We get Privacy for work — Episode 8: The Surge in Data Breach Lawsuits: Trends and Tactics
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 243: HIPAA Compliance and Potential Changes with Shannon Lipham of Maynard Nexsen
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
At the same time that AI chatbots and tools have begun reshaping how businesses operate — including how they strategize, optimize workflows, perform R&D and distill large amounts of information — individuals, including...more
Outside Counsel Guidelines (OCGs) are more than static billing recommendations; they are living and breathing instructions that align teams with corporate values, risk tolerance, and operational expectations. While other...more
While external cyber threats make headlines, the reality is that your biggest risk often comes from within. For North Carolina businesses, from tech startups in Durham to manufacturers in Greensboro, understanding how to...more
AI note-taking is today’s topic du jour. The first thing to know about this topic is that you need to experience it for yourself to see why it’s so attractive. (I’ll run a blog soon summarizing how AI note-taking works in...more
As legal service providers increasingly leverage artificial intelligence to enhance efficiency and accuracy across a variety of services, ensuring the security and integrity of sensitive client data remains a primary focus...more
Artificial intelligence just took a major step forward. Before you let it take a step into your firm, let’s discuss. Two of the most well-known AI platforms, ChatGPT and Perplexity, have launched something called AI, or...more
As recent innovations in automotive technology continue to fuel unprecedented growth across the industry, companies must adapt their privacy and confidentiality capabilities to safeguard highly valuable trade secrets. With...more
Working on the go has become a necessity for many, but it should never come at the expense of confidentiality. Julie Savarino explains....more
In this week's episode of OK at Work, attorneys Sarah Sawyer and Russell Berger from Offit Kurman discuss the importance of protecting sensitive business information such as client lists and proprietary data. Using the...more
On May 5, the OIG for the Fed authored a report with several recommendations for the CFPB following a major security incident regarding confidential supervisory information (CSI). The OIG issued four findings with seven...more
The number one risk for trade secrets exfiltration is from insider threats—employees, contractors, or even executives with access to sensitive information who either intentionally or accidentally compromise it. Sometimes it’s...more
Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more
Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more
Recent developments in workplace dynamics, regulatory changes, and several high-profile cases have highlighted the growing importance of understanding and protecting your company's trade secrets. For in-house counsel, staying...more
Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more
In recent years, many organizations have implemented new policies on artificial intelligence (AI) use to help prevent bias, plagiarism, or use of AI tools that produce inaccurate or misleading information. Meanwhile, many...more
On November 22, 2024, Engineers and Geoscientists British Columbia (EGBC) released Use of Artificial Intelligence (AI) in Professional Practice, a practice advisory for EGBC registrants that provides guidelines on the use of...more
Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more
Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more
As generative AI continues to be a hot topic in board rooms and an unavoidable reality on the front lines of business, leaders must make informed decisions when choosing AI vendors. The integration of AI into your operations...more
A Comprehensive Guide to Ensuring Data Security and Trust. 76% of users believe organizations must do more to protect their data. In an effort to lower this number and increase safety measures when it comes to customer...more
The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more
Since the public release of ChatGPT in November 2022, generative artificial intelligence (GenAI) has quickly emerged as a potentially transformative technology. In the corporate world, GenAI tools have the potential to help...more
Perhaps you’ve asked an employee to take notes during a Zoom meeting, but they complained the task is difficult to manage while collaborating with teammates. Maybe you intended to document everything that transpired during an...more
On November 30, 2022, OpenAI launched ChatGPT, and the artificial intelligence chatbot quickly became the talk of the corporate world. With over 100 million users, ChatGPT is one of the fastest growing applications of all...more