News & Analysis as of

Risk Management Risk Mitigation Data Security

Womble Bond Dickinson

AI Governance Playbook: Building an AI Governance Program that Works

Womble Bond Dickinson on

This article is based on a presentation at Womble Bond Dickinson’s AI Intensive: Playbook for Innovation and Risk Mitigation virtual summit, which took place May 20, 2025, along with additional insights from the authors....more

Integreon

Best Practices for Cyber Incident Prevention for Law Firms

Integreon on

In our global, digital-first economy, cyberattacks are no longer isolated incidents targeting large organizations. They are a very real threat to businesses of all types and sizes, and law firms are a common target of cyber...more

Pagefreezer

5 Critical Questions to Ask Before Implementing a Team Collaboration Tool

Pagefreezer on

There are a lot of benefits to implementing a team collaboration tool like Workplace from Meta. As I’ve written before, an enterprise social network can improve communication, streamline collaboration, and even improve and...more

Ankura

Zero Trust Architecture Best Practices

Ankura on

As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more

Accelerynt, Inc.

How Over-engineered Security Stacks Are Killing Agility—And What to Do About It

Accelerynt, Inc. on

Tool sprawl is paralyzing enterprise security teams. Learn how to shift from fragile, over-engineered stacks to agile security architectures that accelerate progress....more

Seyfarth Shaw LLP

Cybersecurity In Construction: How To Effectively Mitigate Cyber Risk

Seyfarth Shaw LLP on

The construction industry’s reliance on digital data and devices has reshaped the construction process. When used properly, digital technology facilitates collaboration and increases productivity. However, growing dependence...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #434 – Use of GenAI Tools Escaping Corporate Policies

According to a new LayerX report, most users are logging into GenAI tools through personal accounts that are not supported or tracked by an organization’s single sign on policy. These logins to AI SaaS applications are...more

Mitratech Holdings, Inc

Building an HR Tech Stack for Consulting Firms

The need for an effective HR Tech Stack in consulting has never been more critical. With firms competing for top talent, having a well-structured and efficient HR system can make a huge difference....more

Dorsey & Whitney LLP

Artificial Intelligence Launching Agentic AI in an Uncertain U.S. Regulatory Landscape

Dorsey & Whitney LLP on

Within its first few days, the new administration revoked the 2023 Executive Order on Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (the “Old AI Executive Order”) – which had been intended to...more

Baker Botts L.L.P.

What is DeepSeek, and why does it matter?

Baker Botts L.L.P. on

Everyone seems to be talking about DeepSeek, and its latest AI technologies. But what is DeepSeek? What has it produced? And why is everyone talking about them? This client update is intended to provide some of the basic...more

The Volkov Law Group

Embracing Generative AI — The Current Risk Profile (Part II of II)

The Volkov Law Group on

When evaluating AI risks, legal, ethics and compliance professionals need to divide the question into two — first, what are risks from legal, ethics and compliance internal use of AI? and second, what are business risks from...more

Mintz - Antitrust Viewpoints

Senators Hold Hearing on AI Fraud and Scams, Vow to Pass AI Bills in Coming Weeks — AI: The Washington Report

On November 19, the Senate Commerce Committee’s Subcommittee on Consumer Protection, Product Safety, and Data Security convened a hearing on “Protecting Consumers from Artificial Intelligence Enabled Fraud and Scams.” The...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Womble Bond Dickinson

Cybersecurity Crunch: Building Strong Data Security Programs with Limited Resources - Insights from Tech and Financial Services...

Womble Bond Dickinson on

In today’s digital age, cybersecurity has become a paramount concern for executives navigating the complexities of their corporate ecosystems. With resources often limited and the ever-present threat of cyberattacks,...more

Kennedys

[Webinar] Days of reckoning: How to prepare for, respond to, and recover from ransomware and other cyberattacks - June 27th, 2:00...

Kennedys on

Kennedys and Booz Allen Hamilton are delighted to invite you to our 3 hour webinar on Thursday, June 27, 2024. This half-day seminar features three presentations: Clear and present danger, In the war room, and The fallout....more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Clark Hill PLC

[Webinar] Navigating Risk After the Change Healthcare Cyberattack: Strategies for Effective Healthcare Third Party Risk Management...

Clark Hill PLC on

In an increasingly interconnected healthcare landscape, third party relationships play a critical role in operations, but they also introduce significant risk. To address this challenge, our webinar delves into the...more

Spilman Thomas & Battle, PLLC

HHS Cybersecurity Performance Goals and the Healthcare Industry

The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more

Society of Corporate Compliance and Ethics...

[Event] Higher Education & Healthcare Research Compliance Conference - June 10th - 12th, New Orleans, LA

Don’t miss our annual conference devoted to higher education and research compliance - Attend the Higher Education & Healthcare Research Compliance Conference June 10–12, 2024 and hear from experienced professionals on a...more

Guidepost Solutions LLC

Unlocking the Power of Precision: Data Quality and Accessibility for Corporate Security Departments

Amidst the relentless waves of pandemic-induced uncertainty, organizations found themselves at a crossroads, compelled to reimagine how their businesses operated. For example, when stay at home orders continued to be extended...more

Health Care Compliance Association (HCCA)

‘An Unknown Individual Walked In’: Protecting Against Telehealth Risks Includes Non-IT Threats

The HHS Office for Civil Rights (OCR) and other government agencies aren’t just worried that providers understand—and mitigate—the privacy and security risks of telehealth. In fact, in 2022, the Government Accountability...more

Skadden, Arps, Slate, Meagher & Flom LLP

What Does the SEC’s Complaint Against SolarWinds Mean for CISOs and Boards?

On October 30, 2023, the SEC filed a litigated complaint against SolarWinds, a software development company, and Timothy Brown, its chief information security officer (CISO). The SEC alleges that from October 2018, when...more

A&O Shearman

UK – NCSC publishes guidance on shadow IT

A&O Shearman on

The UK National Cyber Security Centre (NCSC) published its guidance on shadow IT on 27 July 2023. ‘Shadow IT’ are unknown assets that are used within an organisation for business purposes (including in certain cloud...more

Bradley Arant Boult Cummings LLP

Cybersecurity in the U.S. Construction Industry: Navigating Challenges and Strategies for a Secure Future – Part 2

In today’s digital era, the construction industry faces a growing threat from cyber risks that can have significant impacts on projects and operations. As technology continues to revolutionize the industry, it is crucial for...more

Baker Donelson

MOVEit Transfer Zero-Day Vulnerability: What Companies Need to Know

Baker Donelson on

On May 31, 2023, renowned managed file transfer solution provider Ipswitch, Inc. revealed a zero-day vulnerability in its flagship solution, MOVEit Transfer, that can enable mass data theft from thousands of organizations....more

86 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide