News & Analysis as of

Cybersecurity Sensitive Personal Information Webinars

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Blank Rome LLP

[Webinar] 180 Days of the Trump Administration—Quick Hits on Executive Orders, Actions, and Policies - July 17th - August 13th,...

Blank Rome LLP on

Blank Rome presents a new summer webinar series where our interdisciplinary team will unpack the most pressing legal, regulatory, and policy developments from the Trump Administration’s first 180 days. Each session offers...more

Ankura

[Webinar] Live Masterclass: Practical Approaches to Preventing Access to American’s Sensitive Data under Executive Order 14117 -...

Ankura on

Join us for an exclusive CLE-eligible live masterclass with cybersecurity, data privacy, and international trade professionals from Baker McKenzie and Ankura, where they will share how to implement a successful Data Security...more

McDermott Will & Emery

[Webinar] PCI DSS 4.0: Third-Party Service Providers and Risk Management - June 7th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Join members of McDermott’s Global Privacy & Cybersecurity team and Alan Gutierrez-Arana of Mazars for the next installment in our PCI DSS 4.0 series. PCI DSS 4.0 brings major changes to payments with an increased focus on...more

Epiq

[Webinar] Beyond the Breach – Managing Data Classification & Notification Projects - November 4th, 6:00 pm AEDT

Epiq on

The immediate cyber incident is over – what happens next? Join our esteemed panellists as they outline key considerations when managing post-breach data classification and notification projects. Setting the scene through the...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide