News & Analysis as of

Data Security Best Practices Cybersecurity

Ice Miller

[Webinar] Cybersecurity Collaboration: Informing and Empowering the Defense Industrial Base - September 10th, 12:00 pm - 1:00 pm...

Ice Miller on

Join us for a timely and topical webinar hosted by Ice Miller, LLP, discussing cybersecurity collaboration and information sharing in the defense industrial base. The webinar also will feature a robust discussion of best...more

BakerHostetler

[Event] Data Dilemmas: Avoiding the Road to Ruin - September 25th, Atlanta, GA

BakerHostetler on

Data is at the center of our digital economy and provides endless ways to interact and connect with customers. Maintaining more data means taking on more risk. Join us for an interactive program that begins in the middle of a...more

Best Era

Law Firms Have a Massive AI Problem They're Pretending Doesn't Exist

Best Era on

Your associates are using ChatGPT. Right now. While you're reading this. According to Pew Research data from June 2025, 34% of U.S. adults have used ChatGPT, double the rate from 2023. Among adults under 30, that number jumps...more

Ankura

Engineering Confidence: 14 Critical Questions for Secure LLM and RAG Deployment

Ankura on

The rapid evolution of large language models (LLMs), retrieval-augmented generation (RAG), and Model Protocol Context (MCP) implementation has led many developers and teams to quickly adopt and integrate these powerful...more

American Conference Institute (ACI)

[Event] National Conference on AI Law, Ethics, Safety & Compliance - October 8th - 9th, Washington, DC

ACI’s National Conference on AI Law, Ethics, Safety & Compliance delivers a practical roadmap to implement and evolve your AI strategy while navigating its legal, ethical, and technical complexities. Gain actionable...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity challenges in the health care industry: Legal, regulatory, and risk considerations

Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more

Hogan Lovells

ECB Guide on outsourcing cloud services to cloud service providers

Hogan Lovells on

The European Central Bank (ECB) has published its Guide on outsourcing cloud services to cloud service providers (the "Guide") clarifying how banks are expected to comply with obligations under the EU Digital Operational...more

Morgan Lewis - Tech & Sourcing

Navigating the 2025 Cybersecurity Landscape: Data Breaches, Rising Costs, and CISA’s Evolving Role

In June 2025, cybersecurity researchers discovered a leak of 16 billion passwords in one of the largest data breaches ever, impacting a wide range of platforms and placing billions of users’ information at risk. This incident...more

K2 Integrity

Social Media Day: Educating Employees On The Risks Of Social Media

K2 Integrity on

Social media is used by both organizations and employees—as a marketing tool for business, for entertainment, or for interacting with friends and family....more

American Conference Institute (ACI)

[Webinar] Operationalizing AI: Governance, Culture, Bias, Privacy, Data and Cyber Security Considerations - June 24th, 1:00 pm -...

This complimentary webinar will delve into the real-life aspects of implementation – with a focus on organizational preparedness and proactive strategic foresight. Join us as we discuss how to design and roll out a...more

Davis Wright Tremaine LLP

NSA Issues Cybersecurity Guidance and Best Practices for AI Systems

The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more

Jackson Lewis P.C.

Different Country, Same Challenges: Lessons from a Breach That Could Have Been Prevented

Jackson Lewis P.C. on

A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more

Fox Rothschild LLP

Best Practices for Securing Data Used to Train and Operate AI Systems

Fox Rothschild LLP on

The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more

Alston & Bird

UK Publishes Software Security Code

Alston & Bird on

Cyber security supply chain risks are growing, and attacks on vendors and other third parties cause severe disruption to businesses. For example, in recent years we have seen many incidents that have involved threat actors...more

Ankura

The Importance of Culture in an Effective Cybersecurity Program

Ankura on

While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more

Ankura

Zero Trust Architecture Best Practices

Ankura on

As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more

Fisher Phillips

2025 Summer Reading List for Educational Leaders

Fisher Phillips on

Another school year is winding down, and educational leaders perhaps have never been more ready for summer break. From the Trump administration’s significant policy shifts to deeply consequential litigation playing out to...more

Kaufman & Canoles

[Event] 41st Annual Employment Law Update - May 15th, Hampton, VA

Kaufman & Canoles on

Managing risk in the employment law circus isn’t always easy when the rules change like they are contortionists. The 41st Annual Employment Law Update will highlight recent changes to the law and how employers can most...more

StoneTurn

2025 Incident Response Landscape: Practical Tips for Cybersecurity Readiness

StoneTurn on

Organizations seeking to improve their cybersecurity posture in 2025 must assess what happens after an incident has occurred, and how an incident response team will be able to mobilize to respond. This article provides...more

Frost Brown Todd

Managing Data Security and Privacy Risks in Enterprise AI

Frost Brown Todd on

Artificial intelligence (AI), particularly generative AI, thrives on vast amounts of data, fueling AI capabilities, insights, and predictions. But with this reliance on data comes potential privacy and security risks. And...more

American Conference Institute (ACI)

[Event] 15th Forum on Global Encryption, AI, Cloud & Cyber Export Controls - March 26th - 27th, San Francisco, CA

As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more

U.S. Legal Support

Best Practices to Secure Law Firm Documents

U.S. Legal Support on

Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more

Blake, Cassels & Graydon LLP

Décodage des défis de cybersécurité : Perspectives et pratiques exemplaires

Les cybermenaces se multiplient et évoluent sans cesse, ce qui oblige les organisations à maintenir leur résilience opérationnelle et à protéger leurs actifs clés, comme leurs infrastructures critiques et leurs données...more

Blake, Cassels & Graydon LLP

Cybersecurity Challenges Decoded: Insights and Best Practices

Cybersecurity threats continue to grow and evolve, increasing pressure on organizations to maintain operational resilience and protect their key assets, such as critical infrastructure and sensitive data. As cyberattacks...more

Baker Donelson

Ten Best Practices to Protect Your Organization Against Cyber Threats

Baker Donelson on

The conclusion of Cybersecurity Awareness Month is a reminder of the importance for organizations to implement robust security measures and promote good cyber hygiene. As we noted in our State of the Cyber Landscape webinar,...more

162 Results
 / 
View per page
Page: of 7

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide