10 For 10: Top Compliance Stories For the Week Ending August 23, 2025
Daily Compliance News: August 22, 2025, The WADA Returns Edition
Operationalizing Trust at Scale: Evolving Compliance: Neta Meidav on the Diligent Acquisition and AI Integration
Daily Compliance News: August 18, 2025, The All Corruption Edition
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
False Claims Act Insights - Beyond Adversarialism: How to Steer FCA Investigations
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
Adventures in Compliance: The Novels - The Valley of Fear, Sherlock Holmes’ Investigative Techniques for Today’s Challenges
LathamTECH in Focus: Move Fast, Stay Compliant
Adventures in Compliance: The Novels - The Valley of Fear, Introduction and Compliance Lessons Learned
10 For 10: Top Compliance Stories For the Week Ending, August 2, 2025
Daily Compliance News: July 30, 2025, The Corruption Kill Business Edition
Suluki Secrets: Behind the Scenes of Reasonable Investigations — FCRA Focus Podcast
Just Press "Play"
Episode 379 -- Update on False Claims Act and Customs Evasion Liability
Daily Compliance News: July 28, 2025, The Where is Grasshopper when you need him Edition
Daily Compliance News: July 25, 2025, The New Sheriff in Town Edition
Avoiding a Bored Board
Podcast - “I Lied Like a Dog!”
Daily Compliance News: July 21, 2025, The More Reasons Not to Go to China Edition
In this line of work, I am often asked if law enforcement is ever successful in finding and punishing the threat actors who have wreaked havoc on U.S. businesses and stolen millions of dollars in ransomware attacks. I am so...more
On this episode, we sit down with Trevor Hilligoss, director of security research and the research and innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership...more
Let’s review for a moment. It’s not a HIPAA violation to be a victim of ransomware. It’s not a HIPAA violation to pay a ransom. It’s up to the covered entity (CE) to determine if a security or privacy incident is a...more
Cyberhackers—potentially frustrated by their limited ability to extort ransom from health care entities in attacks—have started extorting the patients themselves, threatening them with the release of information or...more
The Cybersecurity and Infrastructure Agency (CISA) is seeking comment on a proposed rule to implement reporting requirements for critical infrastructure entities, including health care entities, on cyberattacks and ransomware...more
The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) recently announced its second settlement in four months growing out of a ransomware attack on a health care business. Maryland-based Green Ridge...more
Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more
Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more
A recent Forbes article details the significant growth of family offices worldwide, particularly in North America. While not as large as titans like Walton Enterprises LLC or Bezos Expeditions, these new single and...more
The Data Security Incident Response Report features insights and metrics from 1,270+ incidents that members of the firm’s DADM Practice Group helped clients manage in 2021. This episode takes us deeper into ransomware. ...more
Compliance teams looking to stay ahead of the changing landscape need to be up to date on the latest developments. Join us for Global Compliance Updates in collaboration with the DIFC Academy, on 2–3 November 2021. This...more