Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Podcast - Talking Sickle Cell Trait with NFL Wide Receiver Ty Montgomery and Dr. Anjulika Chawla, MD, FAAP
Meritas Capability Webinar - Legal Cannabis and the Health Care Industry
[WEBINAR] Planning in the Coastal Zone
A Marketing Platform That Matches the Type of Firm - Faegre Baker Daniels + ON24
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
Blank Rome presents a new summer webinar series where our interdisciplinary team will unpack the most pressing legal, regulatory, and policy developments from the Trump Administration’s first 180 days. Each session offers...more
Cybersecurity is integral to protecting sensitive information, ensuring regulatory compliance, managing financial risks, maintaining reputation, ensuring business continuity, gaining a competitive advantage, adapting to...more
In an increasingly interconnected healthcare landscape, third party relationships play a critical role in operations, but they also introduce significant risk. To address this challenge, our webinar delves into the...more
Join our CLE webinar, "Ethics, Cybersecurity & Data Protection: Mastering Competent Representation," as we explore reasonable steps needed for lawyers to comply with the duty of providing competent representation. Dive into...more
Are you prepared for the new SEC Rule on Cybersecurity Incident and Risk Management Disclosures? Don't let your business get caught off guard! This webinar will cover important points about the rule and how to effectively...more
Increasingly, investors are considering the impact of severe weather events, climate-related risks and socio-economic challenges, across the United States and around the world, as they make investment decisions. In response...more
Learning Objectives: - Overview of current US privacy/cybersecurity laws and regulation - Current cyber threats: overview of recent trends in cyberattacks and risk areas for healthcare providers - Incident Response: how...more
Cybersecurity attacks on health care systems continue to pose a threat to national security and to patient safety. In the webinar Cybersecurity Best Practices in Health Care presented by Clark Hill attorneys John Howard and...more
Learning Objectives - The fundamental foundation of establishing a solid HIPAA compliance, privacy and cyber security awareness program - The importance of end user HIPAA compliance, privacy and cyber security training for...more
Join BakerHostetler for our series of Fireside Chats about the latest developments impacting the capital markets and their participants, and the blockchain industry....more
Join Industry experts Florian Spindler, Manager at KPMG, Claudia Howe, Executive Director of GRC Solutions at Mitratech, and Henry Umney, Director of GRC Strategy at Mitratech as they explore 2023’s current cyber risk...more
Join members of McDermott’s Global Privacy & Cybersecurity team and Alan Gutierrez-Arana of Mazars for the next installment in our PCI DSS 4.0 series. PCI DSS 4.0 brings major changes to payments with an increased focus on...more
With the discussion around the impact of generative AI dominating the dialogue within the legal services industry, it is easy to buy into the hype without considering if the technology is the appropriate tool for the task. ...more
Financial institutions are in a tough spot- caught between the “bad guys” (state-sponsored cyberattacks and cyber criminals) and “good guys” (ever more aggressive regulators)- what’s a bank to do??? Tune in to find out!...more
DORA is set to transform how European based Financial Institutions enhance the operational resilience of their critical business processes. With an implementation date of 17th January 2025 the evolving nature of the...more
The regulatory landscape governing how your nonprofit must protect its data and what it needs to do in the event of a breach is constantly shifting. With new privacy laws in multiple states—including most notably Colorado—and...more
The attention on IT Risk and Cybersecurity risk management policies is reaching new heights — again. It doesn’t matter if you’re a large enterprise like Uber or a small / midcap company; there’s one common thread as we start...more
GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more
Today’s Privacy Reality: AI, Assessments, Breach and DSARs is a webcast that will bring together a panel of experts to discuss the impact of artificial intelligence (AI) on privacy and cybersecurity. The panel will address...more
China’s emerging statutes and regulations governing the processing, disclosure and transfer of data, under threat of severe penalties, pose significant risks for producing parties. Yet, as Chinese entities increasingly become...more
Join Warner Norcross + Judd LLP attorneys Madelaine Lane, Kelly Hollingsworth and Nate Steed for a webinar focused on preventing and mitigating wire transfer fraud. Cyber criminals are utilizing phishing emails and other...more
HR employees are, willingly or not, the guardians of the company’s most sensitive collection of data—its employee’s personal information. Cybercriminals often perceive the human resources department as the perfect gateway...more
In the late summer, the Consumer Financial Protection Bureau (CFPB) issued a circular that concluded in no uncertain terms that insufficient data protection or information security could be considered an unfair practice under...more
Join Mitratech & Escrypt in this electrifying new webinar on strengthening cybersecurity maturity. As local and global automotive cybersecurity regulations, standards, and guidelines increase in complexity, organizations are...more
Russian intelligence agencies have hacked dozens of civilian organizations in the U.S. and other Ukraine-allied nations since February. While this activity has garnered a great deal of attention due to the conflict in...more