Skip to Content (custom)

Angle

How Thinking Outside Silos Helps Risk Management and Cyber Threat Response

3 Mins

The term “risk” gets tossed around constantly in the corporate world. But who is responsible for defining and managing risk? This answer is not black and white, as risk type and appetite will look different for every organization. What should be a...

Read More

Elevating Cyber Risk Analysis During M&A Due Diligence

4 Mins

Before a deal closes on a merger or acquisition, due diligence investigation will ensue to confirm goal alignment and identify any obstacles present. There are several integral components of this process such as identifying transaction purpose...

Read More

Mandated Cyber and Privacy CLE for New York Attorneys – Will Other States Follow Suit?

3 Mins

The majority of U.S. states require attorneys with active law licenses to complete continuing legal education (CLE) credits. The number of hours, reporting deadlines, and topic requirements differ between jurisdictions. It is not only important...

Read More

Counsel and the Breach Response Lifecycle: Best Practices at Every Stage

3 Mins

The shift to automated business processes and digital data management has definitely been a key enabler for organizations across industries. This fosters more efficient transactions, saves on costs, reduces time spent on projects, and helps...

Read More

Rising Premiums and Ransomware: The Cyber Insurance Balancing Act

5 Mins

With greater potential for data compromises comes a greater need to explore cyber insurance. The dilemma that ensues is that when attack prevalence rises, it heightens risk for both organizations and insurers.

Read More

Data at Your Fingertips? Make Sure You are Prepared for Biometric Data Legislation

6 Mins

Biometric technology data is generated more frequently these days in private and professional settings as authentication methods like fingerprint scanning, facial recognition, and voice recognition are becoming standard on modern devices. Many...

Read More

Tips for Avoiding Hidden Costs in a Cyber Incident Response

6 Mins

Tips for Handling a Cyber Incident Review

5 Mins

A cyber security incident is a stressful and frightening event for an organization’s team. When it comes to putting cyber plans in place, organizations need to prepare for the worst-case scenario since it is no longer a matter of if a breach will...

Read More

Don’t Trust Cupid, Trust the Black Box

7 Mins

Valentine’s Day is here. The holiday is easily recognizable since pink and red cards, chocolates, and stuffed animal menageries appear on displays at your local pharmacy about one week after New Year’s. Often, the day centers on feelings of love...

Read More

Using Case Insights to Improve Litigation Strategy and Manage Costs

6 Mins

Performing an early case assessment (ECA) to help make better litigation strategy decisions is not a new or novel concept. However, with the rise in technology, this process has evolved and become increasingly more valuable to litigation teams...

Read More

ESI and Evidence: Sedona Updates Guidelines on Subpoenas and Admissibility

8 Mins

The world runs on digital. Courts and litigators must understand how digitization can affect their cases. This past October, the Sedona Conference released updated analyses to help legal professionals navigate and adapt to the changes that have...

Read More

Federal Court Firmly Addresses Several Repeat TAR Disputes

7 Mins

Technology assisted review (TAR) continues to revolutionize the way lawyers conduct litigation proceedings, especially as it becomes more economical and accepted as routine practice. TAR refers to advanced predictive coding solutions rooted in...

Read More
Pagination.PreviousPage 1 2 3 4 Pagination.NextPage