Multijurisdictional Employers, Part 3: Best Practices for Paid Sick Leave and Family Leave
Hot Topics in International Trade - Tariff Mitigation Strategies with Braumiller Law Group Managing Partner Adrienne Braumiller
Compliance Tip of the Day: Bringing Predictive Analytics into Your Compliance Regime
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
A Less is More Strategy for Data Risk Mitigation
AGG Talks: Cross-Border Business Podcast - Episode 26: U.S. Enforcement Trends Targeting Foreign Pharmaceutical and Medical Device Manufacturers
Key Discovery Points: Even AI Experts Can Get Faked Out
PilieroMazza Annual Review: What DOJ’s 2024 FCA Report Means for Government Contractors
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 223: Cybersecurity and Privacy Risks with Healthcare Vendors with Brandon Robinson of Maynard Nexsen
Government Contracts and New Mandates Executive Orders and Cost Recovery Strategies Explained
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Consumer Finance Monitor Podcast Episode: Regulating Bank Reputation Risk
4 Key Takeaways | AI in Precision Agriculture Legal Risks and Mitigation
The Duty to Cooperate Under a Liability Policy
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Preparing for CMS Staffing Mandates — Assisted Living and the Law Podcast
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare Industry with Brandon Robinson of Maynard Nexsen
Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Data is at the center of our digital economy and provides endless ways to interact and connect with customers. Maintaining more data means taking on more risk. Join us for an interactive program that begins in the middle of a...more
Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more
In this fourth installment of five articles centered around the core functions within the National Institute of Standards and Technology (NIST) Privacy Framework, we cover the Communicate function and the corresponding...more
Vendor risk management (VRM), or third-party risk management, is the management, monitoring, and evaluation of risks that result from third-party vendors and suppliers of products and services. It’s a crucial initiative...more
The transformation to a work from home/work from anywhere model has become the new normal and even after the pandemic ends, many expect that model to continue. This accelerated transition has forced companies to embrace...more
As reflected in our 2021 Data Security Incident Response Report 2020 saw a sharp spike in the number of incidents involving vendors, which amounted to over 25 percent of the total incidents handled in 2020, and the trend is...more
The COVID-19 pandemic has changed the way millions of people work. Remote workers are especially vulnerable to cyber threats such as ransomware and business email compromise. Joe Swanson, chair of Carlton Fields’...more
Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more
Missouri Auditor Nicole Galloway recently announced plans to conduct cybersecurity audits of five school districts. Coinciding with National Cybersecurity Awareness Month, the audits are intended to reveal how school...more
On September 15, the Securities and Exchange Commission’s (SEC) Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert re-emphasizing the careful scrutiny it will give to the data security practices of...more