You are using an outdated browser. Please upgrade your browser to improve your experience.
1 maart 2023
Welcome to the Investigations Insights podcast. In this podcast series, thought leaders and subject matter experts from our cross-practice Investigations network explore some of the challenges and complexities that specialist investigations work can present, and share best practice and guidance.
donderdag 1 december 2022, 13:00 to 14:00 GMT
With the frequency, scale and cost of cyber attacks growing rapidly, focus on cyber from boards, stakeholders, regulators and the media has never been more acute. Legal teams are, more than ever, being relied on to help their organisations adequately prepare for cyber incidents.
On 1 December 2022 at 13:00 GMT join our team of experts to discuss our essential checklist of tools and practices for cyber preparedness.
The webinar will end with a Q&A session during which you will be able to raise your questions with our speakers.
11 oktober 2021
On October 6, 20201, Deputy Attorney General (“DAG”) Lisa Monaco announced two major Department of Justice (“DOJ”) initiatives—involving both DOJ’s Civil and Criminal Divisions—confirming the DOJ’s commitment to finding and prosecuting cybercrime.
2 september 2021
The SEC is done playing around. This summer it has demonstrated its resolve bringing actions against public companies for alleged poor disclosures, and against SEC registrants for alleged poor cybersecurity controls.
11 juni 2021
President Biden has directed numerous U.S. federal agencies to develop a unified strategy to combat global corruption, which he has identified as a core national security interest. Among other key priorities, the administration’s fight against corruption will focus on the illicit use of cryptocurrencies, cybercrime, and offshore financial secrecy.
17 mei 2021
We look at the shutdown of the US Colonial Pipeline following a ransomware attack and key lessons to learn from this attack.
17 mei 2021
Mainland China’s Cybersecurity Law marks not just heightened security requirements but also a change in approach to the enforcement of data protection laws. We consider the current state of play.