News & Analysis as of

Information Security Employee Training

Ankura

The Importance of Culture in an Effective Cybersecurity Program

Ankura on

While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more

K2 Integrity

World Password Day: Increasing Security in Two Steps

K2 Integrity on

May 1 is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. It’s a time for...more

StoneTurn

Trust and National Security: Lessons for Business Insider Threat Programs

StoneTurn on

The recent arrest and criminal charges against Airman First Class Jack Teixeira for the alleged posting of classified and sensitive information on social media is yet another example of the significant risk that trusted...more

Society of Corporate Compliance and Ethics...

[Virtual Event] Technology and Compliance Conference - June 23rd, 8:55 am - 3:30 pm CDT

How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more

NAVEX

IT and Corporate Compliance: Bridging the Gap in the Era of Remote and Hybrid Work

NAVEX on

In many ways, the COVID-19 pandemic has served as a prime example of punctuated equilibrium. Shifts that have been slowly building for decades seemingly occurred overnight, giving us the contradictory sense that these changes...more

K&L Gates LLP

Practical Advice for Protecting Trade Secrets

K&L Gates LLP on

What You Need to Know in a Minute or Less - When people hear “intellectual property,” they often think first of patents, trademarks, and copyrights. Trade secrets are a fourth type of intellectual property that are critical...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

Snell & Wilmer

Protecting Your Trade Secrets in the COVID-19 Environment

Snell & Wilmer on

In addition to the many complications, concerns and changes that working in the COVID-19 environment brings, it is important to evaluate the impact it plays on a company’s internal workings, one of which is a company’s trade...more

Fisher Phillips

The Cybersecurity Threat of COVID-19

Fisher Phillips on

As people across the world react to the rapid spread of COVID-19, a new threat is emerging; individuals and employers face a risk from hackers trying to take advantage of the demand for information. Hackers have begun using...more

Seyfarth Shaw LLP

Love in the Time of Coronavirus: Protecting Trade Secrets During a Pandemic

Seyfarth Shaw LLP on

Fear of the coronavirus is causing many employers to permit—or in some cases mandate—employees to work remotely. While this measure is designed to minimize the risk of virus transmission, it presents an altogether different...more

Sheppard Mullin Richter & Hampton LLP

New Trends Emerge in FTC Data Security Orders, Including Emphasis on C-Suite Involvement

The FTC recently summarized three major changes it made to its orders in data security cases. In a blog signaling these changes, the FTC Indicated that some of the things it has been requiring of companies in 2019 are here to...more

Farella Braun + Martel LLP

Trade Secret Hygiene for Current Employees

In the first two parts of this series on best practices in protecting trade secrets, we addressed risks raised by the arrival and departure of key employees at companies, and failed potential customer-supplier or acquisition...more

Akin Gump Strauss Hauer & Feld LLP

NFA Issues Interpretive Notices for CPOs Regarding Internal Controls Systems and Cybersecurity

• The NFA has determined that registered CPOs must implement an internal controls system and highlighted best practices for such a framework. • In response to certain frequently asked questions, the NFA has also updated its...more

13 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide