Technology

HIPAA Security Rule and Security Risk Management: Addressing Threats and Vulnerabilities During the Pandemic

2021-03-26T04:21:46-04:00

The security risk analysis and management obligations required by the Health Insurance Portability and Accountability Act (HIPAA) Security Rule are intended to play a crucial role in mitigating risks and vulnerabilities to the security and confidentiality of patient protected health information (PHI). Organizations that fail to implement these measures may be more susceptible to potential PHI breaches and could be confronted with costly regulatory fines.

Cyber Insurance in Commercial Contracts: What You Must Know and Do

2021-03-22T23:57:26-04:00

Cyber insurance has been valuable in covering non-physical losses in commercial contracts. Significantly, as cases of cyber threats continue to proliferate, many contracts now contain a sub-clause on cyber coverage which protects businesses from damages brought by data breaches and computer attacks. Cyber insurance also provides coverage for regulatory investigations as well as for third-party claims.

Why Document Automation is Stalling Your Digital Transformation

2021-03-23T01:01:30-04:00

At the onset of the COVID-19 pandemic, many organizations were forced to make the shift to virtual operations. With very short notice, companies had to adopt digital processes to meet new consumer needs and accommodate a digital workforce. This sudden change has left many businesses in a digital transformation limbo with some critical business processes converted into digital workflows while other processes remain paper-based.

How to Mitigate and Manage Third-Party Risks: Leveraging Tools and Best Practices

2023-01-18T01:23:39-05:00

In this LIVE Webcast, a panel of thought leaders and professionals brought together by The Knowledge Group will provide and present an in-depth analysis of the fundamentals as well as recent developments in How to Mitigate and Manage Third-Party Risks: Leveraging Tools and Best Practices. Speakers will also present all important issues surrounding this significant topic. Join us for this Knowledge Group Webinar!

Preparing for Cybersecurity Maturity Model Certification (CMMC): A Guide to Accelerating Your Compliance Efforts

2021-05-06T22:18:38-04:00

2021 brings new and stricter cybersecurity requirements to all organizations within the supply chain to the US Department of Defense (DoD). Cybersecurity Maturity Model Certification (CMMC), a program to curb the theft of sensitive defense information by foreign adversaries, begins its rollout this year, as do stricter measures to enforce compliance with existing cybersecurity requirements.  Compliance, and ultimately certification by an independent third-party auditor or CMMC Third-Party Assessment Organization (C3PAO) will become a pass-fail requirement for companies to do business with the DoD.

Essentials of an Effective Third-Party Risk Management Framework: A Practical Guide

2022-09-21T01:17:32-04:00

Establishing effective third-party vendors has been at the forefront of business development strategies today. With the current remote workforce setup, the importance of having efficient vendors to streamline complex business processes has been underscored, and more companies started depending on several third-party software to help with their operations. This growing reliance on vendors and other service providers, however, has opened newer risks of breaches and has intensified the call for organizations to employ a third-party management framework that is not only effective, but is also holistic.

A Practical Guide in Drafting Data Privacy and Security Agreements: Mitigating Data Security Breach Risks

2022-12-28T00:11:16-05:00

Contract provisions regarding data privacy and security have become crucial because of the recent upsurge of cybersecurity threats and breaches. These risks have underscored the need for every business to implement strong and effective data management programs to avoid further financial and reputational losses associated with cyberattacks. However, the stream of new privacy laws and the varying jurisdictions have brought complexities to this effort.

The Right Stuff: Deploying Modern Analytics for Today’s Critical Data Challenges

2021-11-17T22:05:20-05:00

Much has been said about exploding data volumes and emerging data types as technology evolves, contributing to the ever-growing challenges for legal professionals. However, less attention has been paid to the equally powerful analytics tools that have emerged as AI continues to advance. To master a new era of data—defined by its complex variety, growing volume, increased velocity, and challenging veracity—teams need the right analytics solutions. In this panel discussion, experts Mark Noel, Director, Advanced Client Data Solutions of Hogan Lovells, Sam Sessler, Assistance Director of Global eDiscovery Services at Norton Rose Fulbright, Bradley Johnston, Senior Counsel, eDiscovery of Cardinal Health, and Paige Hunt, Vice President of Global Discovery Solutions at Lighthouse, will discuss emerging trends in analytics tools and provide best practices for utilizing them to tackle urgent data challenges.

How to Effectively Protect Sensitive Data: A Comprehensive Guide

2021-12-10T00:28:56-05:00

Today's digitally-dependent market requires businesses to store all sorts of data into their systems. From simple day-to-day transactions and records to the most sensitive company and client data, business processes have now evolved in order to accommodate and effectively implement the complex nature of data protection. Adding to these complexities is the increasing number of data breaches which was driven by the abrupt cloud migration when the pandemic started.

Go to Top