We get Privacy for work — Episode 8: The Surge in Data Breach Lawsuits: Trends and Tactics
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 243: HIPAA Compliance and Potential Changes with Shannon Lipham of Maynard Nexsen
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Blockchain technology is an emerging solution for high-security intellectual property (IP) asset management and recordkeeping. The blockchain records transactions and tracks assets within a business network as a shared,...more
The Interim AI Measures is China's first specific, administrative regulation on the management of generative AI services. Laws/Regulations directly regulating AI (the “AI Regulations”) The Cyberspace Administration of China,...more
The UK National Cyber Security Centre (NCSC) published its guidance on shadow IT on 27 July 2023. ‘Shadow IT’ are unknown assets that are used within an organisation for business purposes (including in certain cloud...more
Fortune favors the brave. That’s what many have come to believe as cryptocurrency has soared into mainstream consciousness over these past two years. With cryptocurrency companies spending over $2 billion on advertising via...more
Letter from Our Co-Chairs - As the digital transformation of financial markets accelerates at breakneck speeds, fintech presents significant opportunities and challenges for both investors and innovators around the world. ...more
With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more
Welcome to the 2020 edition of In Principle. With the United Kingdom (UK) leaving the European Union (EU) on31 January 2020, and moving into a transition period which will last until 31 December 2020, Brexit of courselooms...more
Gregory J. Nowak, a partner and practice leader for hedge funds in Pepper Hamilton’s Private Fund Services Practice Group, hosts a series of candid, interactive webinar discussions for West LegalEdcenter on what is going on...more
In the 2018 edition of this publication, we ended the introduction with the line, “We can only hope that we will enter 2019 with greater certainty than 2018 as to how the regulatory landscape will look.” Unfortunately,...more
On December 28, 2018, the U.S. Department of Health and Human Services (“HHS”) closed out the year by releasing long-awaited voluntary cybersecurity guidelines for the health care industry. The four-volume publication,...more
On July 21, 2016, the Financial Conduct Authority (FCA) of the United Kingdom (UK) published a thematic review: UK equity market dark pools - Role, promotion and oversight in wholesale markets. Background - The...more
The National Cybersecurity Center of Excellence is seeking comments on a draft practice guide, entitled “IT Asset Management (Special Publication 1800-5a)” which is “designed to help the financial services industry monitor...more