Cybersecurity & Privacy (CLE)

Preparing for Cybersecurity Maturity Model Certification (CMMC): A Guide to Accelerating Your Compliance Efforts

2021-05-06T22:18:38-04:00

2021 brings new and stricter cybersecurity requirements to all organizations within the supply chain to the US Department of Defense (DoD). Cybersecurity Maturity Model Certification (CMMC), a program to curb the theft of sensitive defense information by foreign adversaries, begins its rollout this year, as do stricter measures to enforce compliance with existing cybersecurity requirements.  Compliance, and ultimately certification by an independent third-party auditor or CMMC Third-Party Assessment Organization (C3PAO) will become a pass-fail requirement for companies to do business with the DoD.

A Practical Guide in Drafting Data Privacy and Security Agreements: Mitigating Data Security Breach Risks

2022-12-28T00:11:16-05:00

Contract provisions regarding data privacy and security have become crucial because of the recent upsurge of cybersecurity threats and breaches. These risks have underscored the need for every business to implement strong and effective data management programs to avoid further financial and reputational losses associated with cyberattacks. However, the stream of new privacy laws and the varying jurisdictions have brought complexities to this effort.

The Right Stuff: Deploying Modern Analytics for Today’s Critical Data Challenges

2021-11-17T22:05:20-05:00

Much has been said about exploding data volumes and emerging data types as technology evolves, contributing to the ever-growing challenges for legal professionals. However, less attention has been paid to the equally powerful analytics tools that have emerged as AI continues to advance. To master a new era of data—defined by its complex variety, growing volume, increased velocity, and challenging veracity—teams need the right analytics solutions. In this panel discussion, experts Mark Noel, Director, Advanced Client Data Solutions of Hogan Lovells, Sam Sessler, Assistance Director of Global eDiscovery Services at Norton Rose Fulbright, Bradley Johnston, Senior Counsel, eDiscovery of Cardinal Health, and Paige Hunt, Vice President of Global Discovery Solutions at Lighthouse, will discuss emerging trends in analytics tools and provide best practices for utilizing them to tackle urgent data challenges.

Storage & Backup Security; The Final Frontier
Threat Landscape, Industry Readiness, and Practical Advice

2022-10-12T02:05:11-04:00

Along with the digitization of many business processes, companies need to address the various cyber threats today’s landscape presents. If not properly managed, these cyber risks could lead to significant IT outages, eventually crippling business operations. As ransomware – and other cyberattacks – become more sophisticated, it further underscores the need for security teams to advance their vulnerability management programs to ensure that any susceptibility to cyberattacks is proactively detected and repaired, and their data storage systems are secure and impenetrable.

Leveling Up Your Cybersecurity with Zero Trust: A Holistic Approach Against Today’s Threats

2021-06-13T23:20:52-04:00

In today’s business climate where sophisticated cyberattacks continue to challenge organizations, cybersecurity programs must be anchored around the “zero trust” principle. This approach is a security scheme designed to ensure that critical assets are accessed by authenticated and authorized users only, preventing potential outside and inside threats.

Preventing Ransomware Attacks: A Practical Guide to Enhancing IT Security and Resiliency

2023-01-02T21:43:38-05:00

Most, if not all, of today's businesses are turning to technology to improve the productivity of their business processes. While such an undertaking provides opportunities to increase the bottom line, the risks of sophisticated ransomware attacks that come along with it should never be ignored. Cybercriminals are here to stay with new tactics and strategies to hostage highly significant business data. If not properly addressed, ransomware attacks can result in significant technical, financial, and reputational damages.

Go to Top