We get Privacy for work — Episode 8: The Surge in Data Breach Lawsuits: Trends and Tactics
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 243: HIPAA Compliance and Potential Changes with Shannon Lipham of Maynard Nexsen
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Outside Counsel Guidelines (OCGs) are more than static billing recommendations; they are living and breathing instructions that align teams with corporate values, risk tolerance, and operational expectations. While other...more
Artificial Intelligence (AI) is transforming the legal profession, offering tremendous opportunities to enhance efficiency and access to justice. While AI tools are reshaping how legal professionals operate, the use of AI in...more
As recent innovations in automotive technology continue to fuel unprecedented growth across the industry, companies must adapt their privacy and confidentiality capabilities to safeguard highly valuable trade secrets. With...more
This CLE webinar will guide counsel on navigating the challenges when using AI in the practice of law. The panel will address ethical issues and privacy and security considerations. The panel will also offer best practices...more
The number one risk for trade secrets exfiltration is from insider threats—employees, contractors, or even executives with access to sensitive information who either intentionally or accidentally compromise it. Sometimes it’s...more
As legal and business professionals focused on protecting intellectual property—especially those of us in business litigation—it's crucial to stay attuned to the expanding influence of generative AI (“GenAI”). While patents...more
Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more
We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more
In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more
Perhaps you’ve asked an employee to take notes during a Zoom meeting, but they complained the task is difficult to manage while collaborating with teammates. Maybe you intended to document everything that transpired during an...more
Whether your organization has deployed a generative AI tool for your employees or hasn’t (yet) hopped on the bandwagon, the time is now for you to create a workplace policy governing the use of the technology. Many...more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more
NFTs – or non-fungible tokens – are increasingly popular among artists, sports figures, and the video game industry. But NFTs (some selling for upwards of eight figures) are not just for gamers, Mark Cuban, and the ultra...more
As remote work continues, employers have begun to characterize remote workers as the “invisible workforce” – because remote workers are not able to be seen or monitored in the same way as those performing in-person work. The...more
The bad news first. An estimated 3.5 million cybersecurity positions will be unfilled globally by 2021.* Leaving data security entirely up to the professionals isn’t a viable option. Like it or not we’re all on the...more
In recent years, “side hustles” have become an increasingly common phenomenon among employees in all industries to supplement income from a “traditional” job. A key attribute of side hustles is that they are self-managed, and...more
FCC Working Group Issues Report On Cybersecurity Best Practices – The June 2015 issue of the Intellectual Property & Technology Law Journal features an article by King & Spalding partner Steven Snyder on a Federal...more