No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
Daily Compliance News: August 20, 2025, The Boss is Back Edition
Daily Compliance News: August 19, 2025, The AI Winter Edition
10 For 10: Top Compliance Stories For the Week Ending August 16, 2025
AI Today in 5: August 15, 2025, The AI as Boss Episode
The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
Daily Compliance News: August 14, 2025 The End of Dial Up Edition
Daily Compliance News: August 13, 2025. The Bad App Store Ratings Edition
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
AI Today in 5: August 7, 2025. The US v. China Episode
LathamTECH in Focus: Move Fast, Stay Compliant
Daily Compliance News: August 6, 2025, The Spanking Banks Edition
Daily Compliance News: August 1, 2025, The All AI Edition
Daily Compliance News: July 30, 2025, The Corruption Kill Business Edition
Innovation in Compliance: Scaling Compliance Programs: Insights from a Navy Veteran and Compliance Leader
Daily Compliance News: July 28, 2025, The Where is Grasshopper when you need him Edition
JONES DAY TALKS®: Real Assets Roundup Episode 2: A First Look at Data Centers: The Fourth Utility
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. State Action: North Dakota Passes Law...more
DORA (Digital Operational Resilience Act) is an EU regulation that sets rules for how financial entities manage ICT (Information and Communication Technology) risks. It covers areas like cyber resilience, incident reporting,...more
On April 22, 2025, Laura D’Allaird, Chief of the SEC’s Cyber and Emerging Technologies Unit (CETU), participated in the Incident Response Forum Masterclass 2025 (Incident Response Masterclass). In the session, titled “SEC...more
The European Union’s Digital Operational Resilience Act (DORA) came into effect on January 17, 2025. DORA aims to harmonise rules concerning the provision of information and communication technology (ICT) services to...more
1. Bank regulation - 1.1 PRUDENTIAL REGULATION - a) General - (i) International - FSB: Plenary December 2024 - Status: Final - The FSB has set out the outcomes of its Plenary that met on 3 and 4 December. Points of...more
Key Points - - During its 2024 term, the U.S. Supreme Court is poised to provide important guidance on the Private Securities Litigation Reform Act’s (PSLRA’s) particularity requirement in NVIDIA Corp. v. E. Ohman J:or...more
On October 16, 2024, the New York State Department of Financial Services (the "DFS"), under its Cybersecurity Regulation—23 NYCRR Part 500—issued a memorandum providing guidance on the risks posed by artificial intelligence...more
On October 16, 2024, the New York Department of Financial Services (“NYDFS”) released an Industry Letter—entitled Cybersecurity Risks Arising from Artificial Intelligence and Strategies to Combat Related Risks (the “Letter”)....more
As implementation of the EU’s Digital Operational Resilience Act (DORA) approaches, financial market participants and their technology service providers (both in and out of Europe) face a critical compliance deadline. The new...more
On 9 May 2024, Skadden held the inaugural London Space Law Symposium, where six panels of Skadden representatives and industry experts discussed legal aspects of the new space economy. The event was held in the Naim Dangoor...more
HHS Cybersecurity Performance Goals and the Healthcare Industry - The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare...more
ACI’s 8th Annual Legal, Regulatory, and Compliance Forum on Fintech & Emerging Payment Systems will provide in-depth guidance on the latest regulatory developments at the Federal and State Level that you need to be aware of....more
Most Financial Services Institutions (FSIs) have digital technology at their core. And a primary responsibility for most FSIs is “cyber-connect” customers – be they organizations or individuals – with their money simply and...more
PA Health Dept Sued; Investigation Looms, After Contact Tracing Breach "The PA health dept. is being sued, after employees of its vendor Insight Global set up an unsecured channel to share COVID-19 contact tracing data,...more
The Situation: As we advised in our recent Commentary, federal banking regulators have proposed rules requiring a banking organization to provide its primary federal regulator with prompt notification of any...more
ANTICORRUPTION DEVELOPMENTS - DOJ Files Superseding Indictment in Haitian Port Corruption Plot - On October 30, 2018, the U.S. Department of Justice (DOJ) filed a superseding indictment in the District of Massachusetts...more
Some reaction to the HQ2 x2 news, including what a pair of new tech hubs actually means for the cities that have thrown out the red carpet to Amazon and other technology giants....more
The Situation: Latin American governments, business leaders, and legal advisors continue to address privacy and cybersecurity concerns. The Result: The development and implementation of privacy-focused regulations is a...more
On January 20, 2017, businessman Donald J. Trump was sworn in as the 45th President of the United States following a contentious and unconventional 2016 presidential election. Republicans also successfully maintained control...more
And we thought Brexit was something. Buckle up. It’s going to be a wild market ride... Whoa....more
A recent study by the Ponemon Institute found that insider threats due to malicious or negligent employees are the leading cause of private-sector cybersecurity incidents. Of the over 600 information security professionals...more
All organizations, including financial institutions, continue to face significant security threats across their wide ranging IT systems. Such organizations are particularly vulnerable if they cannot track networked devices...more