eDiscovery and Compliance Programs
Managing Whistlelbowers
Compliance Tip of the Day: Using AI to Embed Your Compliance Program
Culture Crafters: Building a Culture of Accountability in the Face of Disasters
Compliance Tip of the Day: Trust and Verify
Compliance Tip of the Day: AI Assistant for Compliance
Compliance Tip of the Day: Costs and Benefits of AI
(Podcast) The Briefing: Who Owns What – Understanding Copyright in Collaborative Projects
Fox on Podcasting: Mastering Content Creation and Personal Branding with Dave Polykoff
Compliance Tip of the Day: How a CFO Views Compliance and Risk
Compliance Tip of the Day: Co-Thinking with AI
Nonprofit Basics: Grant Agreements—Matching Grants, IP, Recoverable Grants & More
Compliance Tip of the Day - Extending Compliance Value Across Your Organization
AI Today in 5: August 12, 2025, The Creating Billionaires Episode
Compliance Tip of the Day: Design - Centric Internal Controls
Compliance Tip of the Day - The ROI of Compliance
Adventures in Compliance: The Novels - The Valley of Fear, Sherlock Holmes’ Investigative Techniques for Today’s Challenges
8 Key Takeaways | Strategies to Drive Influence With and Without Authority
Moving Beyond the Usual Helpline Data
Nonprofit Basics: Grant Agreement Best Practices
The Cybersecurity & Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and international partners issued an updated advisory on July 29, 2025, highlighting the evolving tactics, techniques, and...more
Ransomware group Akira is believed to be behind a large number of attacks that appear to be tied to SonicWall firewalls with SSLVPN enabled. Over the past week, a large number of attacks by the ransomware group Akira have...more
Looking for compliance education and networking in your area? HCCA’s Regional Healthcare Compliance Conferences offer practitioners convenient, local compliance education on a wide variety of current and emerging topics...more
With the recent wave of ransomware and other security incidents, it is now more important than ever for impacted organizations to have a thorough understanding of each element of a proper data breach response. That includes...more
Kennedys and CYPFER are delighted to invite you to our 60 minute webinar on Tuesday, June 4, 2024. We will explore the practical and legal implications involved in navigating a ransomware event, and how decision-making in a...more
Hosted by American Conference Institute, the 13th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that will dive into the intricacies of...more
HR employees are, willingly or not, the guardians of the company’s most sensitive collection of data—its employee’s personal information. Cybercriminals often perceive the human resources department as the perfect gateway...more
We’re all familiar with the adage that, for businesses, the question is not “if” but “when” a data breach or ransomware attack will occur. The odds of a cyberattack aren’t as high as death and taxes but they’re approaching a...more
The Canadian Institute’s 7th Annual Canadian Forum on Global Economic Sanctions returns to Toronto in-person and via livestream on September 22-23! Join a Canadian and international faculty of government of officials,...more
The office of the Colorado Attorney General, Phil Weiser, recently issued a data security best practices guidance document as part of his office’s role in “implementing and enforcing data security and data privacy laws.” In...more
A Ward and Smith attorney, Information Technology professional and Privacy Officer outlined a variety of best practices and tips for businesses dealing with data security and privacy issues. The webinar, one in a series...more
Recent data thefts and systems intrusions, particularly with respect to ransomware, have assured that cybersecurity is top of mind for corporate executives and compliance officials. We at EBG have tried to keep you up to date...more
The Canadian Institute’s 11th Annual Forum on U.S. Export & Re-Export Compliance for Canadian Operations will take place in Toronto on January 25–27! IN-PERSON and LIVESTREAM options available. Over the last decade, this...more
Ransomware! Phishing! Zero Trust! Endpoint detection! The buzzwords and fearmongering fly when it comes to cybersecurity, but there are practical business considerations that have to be accounted for when developing a...more
Federal officials have recently warned employers and businesses that they could have insult added to injury if they respond to cyberattacks by making ransomware payments – increasingly requested through cryptocurrency – as...more
Ransomware and other cybersecurity attacks have made national headlines during the past 12 months, and public pension systems are as susceptible to these attacks as any other organization. In this episode of Public Pensions &...more
Compliance teams looking to stay ahead of the changing landscape need to be up to date on the latest developments. Join us for Global Compliance Updates in collaboration with the DIFC Academy, on 2–3 November 2021. This...more
In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks. Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer...more
Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data...more
Our podcast series features AGG attorneys and guests discussing challenges they’ve encountered when assisting clients on business and legal issues related to the Technology industry. While all topics will have a legal...more
In light of the recent and escalating spate of ransomware attacks in the United States and internationally, the Biden administration has made it a top priority to strengthen the nation’s resilience against cyberattacks....more
In this month’s edition of our Privacy & Cybersecurity Update, we examine cybersecurity guidance issued by New York state, and the Cybersecurity and Infrastructure Security Agency’s new “Bad Practices” website outlining what...more
Law firms process sensitive information on a daily basis. Confidential client data is targeted by hackers and insiders for a variety of reasons including financial gain or retaliatory purposes. When a law firm has a security...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
On February 4, 2021, the New York Department of Financial Services (NYDFS) issued Circular Letter No. 2, “Cyber Insurance Risk Framework” to all property-casualty insurers authorized to transact insurance in New York....more