Rethinking Records Retention
Compliance into the Weeds: Unsexy Keys to Data Analytics for Compliance Programs
A Less is More Strategy for Data Risk Mitigation
Data Retention and Document Holds
Fintech Focus Podcast | Navigating IT and Security Risks in Fintechs in Light of Impending DORA Deadline
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
eDiscovery Needs Digital Forensics for a Mobile World
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
eDiscovery Tips: Helpful Questions to Ask Your Clients
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Managing Large Scale Review Efficiency: Tips From a GC
Record Retention and Information Governance
Review Analytics for a New Era
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 114: Joe Dickinson, Cybersecurity Attorney Nexsen Pruet
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Innovation in Compliance - Episode 224 - Leveraging Communications as an Asset with Robert Cruz
Modernize your Information Governance: Building a Framework for Success
Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more
Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more
Every year, BakerHostetler collects, analyzes and compares key metrics on the incident response matters we handled in the prior year. The Data Security Incident Response (DSIR) Report presents key findings and trends, along...more
The economic landscape in December 2024 revealed a dynamic interplay between consumer spending, corporate strategy, and transactional activity, offering critical insights into the evolving M&A environment. Recent data from...more
Information Governance often takes a back seat to other organizational initiatives. But why is this the case? The list of reasons is long and varied. Not knowing where to start or how to build strategic approaches to...more
In a narrow 3-2 decision on July 26, the SEC adopted its final rule concerning cybersecurity risk management, strategy, governance, and incident disclosure (the “Final Rule”). Below we highlight some of the principal changes...more
In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more
It has been a full year since the initial comment period closed on the Securities and Exchange Commission’s (“SEC”) proposed rule on cybersecurity disclosure, governance, and risk management for public companies (the...more
Editor’s Note: On August 31, 2022, HaystackID shared an educational webcast on the topic of data mining in data breach incident response. As data mining has increasingly become one of the largest expenses during a cyber...more
Editor’s Note: On August 11, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more
Economic uncertainty, health and safety, work from home, IT security issues, continuity, and operational resiliency…it is like an intricate pattern of dominos falling over....more
In today’s connected world, businesses face constant pressure to improve their cybersecurity practices and to confirm that they are meeting industry standards. To continue helping businesses achieve those goals, the SEC...more
On January 27, 2020, the SEC’s Office of Compliance Inspections and Examinations (OCIE) announced its most recent Cybersecurity and Resiliency Observations. This report highlights specific practices that have been, and can be...more
Disruptionware is defined by the Institute for Critical Infrastructure Technology (ICIT) as a new and “emerging category of malware designed to suspend operations within a victim organization through the compromise of the...more