eDiscovery and Compliance Programs
Managing Whistlelbowers
Compliance Tip of the Day: Using AI to Embed Your Compliance Program
Culture Crafters: Building a Culture of Accountability in the Face of Disasters
Compliance Tip of the Day: Trust and Verify
Compliance Tip of the Day: AI Assistant for Compliance
Compliance Tip of the Day: Costs and Benefits of AI
(Podcast) The Briefing: Who Owns What – Understanding Copyright in Collaborative Projects
Fox on Podcasting: Mastering Content Creation and Personal Branding with Dave Polykoff
Compliance Tip of the Day: How a CFO Views Compliance and Risk
Compliance Tip of the Day: Co-Thinking with AI
Nonprofit Basics: Grant Agreements—Matching Grants, IP, Recoverable Grants & More
Compliance Tip of the Day - Extending Compliance Value Across Your Organization
AI Today in 5: August 12, 2025, The Creating Billionaires Episode
Compliance Tip of the Day: Design - Centric Internal Controls
Compliance Tip of the Day - The ROI of Compliance
Adventures in Compliance: The Novels - The Valley of Fear, Sherlock Holmes’ Investigative Techniques for Today’s Challenges
8 Key Takeaways | Strategies to Drive Influence With and Without Authority
Moving Beyond the Usual Helpline Data
Nonprofit Basics: Grant Agreement Best Practices
Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more
General and specialty compliance training from the comfort of your home or office! HCCA’s Regional Healthcare Compliance Conferences provide practitioners with virtual compliance training that includes updates on the...more
According to a recent survey of cybersecurity professionals by AT&T Cybersecurity entitled “Confidence: the perception and reality of cybersecurity threats,” phishing and cloud security threats are keeping them up at night. ...more
• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more
Connected medical devices deliver numerous benefits not available before, including improved monitoring of patient welfare and a wealth of vital data. But for all the advantages available through these devices, their...more
Representatives of Connecticut businesses and corporations, educational institutions, and state and local government attended Murtha Cullina’s March 2016 Cybersecurity Conference at the Quinnipiac University School of Law....more
New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more
With health care breaches constantly on the rise, increasing access to electronic health records (EHRs) from mobile devices, and more prevalent “shadow” cloud use, health care organizations are getting a bit of help from the...more
On Feb. 4, 2015, Anthem announced a data breach involving the personal information of more than 80 million individuals resulting from what it characterized as a sophisticated, targeted cyber-attack. Group health plans may be...more