in compliance and hedge fund, data privacy and cybersecurity, and anti-corruption law, including Amii Barnard-Bahn, Abigail Bell, Genna Garver, Jane Horvath, Barbara Li, Amy Mushahwar, Mara Senn and Carol Widger. The interviews are here.
Webinar on Compliant International Data Transfers
Listen here to our discussion with our colleagues at Ethos Privacy, which took place on March 1, 2022, on how to approach international data transfer challenges.
Webinar on Getting a Handle on Vendor Contracts
A recording of the March 10 webinar can be accessed here.
Cybersecurity Resolutions for 2021
In this quick take video, we talk about some of our cybersecurity resolutions for 2021.
Facial Recognition Concerns
In this short video, we discuss the privacy and bias concerns with facial recognition technology.
ACR and CSLR Spring Update 2020
The Senior Editors of the Anti-Corruption Report and the Cybersecurity Law Report recently teamed up to present an update on the trends and hot topics in the anti-corruption, cybersecurity and data privacy spaces since the beginning of the year and what the publications will be focusing on in the coming months. A complimentary download of the webinar is available here.
Upcoming Webinar: Companywide Work From Home - Cybersecurity and Privacy Best Practices
Please join us on Monday, March 23, 2020, from 12:00 p.m.- 12:30 p.m. EDT for a complimentary webinar discussing the cybersecurity and privacy challenges the shift to remote working has created and how to overcome them. Registration information for the webinar is here.
Upcoming Webinar to Explore Best Practices for Alternative Data Use
Please join us on Wednesday, January 15, 2020, at 11:00 a.m. EST for a complimentary webinar hosted by our sister publication, the Hedge Fund Law Report, discussing issues relating to the use of alternative data by private fund managers. To register for the webinar, click here.
Upcoming HFLR/CSLR Webinar to Explore Strategies and Tactics for Conducting an Effective Tabletop Exercise
Please join the Hedge Fund Law Report and the Cybersecurity Law Report on Tuesday, July 30, 2019, at 1:00 p.m. ET for a complimentary webinar discussing the strategies and tactics companies can employ to conduct an effective tabletop exercise. GCs and CCOs are encouraged to invite their CISOs and CTOs to join as well. The webinar will be moderated by Shaw Horton, Associate Editor of the Hedge Fund Law Report, and will feature Luke Dembosky, partner at Debevoise, John “Four” Flynn, chief information security officer at Uber, and Jill Abitbol, Senior Editor of the Cybersecurity Law Report. Registration for the webinar is available here.
Anti-Corruption Webinar: How HPE Is Using Its New T&E Tool to Generate Compliance Metrics
Measuring the effectiveness of a compliance program can be tricky, but some companies are finding ways to use their existing internal controls to generate useful data. Join our sister publication the Anti-Corruption Report (ACR) for a complimentary webinar that explores Hewlett Packard Enterprises’ new travel-and-entertainment-approval tool. On Wednesday, March 27, 2019, from 1:00 p.m. to 2:00 p.m. EDT, the ACR’s Megan Zwiebel will interview Becky Rohr, vice-president of anti-corruption and global trade at Hewlett Packard Enterprises, about how they are using their T&E tool to measure and improve compliance. Registration information is here.