Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
Podcast - Regulating AI in Healthcare: The Road Ahead
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
FCPA Compliance Report: Ethical Challenges in AI, Data Protection, and Sports with Andre Paris
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Everything Compliance: Episode 156, To Document or Not Edition
AI on the Job: How to Stay Ahead of Employment and Data Privacy Risks
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — Regulatory Oversight Podcast
Constangy Clips Ep. 10 - 3 Ways the GDPR Is Evolving with Today’s Tech Landscape
The Privacy Insider Podcast Episode 14: The Pig Around the Corner: Privacy and Trade with Constantine Karbaliotis of nNovation LLP
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
A Less is More Strategy for Data Risk Mitigation
Weathering the 2025 Whirlwind: How to Keep Calm & Carry On
Approach to Responsible AI
Why Privacy Matters to Your Business and What's in Store for 2025
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Here are the top ten items you should tackle in August, based on the latest workplace law developments and upcoming critical compliance dates...more
Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more
Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more
As the digital landscape evolves, so do the threats that accompany it. The rise of artificial intelligence (AI) has fundamentally transformed the nature of cybercrime, enabling attackers to execute more sophisticated and...more
We’re back with a deeper dive into the 2024 Data Security Incident Response Report, which features insights and metrics from 1,150+ incidents in 2023. This episode dives deeper into information governance and...more
The PowerSchool data breach, discovered on December 28, 2024, serves as a powerful reminder of the persistent cybersecurity challenges confronting the education sector. PowerSchool, a leading provider of education technology,...more
The intersection of economic indicators and Hart-Scott-Rodino (HSR) transaction trends provides a detailed view of the evolving mergers and acquisitions (M&A) environment. These insights are essential for professionals...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Carriers have an obligation to protect customer proprietary network information (CPNI) and personally identifiable information (PI). Several recent FCC consent decrees resolving breaches of CPNI and PI show the FCC will hold...more
Every spring, BakerHostetler collects, analyzes, and compares key metrics on the incident response matters we handled in the prior year. The output – our Data Security Incident Response (DSIR) Report – highlights key findings...more
Join us for an insightful webinar that will delve into the critical aspects of information governance and data management in the rapidly evolving field of cybersecurity. As organizations face escalating cyber threats, the...more
On May 15, 2024, the Securities and Exchange Commission (the “SEC”) issued final amendments (the “Amendments”) to Regulation S-P (originally adopted in 2000), which governs the treatment of a customer’s nonpublic personal...more
CYBERSECURITY - SEC’s Hacked X Account Leads to Tumultuous Bitcoin Market - The Securities and Exchange Commission has confirmed that its X account “was compromised, and an unauthorized post was posted.” The SEC...more
If they have not already, employers should take steps now to properly protect the personal information of their employees. The Eleventh Circuit Court of Appeals’ decision in Ramirez v. Paradies Shops, LLC clarifies that...more
In the wake of the Brazilian National Data Protection Agency (ANPD) issuing further regulations on the determination of penalties for violations of the Data Protection Law (LGPD), on March 23, 2023 the ANPD launched a new...more
From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more
Editor’s Note: On February 15, 2023, HaystackID shared an educational webcast to provide valuable insight into the ways in which AI is being used to address key issues in the realm of privacy and cybersecurity. The expert...more
Baker McKenzie recently released their sixth annual edition of ‘The Year Ahead: Global Disputes Forecast’ in which senior legal and risk leaders share what they expect to see in the coming year. From an overarching...more
Government offices and public services in Freemont County, Colorado, have been disrupted since August 17, 2022, due to a “cybersecurity event affecting our county computer systems.” As of the official update issued...more
WHAT YOU NEED TO KNOW IN A MINUTE OR LESS - A government inquiry in the context of data security typically arises in one of two ways: either a data security incident involving a threat actor occurs, or a government agency is...more
CYBERSECURITY - State Department Establishes Bureau of Cyberspace and Digital Policy - The Department of State’s new Bureau of Cyberspace and Digital Policy (CDP) commenced operations on April 4, 2022. According to an...more
This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more
From remote classrooms to student devices—and everything in between—school districts have been thrown into the deep end with no life jacket when it comes to managing cybersecurity. Join us for a discussion of the unique...more
CYBERSECURITY - FBI Warns Olympics/Paralympics Participants of Cyber “Activities” - On January 31, 2022, the FBI issued a Private Industry Notification entitled “Potential for Malicious Cyber Activities to Disrupt the...more
Editor’s Note: On September 30, 2021, HaystackID shared an educational webcast presented at the 2021 Privacy + Security Fall Academy. The webcast provided viewers with a framework and solutions for deploying privacy-based...more