No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 243: HIPAA Compliance and Potential Changes with Shannon Lipham of Maynard Nexsen
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Why Privacy Matters to Your Business and What's in Store for 2025
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
Introduction - On July 19, 2025, Microsoft announced two new vulnerabilities that are actively being exploited (CVE-2025-49704 and CVE-2025-49706) and that relate to on-premises Microsoft SharePoint instances that are exposed...more
The second post in our data loss prevention series offers a roadmap for implementing Microsoft Purview DLP to secure sensitive data in AI-influenced environments. From discovery and classification to policy enforcement,...more
California regulators unanimously approved a sweeping set of regulations on July 24 governing the use of automated decision-making technology (ADMT) and mandating risk assessments and cybersecurity audits for businesses...more
Starting today, July 31, 2025, the Minnesota Consumer Data Privacy Act (“MCDPA”) officially takes effect. Signed by Governor Tim Walz in May 2024, this act majorly affects how the personal data of Minnesota residents is...more
ACI’s National Conference on AI Law, Ethics, Safety & Compliance delivers a practical roadmap to implement and evolve your AI strategy while navigating its legal, ethical, and technical complexities. Gain actionable...more
The Cybersecurity and Infrastructure Security Agency (CISA) has agreed to make public a report from 2022 about US telecommunications networks' flawed security practices which relate to the Salt Typhoon attacks experienced by...more
As of July 9, the U.S. Department of Justice has begun full enforcement of a sweeping new data regulation known as the Sensitive Data Rule, or “SDR.” Implemented under President Biden’s Executive Order 14117, the SDR marks a...more
M&A activity in the cybersecurity sector is on pace to exceed 2024 volume by 10% in 2025, with continued consolidation as larger firms acquire niche players to enhance capabilities or expand product offerings. The...more
When a key engineer leaves for a competitor, they can take more than just experience, they may walk away with years of intellectual property hidden in code reviews, issue tickets, and chat threads. As ideas now flow across...more
Join Thora Johnson and Jeremy Sherer to learn about: Evaluating compliance through privacy notices Key questions to address, from leadership accountability to employee training...more
On June 23, significant amendments (Amendments) to the Children’s Online Privacy Protection Act (COPPA) Rule (COPPA Rule) became effective, which increase obligations on many operators of websites and online services. The...more
Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more
Last month, the Federal Trade Commission issued guidance on the updated Safeguards Rule in the form of a set of Frequently Asked Questions for Automobile Dealers. Although directed to auto dealers, the FAQs are a useful...more
As 5G connectivity becomes more widely deployed, organizations across all industries are leaning into AI tools that promise speed, automation, and deeper insights. But the combined power of 5G + AI creates an urgent...more
Last week, the California Privacy Protection Agency (“Agency”) approved adoption of detailed new regulations under the CCPA that will include (among other notable components) a rule requiring annual cybersecurity audits for...more
The rise of artificial intelligence (AI) and its widespread availability offers significant growth opportunities for businesses. However, it necessitates a robust governance framework to ensure compliance with regulatory...more
On June 30, 2025, Governor Mike DeWine signed into law (HB 96), a cybersecurity mandate that applies to all political subdivisions in Ohio—including counties, municipalities, townships, and school districts. ...more
As the Consumer Financial Protection Bureau (CFPB) and Federal Trade Commission (FTC) scale back rulemaking and enforcement, states are advancing more prescriptive cybersecurity standards for financial institutions, including...more
The U.S. P&C insurance industry is in the midst of profound transformation in 2025, driven largely by rapid technological advancement and evolving risk dynamics. According to Kelly King, a seasoned expert with over 30 years...more
AI note-taking is today’s topic du jour. The first thing to know about this topic is that you need to experience it for yourself to see why it’s so attractive. (I’ll run a blog soon summarizing how AI note-taking works in...more
Artificial Intelligence (AI) continues to revolutionize industries and is poised to bring transformative change in healthcare delivery, drug discovery, diagnostics, and data analysis and communication. This technology is...more
HM Treasury has published a policy paper on the wholesale financial markets digital strategy. The purpose of the strategy is to ensure the UK benefits from opportunities to improve its wholesale financial markets, by using...more
On June 30, 2025, two security researchers revealed a security oversight that every hiring leader implementing AI should be aware of. Researchers accessed 64 million job application records from Paradox, a conversational AI...more
For contractors within the Defense Industrial Base (DIB), the time to ensure compliance with the Department of Defense’s (DOD) Cybersecurity Maturity Model Certification program (CMMC) 2.0 is now. DOD formally sent the final...more
Protecting sensitive data has never been more important. In a globalized world of advanced cyber threats, sophisticated espionage techniques, and external data monetization, increased security is crucial to safeguard...more