News & Analysis as of

Data Protection Risk Management Data Loss Prevention

Lighthouse

Data Loss Prevention in the Age of AI: Deploying Microsoft Purview DLP

Lighthouse on

The second post in our data loss prevention series offers a roadmap for implementing Microsoft Purview DLP to secure sensitive data in AI-influenced environments. From discovery and classification to policy enforcement,...more

K2 Integrity

Information Leaks: How to Assess the Impact, Investigate the Cause, and Reduce the Likelihood of Future Breaches

K2 Integrity on

Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more

Lighthouse

Data Loss Prevention in the Age of AI: A New Landscape Demands New Approaches

Lighthouse on

Learn how to enhance your approach to data loss prevention with AI in mind, including what capabilities are essential for your organization and how to deploy Microsoft Purview DLP to address your needs. The information...more

Lighthouse

As Employees Move, Keeping Data in All the Right Places Is Crucial

Lighthouse on

As the corporate workplace continues to evolve—encompassing hybrid work environments, bring your own device policies, and cloud-based storage—companies are well-advised to consider areas of increased vulnerability and whether...more

EDRM - Electronic Discovery Reference Model

[Webinar] Managing Data Related Procedures Inside Corporate! - September 27th, 1:00 pm - 2:15 pm ET

Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more

HaystackID

[Webinar] CFIUS Compliance: Your Organization’s Growth and Investment Strategy May Be a Matter of National Security - July 27th,...

HaystackID on

The Committee on Foreign Investment in the United States (CFIUS) is a U.S. government interagency committee with the responsibility to review foreign investments in U.S. businesses and real estate transactions for national...more

McDermott Will & Schulte

NIST Issues Cybersecurity Framework for Ransomware Risk Management

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently issued a Ransomware Profile identifying steps organizations can take to prevent, respond to and recover from...more

NAVEX

The State of Risk Alignment - Alliances Grow Between IT Security and IRM

NAVEX on

While business risks abound, including intensified cybersecurity attacks, the impact of rapid technological advances and increasing regulations, there are healthy ways to uncover and mitigate risks. Organizations are...more

Herbert Smith Freehills Kramer

Cybersecurity: the SEC Provides Guidance on Well-Known and Emerging Best Practices

At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more

Hogan Lovells

SEC Releases Cybersecurity and Resiliency Observations: A Potentially Useful Guide for Businesses

Hogan Lovells on

In today’s connected world, businesses face constant pressure to improve their cybersecurity practices and to confirm that they are meeting industry standards. To continue helping businesses achieve those goals, the SEC...more

Bracewell LLP

SEC Examiners Release Cyber Observations: What You Need To Know

Bracewell LLP on

On January 27, 2020, the SEC’s Office of Compliance Inspections and Examinations (OCIE) announced its most recent Cybersecurity and Resiliency Observations. This report highlights specific practices that have been, and can be...more

Morgan Lewis

SEC Publishes Report on Cybersecurity and Resiliency

Morgan Lewis on

The US Securities and Exchange Commission (SEC) Office of Compliance Inspections and Examinations (OCIE) published a report on January 27 outlining various industry practices and approaches to managing and combating...more

The Volkov Law Group

Managing Third-Party Vendor Cybersecurity Risks (Part II of III)

The Volkov Law Group on

We all know that businesses rely on a large number of third-party vendors to support their business operations.  Many of these third parties require access to a company’s data and its internal information and technology...more

Polsinelli

SEC’s Most Recent Cybersecurity Move: What Registered Investment Advisors Need to Know

Polsinelli on

As public concern over data security grows in the wake of the Equifax data breach, the U.S. Securities and Exchange Commission (SEC) is increasing its scrutiny of registered investment advisors (RIAs). In turn, RIAs should...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide