We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One
What to Do When Leadership Doesn’t Take Compliance Seriously
Nonprofit Basics: Grant Agreements—Matching Grants, IP, Recoverable Grants & More
AI Today in 5: August 13, 2025. The Beware the EU AI Act Episode
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
Workplace Sexual Assault and Third-Party Risk: What’s the Tea in L&E?
Data Driven Compliance: Understanding the ECCTA and Its Impact with Jonathan Armstrong
Moving Beyond the Usual Helpline Data
Compliance Tip of the Day: Why Engage in Pre-acquisition Due Diligence
Innovation in Compliance: Operationalizing Trust at Scale: A Conversation with Amanda Carty on Compliance and AI
AI Today in 5: August 7, 2025. The US v. China Episode
Hill Country Authors – Exploring the Challenges of a Green Transition with Tom Ortiz
Taxing Intelligence: AI's Role in Modern Tax Administration
LathamTECH in Focus: Move Fast, Stay Compliant
AI Today in 5: August 6, 2025, The Rethinking Compliance Episode
Daily Compliance News: August 6, 2025, The Spanking Banks Edition
AI Today in 5: August 5, 2025, The AI at the SEC Episode
Compliance Tip of the Day: M&A – International Issues
From Forest to Fortune: Navigating Workplace Ethics With Robin Hood — Hiring to Firing Podcast
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
Politicians’ and tech giants’ embrace of nuclear energy to power AI heightens the urgency to protect critical infrastructure from cyber threats....more
Earlier this month the Cybersecurity and Infrastructure Security Agency (“CISA”), the U.S. federal agency under the Department of Homeland Security (“DHS”) whose mission is to protect the nation’s critical infrastructure from...more
This is the fifth article in Womble Bond Dickinson’s Energy & Natural Resources thought leadership series titled “Going Nuclear: A Sustainable Solution to Rising Energy Demand.” The series will explore the changing landscape...more
As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more
Critical infrastructure facilities are increasingly vulnerable to cybersecurity events, as demonstrated by the number of cyberattacks that have occurred this year against utilities including those in the energy sector...more
As the manufacturing sector continues to embrace the hyper-connected era of Smart Manufacturing, known as Industry 4.0, more and more organizations are integrating advanced automation, artificial intelligence (AI), the...more
As discussed previously in this blog, physical attacks against substations have been on the rise. However, the U.S. power grid is also vulnerable to cyberattacks from U.S. adversaries, which includes hostile foreign...more
The U.S. government has steadily increased its warnings about malicious cyber activity by Russia and other sophisticated persistent adversaries. Following several warnings from the Federal Bureau of Investigation (FBI) and...more
Find out why the recent Colonial Pipeline cyberattack reinforces the need for modeling and creating a digital twin of a supply chain, which can go a long way in planning for uncertainty....more
Find out why the cyberattack on Colonial Pipeline will have broad implications on how the energy industry defends and responds to future incidents....more
Find out why developing and continually maintaining a business continuity plan can help energy companies better prepare for unexpected disturbances....more
Here’s how the SAP Community can mitigate the risk of a widespread cybersecurity incident involving their SAP systems....more
Editors’ Note: This is the second in our fourth-annual end-of-year series examining important trends in data privacy and cybersecurity in the coming year. Our previous entry discussed the CCPA. Up next: a look into how...more
As electric utilities move towards the implementation of smart grid software and hardware, an area of interest is potential exposure to cyber attacks. The electric grid generally refers to the network of transmission lines,...more
The National Institute of Standards and Technology (NIST) continues to focus on cybersecurity risks in key areas like Smart Grid and Smart Cities. NIST kicks off a two day workshop from Nov. 13-14, 2018, focusing on key...more
Not to be super scary, but the reality is that we live in a scary cyber world. A new report published by the Intelligence and National Security Alliance outlines the findings of a cyber exercise based on a hypothetical...more
On Tuesday, July 31, 2018, the Department of Homeland Security (DHS) hosted a National Cybersecurity Summit, featuring the nation's top homeland, national security and law enforcement officials. The event featured Vice...more
This is the first installment of a two-part series exploring how critical infrastructure like power plants are proactive in implementing protective measures to safeguard against future cyber attacks, but challenges remain....more
CYBERSECURITY - Financial Conduct Authority Warns Banking Industry of ICOs and Cryptocurrency - Writing a “Dear CEO” letter to banking executives, the Financial Conduct Authority (FCA) warned executives on June 11,...more
On May 30, 2018, the White House released a key report, entitled "Assessment of Electricity Disruption Incident Response Capabilities," which was required by the May 2017 White House Cybersecurity Executive Order 13800...more
According to the National Institute of Standards and Technology (NIST), the energy sector relies on industrial control systems assets to “generate, view article transmit, and distribute power and to drill, produce, refine,...more
The Federal Energy Regulatory Commission (FERC) has proposed new rules to enhance cybersecurity for the electric grid in the U.S., which includes security management controls to specifically respond to risks associated with...more
DNV GL recently issued a new globally applicable recommended practice (DNLVGL-RP-G108) to assist oil and gas operators, system integrators and managers, and vendors in the offshore industry to manage increasing cybersecurity...more