Bar Exam Toolbox Podcast Episode 320: Quick Tips -- Your Post-Bar Exam Recovery Plan
Julie Mortimer of Mills & Reeve on The Right Way to Kickstart Your CRM Strategy - Passle's CMO Series Podcast EP176
You should be talking about philosophies—not just tactics—in your thought leadership
Future-Ready – Equipping MBD Teams to Navigate and Leverage Emerging Technologies
The Competitive Edge: Insights-Driven Decision Making
Innovation in Compliance: Exploring the Fractional COO Model with La Tonya Roberts
Innovation in Compliance: Strategic Compliance in Regulated Industries with Kerri Reuter
Strategic HR Insights with Kelly Mitchell
072: Prepare For Trump Executive Orders To Hit Your Law Firm
Hilary Preston, Vice Chair at Vinson & Elkins, Discusses Energy Innovation: Protecting Your Intellectual Property Portfolio
Mock Jury Exercises: Enhancing Litigation Strategy in Consumer Financial Services Cases — The Consumer Finance Podcast
Building and Exiting Business Partnerships
The Litigation Landscape Explained
Jaclyn Braga and Jenny Hills on Tapping into your Martech Stack to Compete and Win - Passle's CMO Series Podcast EP162
Vetting a ghostwriter? Make sure they say they'll do this one thing.
The five ways that thought leadership is a talent magnet
Hsu Untied interview with Joseph Halloum, Partner at King & Spalding
Federal Update – 2025 A Political Patchwork of Possibility
Ryan MacDougall Discusses Business Development in the Legal Industry
Joe Green & Monica Rodriguez Kuniyoshi on Integrating Generative AI with Your Experts: Passle CMO Series Live Podcast
The tension among regulators between the push for increased transparency and the need to protect individual privacy is always apparent in asset searching exercises. This tension is a global phenomenon, central to the ongoing...more
In this episode of On Record PR, Gina Rubel goes on record with Aihong Yu, Chief Privacy Counsel of CDK Global, to discuss how embracing privacy and security measures…...more
The modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information / data security and privacy evolve at the speed of the technical...more
Some interesting links we found across the web this week: What Does the US Data Breach Bill Mean for Your Organization? A business must always be wary of the potential for cyberattacks and data breaches, and Congress...more
The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more
1. Corporate Culture - The corporate culture of a company starts at the top, with the board of directors, and directors should be attuned not only to the company’s business, but also to its people and values across the...more
EXECUTIVE SUMMARY - 1. Cybersecurity threats. Cybersecurity preparedness is essential in 2018 as the risk of, and associated adverse impact of, breaches continue to rise. The past year redefined the upward bounds of the...more
A thousand questions immediately flood any lawyer’s mind when they first hear that their client may have been affected by a data breach. How did it happen? What data were affected? Was there any personal information affected,...more
As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more
I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more
In This Presentation: - Regulatory expectations for financial institutions - Risks for financial institutions - Planning to reduce risks - The Breach - Duties and responsibilities -...more
Organizations are preparing for data incidents and breaches by developing, updating, implementing, and testing incident response plans. This article provides a checklist of key components of an incident response plan. ...more