News & Analysis as of

Webinars Information Security Data Protection

K2 Integrity

[Webinar] Information Leaks: How to Respond, Investigate, and Protect Your Business - June 25th, 9:00 am ET

K2 Integrity on

Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more

Health Care Compliance Association (HCCA)

[Webinar] Mending the Fence: How State Privacy Laws are Closing the Gap on Health Consumer Privacy - June 18th, 12:00 pm - 1:30 pm...

Learning Objectives: - Explain the evolution of state data protection laws over the past year - Explore the focus on protecting health consumers - Describe practical approaches on how to build a privacy program when...more

HaystackID

[Webinar] From Breach to Insight: Incident Response & PII Recovery - May 29th, 12:00 pm EDT

HaystackID on

With escalating cyber risks and heightened regulatory scrutiny, every minute after a data breach is crucial. Sophisticated cybercriminals relentlessly target your organization’s most valuable asset: personally identifiable...more

Ankura

[Webinar] CMMC – Practical Solutions to Managing and Securing CUI Data, Perspectives of a Foreign Defense Contractor - November...

Ankura on

Currently defense contractors who receive or create Controlled Unclassified Information (“CUI”) from or for the U.S. Department of Defense (“DoD”) are subject to several contract-based cybersecurity requirements, including...more

EDRM - Electronic Discovery Reference Model

[Webinar] Cyber Sidebar: The NIST Cybersecurity Framework Applied to the Legal Profession - November 15th, 1:00 pm - 2:15 pm ET

The legal profession is under constant threat of cyberattacks and breaches. Cybersecurity challenges exist in many contexts but the legal profession is particularly vulnerable due to its federated environment and disparate...more

Venable LLP

[Webinar] CFPB Weighs in on Data Security; Will Firms with Poor Security Be in the Crosshairs? - October 14th, 1:00 pm - 2:00 pm...

Venable LLP on

In the late summer, the Consumer Financial Protection Bureau (CFPB) issued a circular that concluded in no uncertain terms that insufficient data protection or information security could be considered an unfair practice under...more

U.S. Legal Support

[Webinar] Culture of Confidentiality: How to ensure your external vendors are mitigating cybersecurity risk - July 20th, 10:00 am...

U.S. Legal Support on

Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more

Society of Corporate Compliance and Ethics...

[Webinar] Effective Use of Privacy Impact Assessments - September 13th, 12:00 pm - 1:30 pm CDT

Learning Objectives: - What is a PIA and a DPIA? - Who should instigate assessments? - How and when to use assessments? - The relationship between assessments and privacy by design, and legal grounds for processing...more

Husch Blackwell LLP

[Webinar] U.S. Privacy Law Update: Analyzing the Colorado Privacy Act - June 15th, 11:00 am - 12:00 pm CDT

Husch Blackwell LLP on

The Colorado legislature just passed the Colorado Privacy Act (CPA). Once signed by the Governor, Colorado will become just the third state – after California and Virginia – to enact broad consumer data privacy legislation....more

Vinson & Elkins LLP

[Webinar] Navigating Privacy Rules in a Virtual World - June 17th, 10:00 am - 11:00 am PT

Vinson & Elkins LLP on

The transformation to a work from home/work from anywhere model has become the new normal and even after the pandemic ends, many expect that model to continue. This accelerated transition has forced companies to embrace...more

McDermott Will & Emery

[Webinar] Cybersecurity & Ransomware: How To React? - June 8th, 9:30 am CEST

McDermott Will & Emery on

Faced with the resurgence of cyberattacks in our newfound era of dependence on teleworking, our team is primed to guide you through the fraught aftermath of a cyber attack: Our team will discuss: - how to come back to the...more

Spirit Legal

[Webinar] Datenintensive Technologien und Anwendungen rechtskonform gestalten - March 25th, 9:30 am - 3:00 pm CET

Spirit Legal on

Gerade für Juristen ist Begeisterung für und ein Verständnis von Branchen, Geschäftsmodellen und Technologien – gerade vor dem Hintergrund des Datenschutzrechts und des Gewerblichen Rechtsschutzes – unerlässlich und...more

NAVEX

[Webinar] Top Risk Management Lessons from the SolarWinds Hack - January 27th, 10:00 am - 11:00 am PT

NAVEX on

Last month there was a cyber-attack suspected to have been perpetrated by Russian hackers. The attack was traced back to third party – a network management software vendor, SolarWinds. Among its 300,000 customers, SolarWinds...more

Husch Blackwell LLP

[Webinar] Privacy Law Update - CCPA 2.0: Analyzing the California Privacy Rights Act - November 10th, 12:00 pm - 1:30 pm CT

Husch Blackwell LLP on

California voters just approved the California Privacy Rights Act (CPRA), which will significantly amend the California Consumer Privacy Act (CCPA). Join us for an in-depth look at the CPRA and how it will change privacy law...more

McDermott Will & Emery

[Webinar] Reasonable Security – Proactive Defense Against CCPA’s Private Right Of Action - November 19th, 11:30 am ET

McDermott Will & Emery on

With the California Consumer Privacy Act (CCPA) effective date of January 1, 2020, fast approaching, businesses subject to California’s new privacy law must come into compliance with a number of new obligations. That burden...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide