Rethinking Records Retention
Compliance into the Weeds: Unsexy Keys to Data Analytics for Compliance Programs
A Less is More Strategy for Data Risk Mitigation
Data Retention and Document Holds
Fintech Focus Podcast | Navigating IT and Security Risks in Fintechs in Light of Impending DORA Deadline
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
eDiscovery Needs Digital Forensics for a Mobile World
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
eDiscovery Tips: Helpful Questions to Ask Your Clients
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Managing Large Scale Review Efficiency: Tips From a GC
Record Retention and Information Governance
Review Analytics for a New Era
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 114: Joe Dickinson, Cybersecurity Attorney Nexsen Pruet
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Innovation in Compliance - Episode 224 - Leveraging Communications as an Asset with Robert Cruz
Modernize your Information Governance: Building a Framework for Success
Join us for an in-depth discussion on two pivotal pieces of legislation reshaping the consumer protection and data privacy landscape in New York: the NY FAIR Act and the TED Bill. This webinar will explore how these laws...more
This complimentary webinar will delve into the real-life aspects of implementation – with a focus on organizational preparedness and proactive strategic foresight. Join us as we discuss how to design and roll out a...more
Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more
Hudson Cook, LLP is proud to announce the launch of The Data Edge: Developments that Matter to Your Data Compliance, a new monthly webinar series designed to help privacy and compliance professionals stay informed and...more
The NY ACEDS Metro chapter, the ARMA New Jersey chapter, and legal and governance professionals join together for a 90 minute roundtable presentation and discussion on best practices and lessons learned for professionals...more
In the rapidly evolving landscape of AI model development, the significance of obtaining valid consent cannot be overstated. This webinar is tailored for privacy and data governance professionals seeking to navigate the...more
Carriers have an obligation to protect customer proprietary network information (CPNI) and personally identifiable information (PI). Several recent FCC consent decrees resolving breaches of CPNI and PI show the FCC will hold...more
Join our enlightening webinar to explore the critical role of data discovery in constructing a comprehensive and accurate data inventory, essential for streamlining privacy compliance and enhancing data governance. In this...more
In today's data-driven world, effectively managing data not only ensures compliance with numerous privacy laws but also enhances operational efficiency and reduces risk. "Building the Case: Get Buy-In to Minimize Data Across...more
Powerful ideas emerge when you look at something through a completely different lens. And when two parties come together to share those unique perspectives? That’s when the magic happens. Womble Bond Dickinson’s virtual...more
When it comes to data privacy, what are the biggest sources of risk for businesses? According to a recent IAPP-KPMG Privacy Risk study, businesses see regulatory compliance, data management and data governance as their top...more
Partner Martin Zoltick ("Marty") and Privacy Ref's Benjamin Siegel will team up for a Rothwell Figg and Privacy Ref co-hosted webinar, "Privacy and AI Governance," taking place Thursday, February 15, 2024, at 1 pm ET. The...more
Learning Objectives - Data privacy compliance requires the use of privacy impact assessments and data transfer assessments - What about the value of other assessments like privacy by design, online safety, AI risk,...more
This webinar discussion examines the ethical concerns that stem from the use of generative AI by law firms and their clients. The focus of this session is an exploration of the use and great potential for generative AI in...more
Organizations considering using generative AI internally have to balance the business desire for innovation with a responsible approach to accessing enterprise data. Generative AI, without domain specific data and human...more
Corporate counsel and legal teams face unique and growing data-related challenges in this ever-changing regulatory and threat landscape. The risk of litigation continues to rise as data requirements for privacy and compliance...more
Looking to revolutionize your approach to data governance and digital transformation? Join us for this exciting showcase that delves into the strategic partnership of Kindato and Gimmal, leaders in their respective realms of...more
In 2018, the GDPR established comprehensive data privacy laws in Europe, setting the standard for the rest of the world. Since then, the data privacy landscape in the U.S. has changed considerably in response to increasing...more
Join McDermott’s Global Privacy & Cybersecurity team for a webinar series that delves into the most significant policy initiatives shaping the digital landscape in Europe: the respective EU and UK Digital Strategies. They...more
Legal professionals often play a crucial role in advising organizations on information governance matters, particularly when it relates to legal and regulatory compliance, data privacy, and risk management. They may provide...more
From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more
In the past two years, the scope and volume of data that needs to be collected has evolved quicker than ever before. Corporations are continuously looking for the most effective and efficient ways to stay on top of the...more
Currently defense contractors who receive or create Controlled Unclassified Information (“CUI”) from or for the U.S. Department of Defense (“DoD”) are subject to several contract-based cybersecurity requirements, including...more
Join us on October 13, 2022 at 12 noon PST / 3:00 pm EST for a discussion of The Sedona Canada Principles Addressing Electronic Discovery, Third Edition published earlier this year. Since the first edition was published in...more