8 Key Takeaways | Strategies to Drive Influence With and Without Authority
Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Podcast - Talking Sickle Cell Trait with NFL Wide Receiver Ty Montgomery and Dr. Anjulika Chawla, MD, FAAP
Meritas Capability Webinar - Legal Cannabis and the Health Care Industry
[WEBINAR] Planning in the Coastal Zone
A Marketing Platform That Matches the Type of Firm - Faegre Baker Daniels + ON24
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
Join us for a timely and topical webinar hosted by Ice Miller, LLP, discussing cybersecurity collaboration and information sharing in the defense industrial base. The webinar also will feature a robust discussion of best...more
Cybersecurity is integral to protecting sensitive information, ensuring regulatory compliance, managing financial risks, maintaining reputation, ensuring business continuity, gaining a competitive advantage, adapting to...more
During the first half of this webinar, Jen Mitchell, Bryan Murray and Laura Fryan, will focus on practical tips and pointers on avoiding a HIPAA breach and what lessons you can take away from the Change Healthcare breach. ...more
We invite you to join us for an insightful webinar on Best Practices in Cyber Preparedness for Government Contractors and Critical Infrastructure Operators on Wednesday, October 23, 2024, from 12:00 p.m. – 1:00 p.m. EDT....more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
Kennedys and CYPFER are delighted to invite you to our 60 minute webinar on Tuesday, June 4, 2024. We will explore the practical and legal implications involved in navigating a ransomware event, and how decision-making in a...more
In today's digital world, organizations are increasingly vulnerable to a wide variety of cyber threats that can wreak havoc on their operations, jeopardize the security of confidential information, negatively impact...more
Join us for a pivotal journey into the heart of cybersecurity response with Industry Experts Dr. Jack Dever, JD, LLM, SJD, CEO and James Álvaro Dever, Esq., Principal at Lockhaven Solutions, LLC....more
Join us for an exciting online event that explores the challenges and risks associated with the new work from home reality in the professional services industry. Discover how professionals are adapting to remote work and...more
Learning Objectives: - Overview of current US privacy/cybersecurity laws and regulation - Current cyber threats: overview of recent trends in cyberattacks and risk areas for healthcare providers - Incident Response: how...more
Join Industry experts Florian Spindler, Manager at KPMG, Claudia Howe, Executive Director of GRC Solutions at Mitratech, and Henry Umney, Director of GRC Strategy at Mitratech as they explore 2023’s current cyber risk...more
GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more
General and specialty compliance training from the comfort of your home or office! HCCA’s Regional Healthcare Compliance Conferences provide practitioners with virtual compliance training that includes updates on the...more
HR employees are, willingly or not, the guardians of the company’s most sensitive collection of data—its employee’s personal information. Cybercriminals often perceive the human resources department as the perfect gateway...more
Learning Objectives: - Participants will have a better understanding of how the cyber and digital threat landscape has evolved over the past five years. - Participants will have a better understanding of what...more
A roundtable discussion with top cybersecurity and industry experts - Cybersecurity needs to be at the forefront of any business, but particularly for those who work in the legal sector. Cybersecurity threats are not only...more
In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more
Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more
McDermott Will & Emery is hosting a webinar with ON2IT to discuss cybersecurity risk and what has become the prevailing cybersecurity strategy known as “Zero Trust.” The webinar will be a fireside chat between Todd...more
As cyber adversary capabilities, opportunities and sophistication continue to grow, cyber incidents pose a very real, costly and potentially devastating threat to organizations around the world. With today's cyber ecosystem,...more
With almost daily news of top firms impacted by data breaches or ransomware attacks, there is no doubt that effective cybersecurity and data privacy are essential to any business. And small businesses are not immune....more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
The transformation to a work from home/work from anywhere model has become the new normal and even after the pandemic ends, many expect that model to continue. This accelerated transition has forced companies to embrace...more
Faced with the resurgence of cyberattacks in our newfound era of dependence on teleworking, our team is primed to guide you through the fraught aftermath of a cyber attack: Our team will discuss: - how to come back to the...more
How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more