Moving Beyond the Usual Helpline Data
Compliance Tip of the Day: Why Engage in Pre-acquisition Due Diligence
Innovation in Compliance: Operationalizing Trust at Scale: A Conversation with Amanda Carty on Compliance and AI
AI Today in 5: August 7, 2025. The US v. China Episode
Hill Country Authors – Exploring the Challenges of a Green Transition with Tom Ortiz
Taxing Intelligence: AI's Role in Modern Tax Administration
LathamTECH in Focus: Move Fast, Stay Compliant
AI Today in 5: August 6, 2025, The Rethinking Compliance Episode
Daily Compliance News: August 6, 2025, The Spanking Banks Edition
AI Today in 5: August 5, 2025, The AI at the SEC Episode
Compliance Tip of the Day: M&A – International Issues
From Forest to Fortune: Navigating Workplace Ethics With Robin Hood — Hiring to Firing Podcast
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
Adventures in Compliance: The Novels - The Valley of Fear, Introduction and Compliance Lessons Learned
Episode 381 -- NAVEX's 2025 Annual Hotline Report
12 O’Clock High, a podcast on business leadership: Building Trust and Relationships: The Power of Compliance and Ethics with Jacqui Pruet
Data Driven Compliance: Understanding the ECCTA and Its Impact on Fraud Prevention with Vince Walden
Daily Compliance News: August 1, 2025, The All AI Edition
AI and the False Claims Act
Compliance Tip of the Day: AI, Continuous Monitoring and Compliance
ComplexDiscovery Editor’s Note: This featured article from ComplexDiscovery OÜ provides an examination of one of the most compelling sessions from the 2025 Dublin Tech Summit, where AI transcended analytics and delved into...more
In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more
Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more
As law firms and legal departments race to leverage artificial intelligence for competitive advantage, many are contemplating the development of private Large Language Models (LLMs) trained on their work product. While the...more
While record retrieval may sound like a straightforward task, legal professionals know it’s a complex, time-consuming process involving multiple entities, layers of rules and regulations, and security concerns (which...more
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
Cybersecurity is one of the biggest challenges facing contemporary society. With the advancement of digital technologies and the ever-increasing dependence on information systems to perform the most diverse activities, the...more
Join us for an exciting online event that explores the challenges and risks associated with the new work from home reality in the professional services industry. Discover how professionals are adapting to remote work and...more
Join us for an exciting in-person event at Covington & Burling LLP, New York Times Building, 8th Avenue, New York, NY 10018, USA. Discover the new reality of professional services work from home and the associated risks....more
DefCon’s AI Village - Sven Cattell, shown above, is the founder of a key event at DefCon 31, the AI Village. The Village attracted thousands of people eager to take part in its Hack The Future challenge. At the Village I...more
In a landmark move towards the regulation of generative AI technologies, the White House brokered eight “commitments” with industry giants Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI. The discussions,...more
In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more
ChatGPT and related artificial intelligence technologies are one of the most exciting developments to hit the legal profession in decades. Their ability to synthesize large datasets of legal information and deliver...more
[Editor’s Note: The High Cost of Risky Business: Lessons in Vigilance from Enron, Wirecard, and Silicon Valley Bank was first published March 15, 2023 on ComplexDiscovery and is republished with permission.] Vigilance is...more
All too often, organizations forget that cybersecurity is not a technology, it is a strategy. Throughout the industry we see reliance placed on technical solutions without much thought given to fundamentals and risk-based...more
In the past two years, the scope and volume of data that needs to be collected has evolved quicker than ever before. Corporations are continuously looking for the most effective and efficient ways to stay on top of the...more
Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program. The efficacy of a program is only theoretical until thorough testing is conducted. One of...more
The CyberSecurity Framework (CSF) was created to solve a pernicious problem – repeated, damaging cyberattacks against US critical infrastructure sectors. The danger was such that President Barack Obama directed a federal...more
Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more
All organizations are at different stages of cybersecurity risk management program development. These stages range from one end of the spectrum, where cybersecurity is not a consideration at all, to the opposite end where the...more
A New Approach to Security in the WFH (home) and WFC (cloud) Era - In the Middle Ages, kings and other nobles secured their fiefdoms with a high-walled castle and a moat. The moat was designed to make it difficult for...more
Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more
Corporate legal departments have seen some significant changes over the past couple of years. The ongoing explosion of data volumes and rapid adoption of new communications technologies have made e-discovery operations more...more
Ari Kaplan recently spoke with Kenya Parrish-Dixon, a member of the ACEDS Global Advisory Board and the General Counsel and Chief Operating Officer for Empire Technologies Risk Management Group, a cybersecurity, information...more
According to the 2021 ACC CLO Survey, the top three risks troubling CLO's are: cybersecurity, compliance, and data privacy. All these risks have one thing in common - data. Legal teams must effectively and defensibly manage...more