News & Analysis as of

Data Security Data Protection Risk Management

EDRM - Electronic Discovery Reference Model

Illumination Zone: Episode 210 | Jeff Fleming of HaystackID sits down with Kaylee & Mary

In the thirty-first episode of EDRM Trusted Partner, HaystackID’s monthly podcast series, Jeff Fleming, Managing Director for our wonderful Trusted Partner, HaystackID sits down with Kaylee & Mary to talk about his journey...more

Hogan Lovells

ECB Guide on outsourcing cloud services to cloud service providers

Hogan Lovells on

The European Central Bank (ECB) has published its Guide on outsourcing cloud services to cloud service providers (the "Guide") clarifying how banks are expected to comply with obligations under the EU Digital Operational...more

Lighthouse

Data Loss Prevention in the Age of AI: A New Landscape Demands New Approaches

Lighthouse on

Learn how to enhance your approach to data loss prevention with AI in mind, including what capabilities are essential for your organization and how to deploy Microsoft Purview DLP to address your needs. The information...more

Mitratech Holdings, Inc

5 Challenges in Incident Management (and How to Stay Resilient)

A single outage can spiral into hours of downtime, frustrated customers, and significant revenue loss across your business....more

Morgan Lewis - Tech & Sourcing

Navigating the 2025 Cybersecurity Landscape: Data Breaches, Rising Costs, and CISA’s Evolving Role

In June 2025, cybersecurity researchers discovered a leak of 16 billion passwords in one of the largest data breaches ever, impacting a wide range of platforms and placing billions of users’ information at risk. This incident...more

Miller Nash LLP

Swipe, Tap, Comply: What PCI DSS 4.0.1 Means for your Business

Miller Nash LLP on

With the seemingly never-ending updates to B2B contracts for compliance with new (and amended) comprehensive state privacy laws, the U.S. Department of Justice’s bulk data transfer rule, and artificial intelligence (AI)...more

Hanzo

Multiple Slack Workspaces, One Governance Strategy: Here’s How to Get It Right

Hanzo on

Managing collaboration at enterprise scale is inherently complex, especially when your organization operates across multiple workspaces. As teams become more distributed, compliance demands intensify, and business units push...more

TransPerfect Legal

DSARs in 2025: Stay Ahead of Regulations

TransPerfect Legal on

As data protection regulations evolve and employee rights awareness grows, organisations are seeing a significant uptick in Data Subject Access Requests (DSARs). Pursuant to Article 15 of the UK and EU General Data Protection...more

Carlton Fields

No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking

Carlton Fields on

Recorded live at the 2025 Sunshine Cyber Conference in Tampa, Jack Clabby of Carlton Fields and resident cybersecurity expert Kayley Melton, executive director of operations at the Cognitive Security Institute, sit down with...more

Herbert Smith Freehills Kramer

Protecting your business: The implications of Australia’s new privacy tort

On 10 June 2025, the new statutory tort for serious invasions of privacy came into force as part of a suite of privacy reforms passed last year, substantially enhancing privacy protections and signalling a material shift in...more

Davis Wright Tremaine LLP

NSA Issues Cybersecurity Guidance and Best Practices for AI Systems

The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more

K2 Integrity

[Webinar] Information Leaks: How to Respond, Investigate, and Protect Your Business - June 25th, 9:00 am ET

K2 Integrity on

Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more

Morgan Lewis - Tech & Sourcing

The Latest Trends in Moving ERP Systems to the Cloud

According to Forbes, “in 2025, the landscape of enterprise resource planning (ERP) is set for a thrilling transformation,” with a shift toward cloud-native ERP solutions at the top of the list....more

Fox Rothschild LLP

Best Practices for Securing Data Used to Train and Operate AI Systems

Fox Rothschild LLP on

The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more

Ankura

The Importance of Culture in an Effective Cybersecurity Program

Ankura on

While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more

Osano

3 Ways GRC Pros Can Manage Privacy Risk (and Still Have Time to Sleep, Eat, and Relax)

Osano on

Governance, risk, and compliance (GRC) can feel like thankless work at times. You can’t ship risk mitigation to market. It's not usually reflected on your balance sheet. Only especially canny investors notice the absence of...more

Katten Muchin Rosenman LLP

Choose your GenAI model providers, models, and use cases wisely

Generative AI (GenAI) vendors, models, and uses cases are not created equal. Model providers must be trusted to handle sensitive data. Models, like tools in a toolbox, may be better suited for some jobs than others. Use cases...more

Cimplifi

Chess, Not Checkers: The Human Element

Cimplifi on

Generative AI can help to keep costs manageable and increase flexibility in your strategic approaches to complex litigation. However, the use of generative AI in complex litigation can lead to significant challenges if it...more

Paul Hastings LLP

NFL Draft Provides Wake-Up Call on Protecting Confidential Information While Working Remotely

Paul Hastings LLP on

Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more

Fisher Phillips

Data Security and International Travel: What K–12 Schools and Trip Chaperones Need to Know

Fisher Phillips on

As global learning experiences become more common in K–12 education, schools increasingly send staff and students abroad for cultural exchanges, academic competitions, service trips, and more. While these trips offer...more

J.S. Held

Top Ten Strategic Advantages of a vCISO with AI Expertise for Developing Business and Protecting AI Applications

J.S. Held on

In today’s fast-paced digital landscape, Artificial Intelligence (AI) is reshaping industries, unlocking new efficiencies, and enabling transformative business models. Companies leveraging AI to create applications or enhance...more

Bradley Arant Boult Cummings LLP

A Practical Guide to Understanding Quantum Computing’s Potential Threat to Encryption

Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more

McDermott Will & Emery

New PCI DSS 4.0 Credit Card Compliance Requirements Effective April 1, 2025

McDermott Will & Emery on

As of April 1, 2025, all merchants and third-party service providers (TPSPs) involved in processing credit or debit card payments must fully adhere to the enhanced security requirements outlined in the Payment Card Industry...more

Troutman Pepper Locke

DOJ’s Latest Guidance on the Data Security Program – What’s New?

Troutman Pepper Locke on

The new Department of Justice (DOJ) Data Security Program (DSP) took effect on April 8....more

Kaufman & Canoles

[Event] 41st Annual Employment Law Update - May 15th, Hampton, VA

Kaufman & Canoles on

Managing risk in the employment law circus isn’t always easy when the rules change like they are contortionists. The 41st Annual Employment Law Update will highlight recent changes to the law and how employers can most...more

548 Results
 / 
View per page
Page: of 22

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide