Why Your Data is Key to Reducing Risk and Increasing Efficiency During Investigations and Litigation
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
CMMC Is Coming: Are You Ready?
FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Privacy pros are passionate about doing good work, in every sense of the word. Yes, we care about managing privacy as thoroughly and efficiently as possible (and not getting fined). But we are all in this line of work for a...more
Navigating the dynamic landscape of insider risk management requires a nuanced understanding of organisational dynamics, culture and regulatory imperatives. The costs (both direct and indirect) of getting it wrong are high,...more
The Adventures of Sherlock Holmes, written by Arthur Conan Doyle, is a collection of thrilling detective stories that have captivated readers for over a century. These stories not only provide an engaging reading experience...more
So far, in this three-part series, we discussed the various kinds of whistleblowing hotlines and the key components that comprise of a whistleblower hotline. In part three, we’ll discuss the four characteristics of a...more