Rethinking Records Retention
Compliance into the Weeds: Unsexy Keys to Data Analytics for Compliance Programs
A Less is More Strategy for Data Risk Mitigation
Data Retention and Document Holds
Fintech Focus Podcast | Navigating IT and Security Risks in Fintechs in Light of Impending DORA Deadline
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
eDiscovery Needs Digital Forensics for a Mobile World
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
eDiscovery Tips: Helpful Questions to Ask Your Clients
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Managing Large Scale Review Efficiency: Tips From a GC
Record Retention and Information Governance
Review Analytics for a New Era
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 114: Joe Dickinson, Cybersecurity Attorney Nexsen Pruet
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Innovation in Compliance - Episode 224 - Leveraging Communications as an Asset with Robert Cruz
Modernize your Information Governance: Building a Framework for Success
2024 was another active year in cybersecurity, with high-profile vulnerabilities and data breaches, and government and private sector responses to them. Examples include pervasive ransomware attacks targeting the healthcare,...more
Over the course of the past few years, gallons of ink have been spilled addressing the seemingly ever-pending US Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC) Program. After keeping us...more
The New York Department of Financial Services (DFS) has issued guidance, in the form of an industry letter, on addressing cybersecurity risks arising from artificial intelligence (AI) under its cybersecurity regulation, 23...more
In an era where technology is rapidly reshaping industries, AI stands at the forefront, promising unparalleled efficiency and innovation. But as AI tools become integral to business operations, the need for robust AI...more
Historically, many private equity firms have let their portfolio companies independently manage cybersecurity. Given the increase in data and cyber risks, sophistication of threat actors, and impact and cost of breaches,...more
On February 26, 2024, the National Institute of Standards and Technology (NIST) released the Cybersecurity Framework version 2.0 (CSF 2.0). CSF 2.0 is a generational update to NIST’s foundational cybersecurity guidance, which...more
As we previously discussed, earlier this year the National Institute of Standards and Technology (NIST) launched the Trustworthy and Responsible AI Resource Center. Included in the AI Resource Center is NIST’s AI Risk...more
Congress is increasingly focused on potential new approaches to the responsible development and use of artificial intelligence (AI), with some members calling for enhanced oversight of AI systems. Most recently, on June 21,...more
Currently defense contractors who receive or create Controlled Unclassified Information (“CUI”) from or for the U.S. Department of Defense (“DoD”) are subject to several contract-based cybersecurity requirements, including...more
On April 20, HaystackID shared an educational webcast developed to discuss best practices for handling big data and provide tangible field-experienced methods for data remediation. These best practices can be implemented at...more
Last December, the IoT Cybersecurity Improvement Act became law in the U.S. The legislation outlines security requirements that federal Internet of Things (IoT) devices need to contain going forward. Broadly, IoT refers to...more
Previously we reported on the Department of Defense (‘DoD”) efforts to develop a Cybersecurity Maturity Model Certification (“CMMC”) program to verify the status of contractor cybersecurity and compliance. The CMMC program...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
These days information security is on the minds of virtually all technology professionals and business executives alike. But how does an organization ensure that their security profile is adequate. It can certainly help to...more