Features
Q&A with Women Leaders in Cybersecurity and Privacy
In 2017, Atlanta attorney Bess Hinson founded the Atlanta Women in Cybersecurity Roundtable, an invitation-only initiative to provide community and resources to advance women in cybersecurity in Atlanta. Here, we speak with some of those women leaders about their biggest security and privacy challenges and why women are pursing legal and other roles in the cybersecurity and privacy field.
Features
Are Cybersecurity Solutions and Consulting a New Revenue Stream for Law Firms?
The Big 4 accounting firms have identified legal services as an area for growth beyond traditional financial services and consulting services.
Features
Detecting, Discovering, and Eliminating Threats
Defending your corporation from advanced cyber threats is a difficult and never-ending challenge. The attack surface of an organization is constantly adapting to meet the needs of a business and attack vectors are increasing nearly every few hours.
Features
Fighting Biometric Fraud on the Blockchain
The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.
Features
The Confounding Paradox of Marketing Investment for Struggling Law Firms
"You have to spend money to make money." Or, so holds the well-worn cliché. For those firms struggling to find meaningful growth in today's market, where do they find the funds they need to spend in order to spur growth?
Features
Professional Development: 10 Performance Tips for Your Presentation
Finally, it has happened. You have reached the stage in your career that others want to hear from you and learn what you know in your area of expertise. You have been invited to speak at a conference. What now?
Features
Federal Data Privacy Legislation Is Likely Next Year, Tech Lawyers Say
For Years, Federal Legislators Have Attempted to Pass Comprehensive Cybersecurity and Data Privacy Legislation. With More Support Than Ever from the Public, Industry and Both Sides of the Political Spectrum, 2019 May Be the Year When Such Legislation Is Enacted.
Features
10 Common Mistakes When Dealing With DOJ Antitrust Criminal Prosecutors
Corporate counsel should be aware of the following 10 common mistakes that practitioners make when representing clients in criminal antitrust matters.
Features
Prepping a Mock Notification Letter Before a Cybersecurity Breach Hits
Being prepared for the worst before it even happens can minimize the damage in the event of a cybersecurity incident. To get any company ready for a cybersecurity event, the first step is to organize a team to write a mock breach notification letter that will represent your message to the world about your failure in the event you have a breach.
Features
What to Consider When Drafting Renewal and/or Expansion Terms in Arbitration Clauses
Navigating through a murky arbitration clause is no easy feat. Assuming familiarity with the basics, the following is a list of considerations that should prove valuable whether representing the tenant or the landlord.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
- 10 Steps Legal Departments Should Be Taking to Prepare for the SEC's Newly Adopted Cybersecurity Risk Governance Rule for Public CompaniesBy readying your company's cybersecurity program now to comply with the SEC's cyber rules, you will also arm your company with a better defense against cyberthreat actors, reduce the reputational harm that comes along with a cybersecurity incident and increase investor confidence in the company's cybersecurity program.Read More ›
