Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Podcast - Talking Sickle Cell Trait with NFL Wide Receiver Ty Montgomery and Dr. Anjulika Chawla, MD, FAAP
Meritas Capability Webinar - Legal Cannabis and the Health Care Industry
[WEBINAR] Planning in the Coastal Zone
A Marketing Platform That Matches the Type of Firm - Faegre Baker Daniels + ON24
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
Information leaks pose a growing and multifaceted risk to organizations across sectors. While often associated with cybersecurity breaches, the majority of such incidents stem from human error or intentional misconduct. On 25...more
Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more
Malicious insiders are the silent threats lurking within organizations—employees, contractors, or partners with privileged access who can cause devastating data breaches. With the rise of remote work and mobile-first business...more
Cyberattacks and technology disruptions in healthcare don’t just cost organizations financially — they can threaten patient safety and put organizational reputations at risk. How ready is your organization for a potential...more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
Learning Objectives: - Gain an understanding of recent changes to the cyber security landscape - Where to start: elevate your cyber security risk management - Educate on the future of cyber security in healthcare and...more
Kennedys and Booz Allen Hamilton are delighted to invite you to our 3 hour webinar on Thursday, June 27, 2024. This half-day seminar features three presentations: Clear and present danger, In the war room, and The fallout....more
The financial services industry has seen a litany of new data privacy and cybersecurity challenges through the first half of 2024. Financial institutions are facing unprecedented compliance hurdles resulting from the...more
Join us for an insightful webinar with Miller Nash’s head of privacy and data security team, Eva Novick, and colleague, Delfina Homen, where we will delve into the essentials of privacy and data security in 2024. Whether...more
In an increasingly interconnected healthcare landscape, third party relationships play a critical role in operations, but they also introduce significant risk. To address this challenge, our webinar delves into the...more
Are you prepared for the new SEC Rule on Cybersecurity Incident and Risk Management Disclosures? Don't let your business get caught off guard! This webinar will cover important points about the rule and how to effectively...more
Corporate counsel and legal teams face unique and growing data-related challenges in this ever-changing regulatory and threat landscape. The risk of litigation continues to rise as data requirements for privacy and compliance...more
The attention on IT Risk and Cybersecurity risk management policies is reaching new heights — again. It doesn’t matter if you’re a large enterprise like Uber or a small / midcap company; there’s one common thread as we start...more
Government agencies at the state and federal levels are increasingly training their sights on the cybersecurity resiliency of companies in an array of industries. The US Securities and Exchange Commission has proposed rules...more
Learning Objectives: - Participants will have a better understanding of how the cyber and digital threat landscape has evolved over the past five years. - Participants will have a better understanding of what...more
Data mining has increasingly become one of the largest expenses during a cyber incident, often leaving claims professionals with blown budgets and insured clients in high-risk scenarios when assumptions about their data (and...more
Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more
Cyber incidents are increasing in frequency and severity across all businesses and industries. As the saying goes, it’s not a matter of IF but WHEN an incident will occur. In this webinar we will explore ways that you can...more
Cyber liability insurance is becoming more ubiquitous, more unpredictable, and in some cases more confusing than ever, which makes understanding your risk even more critical in 2022. Join Woodruff Sawyer experts Dan Burke,...more
McDermott Will & Emery is hosting a webinar with ON2IT to discuss cybersecurity risk and what has become the prevailing cybersecurity strategy known as “Zero Trust.” The webinar will be a fireside chat between Todd...more
As cyber adversary capabilities, opportunities and sophistication continue to grow, cyber incidents pose a very real, costly and potentially devastating threat to organizations around the world. With today's cyber ecosystem,...more
How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more
Please join us for our annual healthcare compliance seminar to discuss current developments in healthcare regulation and hospital compliance... Registrants will have the option of selecting the sessions they would like to...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more