Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Year after year, security experts have raised the alarm regarding the threat of ransomware, and yet it continues to be the leading cause of security breaches. At BakerHostetler, our incident response team continues to see organizations of all sizes and in every industry fall victim to this threat. But what has been fueling the rapid growth and spread of ransomware?
*May exclude premium content
Plan to Protect: Cybersecurity for Employees Before Day One
By Luke Tenery and Daron Hartvigsen
With new employees come new risks; from aspiring insider threats that intend to join a target to extract sensitive information, to insecure processes being exploited due to too much trust being placed in candidates and new hires.
Preparing Companies for Impending Data Privacy, Cybersecurity Changes
By Sarah F. Hutchins
Failing to pay attention to shifting data privacy and security regulations can be costly. Here’s an overview of what’s been happening — and what’s likely to happen next — in the world of data privacy and security.
AI Considerations for In-House Counsel
By Charmian Aw, Diletta De Cicco, Annette Demmel, Charles-Albert Helleputte, Kyle Fath, Alan Friel, Julia Jacobson, Bartolome Martin and David Naylor
Having an AI policy that outlines acceptable use, and documenting assessments that establish that AI systems are used in a manner consistent with the policy and that the benefits outweigh potential harms, can go a long way in managing legal and reputational risk.
4 Pitfalls To Avoid In Legal Operations (and How to Deal With Them)
By Brian Corbin
For legal stakeholders seeking to take their existing legal operations programs to the next level or start new programs from scratch, there are a few all-too-easy traps that can stunt growth, cost political capital and cause headaches. Having a strategic plan, budget and critical executive buy-in is not enough to avoid these four common issues.