News & Analysis as of

Risk Management Employee Training Today's Popular Updates

Neal, Gerber & Eisenberg LLP

AI and Social Engineering Practice Tips

The hospitality industry faces mounting cybersecurity challenges as artificial intelligence (AI) enables increasingly sophisticated social engineering attacks targeting hotels, resorts, and travel service providers. Threat...more

Mitratech Holdings, Inc

Workplace Harassment Training Compliance Around the World

Across the world, governments are tightening regulations, employees are demanding accountability, and organizations are being held to higher standards than ever before....more

Schwabe, Williamson & Wyatt PC

Employees using free or unauthorized AI tools at work?

The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more

Ankura

Generative AI Risks: Legal and Compliance Insights - Part 2

Ankura on

The Bottomline: Five Practical Steps for Generative AI Risk Management - As the first line of defense, employees within business operations must own and manage risks related to the business, including risks resulting from...more

Mitratech Holdings, Inc

From Hire to Retire: The Role of Background Checks Throughout the Employee Lifecycle

Explore how background checks play a crucial role throughout the entire employee lifecycle, from hiring to retirement. Learn how they mitigate risk, ensure compliance, and build a trustworthy workplace....more

NAVEX

Sneak Peek: Top 10 Trends in Risk and Compliance 2025 – Rising Temperatures and Workplace Violence

NAVEX on

As 2025 approaches, compliance and risk management professionals must stay vigilant amidst escalating workplace challenges. Among the Top 10 Trends in Risk and Compliance for the upcoming year, two critical issues – rising...more

Jackson Lewis P.C.

AI, Phishing Attacks, Healthcare, and a $480,000 OCR Settlement under HIPAA

Jackson Lewis P.C. on

Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more

Constangy, Brooks, Smith & Prophete, LLP

Top ten cybersecurity tips for organizations during the holiday season

‘Tis the season for the hustle and bustle of year-end holiday activities. With that comes the increased risk of cybercriminals exploiting the season to find vulnerabilities. This includes taking advantage of increased online...more

Jackson Lewis P.C.

Importance of Protecting Employee Information as Privacy and Cybersecurity Laws Proliferate

Jackson Lewis P.C. on

Most human resources professionals are concerned about the privacy and security of the vast amounts of personal information they manage. This article discusses steps to consider taking against the challenges. Deluge of...more

Amundsen Davis LLC

Don’t Gamble With Your Cybersecurity and Incident Response Plan: Lessons Learned from the Las Vegas Ransomware Attacks

Amundsen Davis LLC on

Typically, we beat the drum of the need to prepare for a data incident—anything from a full-blown ransomware attack to an employee accidently sharing data with the wrong person—by having your Incident Response Plan developed...more

FordHarrison

Lizzo Lawsuit Shows Employers ‘It’s About Damn Time’ They Train Their Managers

FordHarrison on

Recently, one of my favorite artists, Lizzo, made headlines when three of her backup dancers filed a lawsuit in Los Angeles Superior Court against her, her tour company (Big Grrrl Big Touring Inc.), and her dance team...more

Jackson Lewis P.C.

Insights From The IBM 2023 Cost of a Data Breach Report

Jackson Lewis P.C. on

The annual Cost of a Data Breach Report (Report) published by IBM is reliably full of helpful cybersecurity data. This year is no different. After reviewing the Report, we pulled out some interesting data points. Of course,...more

Nossaman LLP

$1M Colonial Pipeline Fine: The Canary in the Coal Mine?

Nossaman LLP on

A proposed $1M civil penalty against Colonial Pipeline for its procedural failures during a ransomware attack could indicate what’s in store for critical infrastructure operators who fail to keep employees up to date on how...more

NAVEX

The New Normal Workplace (pt. 1) – R&C Management

NAVEX on

Most businesses began 2021 with ambitions to return to the office. But in keeping with a trend of disruption, we are faced with new COVID variants, questions on when and how schools will respond, a cultural shift towards...more

American Conference Institute (ACI)

[Virtual Event] Employment Practices Liability Insurance - January 26th - 28th, 10:15 am - 4:15 pm EST

29th Annual Employment Practices Liability Insurance - ACI’s 29th Annual Employment Practices Liability Insurance conference returns on January 26-28, 2021 in an interactive, virtual format! This yearly conference is the...more

NAVEX

3 Coronavirus Compliance Tips From the SEC

NAVEX on

The coronavirus crisis is far from over, and compliance professionals still need every scrap of guidance that regulators can provide about how to run compliance programs in these difficult times. So when the Securities and...more

White & Case LLP

ESG Disclosure Trends in SEC Filings

White & Case LLP on

These are unprecedented times, and companies are facing important issues as they navigate the current economic, political, and social climate. The COVID-19 pandemic and Black Lives Matter movement have put the spotlight on...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

Hogan Lovells

SEC Releases Cybersecurity and Resiliency Observations: A Potentially Useful Guide for Businesses

Hogan Lovells on

In today’s connected world, businesses face constant pressure to improve their cybersecurity practices and to confirm that they are meeting industry standards. To continue helping businesses achieve those goals, the SEC...more

Bracewell LLP

SEC Examiners Release Cyber Observations: What You Need To Know

Bracewell LLP on

On January 27, 2020, the SEC’s Office of Compliance Inspections and Examinations (OCIE) announced its most recent Cybersecurity and Resiliency Observations. This report highlights specific practices that have been, and can be...more

PilieroMazza PLLC

[Event] Gaining a Competitive Advantage Through Cyber, Data, & Personnel Security - June 5th, Tysons, VA

PilieroMazza PLLC on

Cybersecurity and protection of sensitive data from external and insider threats are critical for federal contractors across all industries and in all market positions. Each significant data breach or cyber incident and...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Hospitals In The Crosshairs: Managing Cybersecurity Risk (2)

In our last article, we showed you how to evaluate where your organization sits on the landscape of readiness and preparedness. In this concluding article, we identify concrete steps you can immediately employ to move your...more

Bass, Berry & Sims PLC

Don’t Let Spoofing Fool You – SEC Says Internal Accounting Controls Should Address Cyber Threats

Bass, Berry & Sims PLC on

On October 16, 2018, the SEC released an Investigative Report detailing recent email spoofing schemes that caused nine public companies to lose a total of nearly $100 million. Building on its February 2018 guidance about the...more

Harris Beach Murtha PLLC

The Importance of Training

Harris Beach Murtha PLLC on

According to Verizon’s 2018 Data Breach Investigations Report, phishing or other forms of social engineering cause 93% of all data breaches. In order for phishing or social engineering attacks to be successful, the attacker...more

Bradley Arant Boult Cummings LLP

Understanding cyber insurance risks of target companies

Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more

37 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide