Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.
Countless organizations have devoted considerable amounts of resources and time building cybersecurity defenses in the last decade. However, efforts to build secure supply chain networks have only begun in recent years. Indeed, it was not until the April 2021 compromise of SolarWinds software that led to a swath of intrusions across government entities and various industries that attacks on supply chain networks became a common concern within the C-Suite. The heightened threat to distribution networks compelled attorneys, among other professionals, to rethink how best to protect existing infrastructure and allocate risks. This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.
*May exclude premium content
By Kim Peretti, Dan Felz and Alysa Austin
Part One of a Two-Part Article
Despite the steady growth of global AI adoption, there is no comprehensive federal legislation on AI in the United States. Instead, the U.S. has a patchwork of various current and proposed AI regulatory frameworks. It is critical for organizations looking to harness this novel technology to understand these frameworks and to prepare to operate in compliance with them.
By Jessica Robinson and Amit Dungarani
Part 2 of a Two-Part Article
Part 1 of this article discussed approaches to managing second requests using core project management principles that allow you to control the timeliness, cost, and quality of your organization’s response. This follow-up looks at the pragmatics of strategizing and executing a successful plan.
By Christine Au-Yeung and Chidera Dawodu
The recent flurry of online impersonators, ranging from accounts posing as President Joe Biden to the pharmaceutical company Eli Lilly, exposes the challenges of social media platforms’ verification and authentication processes. These events show that monitoring and policing trademark infringements and right of publicity violations can be increasingly difficult in the social media context.
By Anthony Davies
We're seeing is a variety of successful measures that are designed to help attorneys get what they want: a best-of-both worlds scenario where they keep some work-from-home and fold-in an opportunity to intentionally connect and collaborate with colleagues in the office.