Features
Vendor Risk Management for Law Firms: 7 Steps to Success
Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a never-ending cycle of evaluation, best-practices review, and implementation. Firms don't just need to have their own systems secured; a responsible firm must also reduce the risk of breach at their third-party vendors. As cloud service providers become commonplace, so too does a firm's responsibility to ensure their vendors are managing risk appropriately.
Features
How Law Firms Can Prepare for FinTech Wave
<i><b>The Innovations and Industry Disruption Should Have Law Firms Snapping to Attention</b></i><p>The world of financial services is being upended by new technologies — from virtual currencies and blockchain to peer-to-peer lending and enhanced mobile banking — that are capturing customers, as well as the attention of Wall Street investors and industry regulators.
Features
You're Going to Need a Bigger Boat
<b><i>Small Law Firms Face Large Regulatory Requirements</b></i><p>Unlike large firms with comparable resources with which to protect client non-public information, small firms can find themselves trapped between cyberattacks, like ransomware, that don't prejudice based on the size of firm, and regulators who are indifferent to your size, when investigating a potential violation.
Features
Founders of Cryptocurrency-Focused Tech Company Face Federal Fraud Charges
Two heads of a tech company that raised tens of millions through an initial coin offering for what was sold as the world's first multi-blockchain debit card now face federal civil and criminal charges for allegedly defrauding investors.
Features
The Power of Certifications In the Legal Industry
<b><i>Part One of a Two-Part Article</b></i><p>The key paths and the corresponding certifications available for lawyers — and nonlawyers — to pursue to help successfully administer a career in the legal industry in the coming decade.
Features
Key Tech Terms to Know: Archives, Backups, Disaster Recovery and “as-a-Service”
A few essential definitions, intended to provide clarity and guidance to firms that are exploring how to improve their data compliance, protection and recovery posture.
Features
<i>E-Discovery:</i> Streamlining the Admissibility of ESI: Amendments to Federal Rule of Evidence 902
The new provisions of F.R.E. 902 bring the rule into the digital age, streamlining the process of authenticating electronically stored information and admitting it into evidence.
Features
SEC Releases New Guidance on Cybersecurity Disclosures and Controls
On Feb. 21, 2018, the SEC voted unanimously to approve a statement and interpretive guidance to assist the public in preparing disclosures about cybersecurity risks and incidents. The new guidance expands upon previous guidance provided in October of 2011.
Features
<i>A Roundtable Discussion:</i> How Evolving Media Types and Cybersecurity Concerns Are Impacting e-Discovery
In this roundtable discussion, two law firm partners and two GCs share their experience and insight on the evolving nature of e-discovery and its intersection with AI, cybersecurity and privacy.
Features
Cyber Risk Assessments are a Critical Component of All Cybersecurity Programs
Many companies remain overwhelmed by the prospect of developing a cybersecurity program. Too many still see cyber crime as an IT issue, and simply defer to that department. Cybersecurity is most definitely an information security issue and it must be treated as such. Failure to recognize this concept almost ensures a weak cybersecurity program that remains highly vulnerable to breaches.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- When It Comes to Trademark Searches, AI Misses the MarkArtificial intelligence tools powered by large language models have become valuable resources in the trademark process. Despite incredible progress in natural-language reasoning, AI tools still face fundamental limitations when it comes to performing even basic trademark searches. Here are five important reasons why.Read More ›
