No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 243: HIPAA Compliance and Potential Changes with Shannon Lipham of Maynard Nexsen
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Why Privacy Matters to Your Business and What's in Store for 2025
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
According to a recent survey, artificial intelligence gained a significant foothold in corporate legal departments in 2025, where it is being used mostly for contract drafting and review, legal research, and document...more
Corporate legal teams struggle with the abundance of data in eDiscovery motions. With the explosion of data sources available and the increased frequency of internal investigations, legal teams more than ever need an...more
A data security incident will always require a technical response, and usually that technical response will come from outside experts. Those experts are hired to investigate and remediate an incident. Since data incidents...more
Ari Kaplan recently spoke with Kenya Parrish-Dixon, a member of the ACEDS Global Advisory Board and the General Counsel and Chief Operating Officer for Empire Technologies Risk Management Group, a cybersecurity, information...more
Thanks to increasing data volumes and types to consider, new regulations, changing security threats, and even wholly unexpected events like the impact of covid-19 and resulting overnight shift to remote workforces, corporate...more
Given the proliferation of data and evolving variety of data sources, in-house counsel teams are beginning to exhaust resources managing increasingly complex case data. Self-service ediscovery legal technology offers a...more
Your team is facing a wall of mounting compliance requirements and internal investigations, as well as a few larger litigations you fear you may not be able to handle given internal resource constraints. Each case involves...more
Marc Zamsky has been involved in the eDiscovery provider community since 1996. He joined Compliance in May 2013 as the Chief Operating Officer. In that role, Marc expanded the eDiscovery solutions offered by Compliance by,...more
A number of judicial decisions, including those issued in the Qualcomm v. Broadcom litigation, raise questions about the appropriate roles and responsibilities of inhouse and outside counsel, and their ethical obligations to...more