Podcast - “I Lied Like a Dog!”
How confidential is a request to access or challenge information in INTERPOL’s files?
Regulatory Ramblings: Episode 70 – Lessons for Compliance from a Law Enforcement Career + Regional Geopolitical Risks in 2025 with Mark Nuttall and Steve Vickers
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
The Presumption of Innocence Podcast: Episode 61 - A Call to Service: From Public Duty to Spiritual Advocacy
What isn’t a Red Notice?
The Presumption of Innocence Podcast: Episode 41 - The Dynamics of Decision-Making: Psychology and the Criminal Justice System
Podcast - Uncovering the FTC's Criminal Liaison Efforts
INTERPOL and Child Kidnapping Cases. What are INTERPOL’s Abilities and Limitations?
How can a private individual report to INTERPOL?
How can law enforcement officials access and use the INTERPOL notice system?
The Justice Insiders Podcast: The DOJ Wants You! - Part II: Voluntary Disclosures
Gary Kalman on Corruption and Compliance Programs
Book Discussion with Brittany Barnett, Author of A Knock at Midnight, and Tanya Eiserer (WFAA-TV)
Compliance Perspectives: Ethics and Policing in the UK
Chicago Mayor Lori Lightfoot on Policing Reform
The ABCs of Employee Theft [More With McGlinchey Ep. 7]
Nota Bene Episode 90: U.S. Q3 Check In: Stimulus, Relief, Election, and Direction with Elizabeth Frazee and Jonathan Meyer
[WEBINAR] Exploring the CPRA’s Investigatory Privilege
Devil in the Details: Gilbert King on Truth and Transparency in the Judicial Process
xThe cybersecurity community has witnessed a significant development with the recent compromise of LockBit’s operational infrastructure, providing extraordinary visibility into one of the most sophisticated...more
Your company was hacked. You feel panic, embarrassment, anger, fear and confusion. But you must act quickly, logically and decisively to stop the bleeding and protect your business, your customers and your employees. The good...more
For many, responding to an incident feels chaotic — questions swirling, uncertainties piling up, and no clear direction. Even when prepared with a well-rehearsed incident response plan, a data security incident places a...more
Report on Patient Privacy Volume 23, no 2 (February 2023) DCH Health Systems, based in Tuscaloosa, Ala., said it fired an employee in December after a routine privacy audit revealed evidence that the worker had accessed some...more
Cyber incidents are increasing in frequency and severity across all businesses and industries. As the saying goes, it’s not a matter of IF but WHEN an incident will occur. In this webinar we will explore ways that you can...more
The Associated Press has reported that the Metropolitan Washington, D.C. police department has been the victim of a hacking incident for which the Russian-based ransomware group Babuk is claiming responsibility....more
On August 20, 2020, former Uber Chief Security Officer Joe Sullivan was charged with obstruction of justice and misprision of a felony for knowingly concealing a hack of Uber in 2016. Based on Sullivan’s complaint,...more
International companies should keep in mind recent developments coming out of Asia on the privacy front. Chinese authorities are reported to be confiscating smartphones at the border to install surveillance apps. Companies...more
Darkreading.com has issued a survey entitled Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web, which states that malicious insiders are responsible for 27 percent of all cybercrime. This statistic...more
The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more
Reacting to the influx of recent, high-profile data breaches and cybersecurity attacks in the government and the private sector, the U.S. Senate earlier this week passed the controversial Cybersecurity Information Security...more
You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more