With 15+ years in the field, Matt serves as VP of Security and CISO at Drata, leading global security, IT, GRC, and privacy initiatives. "Privacy by Design" is a ...
Align privacy and security objectives with business needs Embed privacy by design and default Engage stakeholders early and maintain transparency throughout the process Minimize data collection and ...
We construction lawyers are striving to keep up with the breakneck pace of technological adoption and evolution and develop ...
We collaborate with the world's leading lawyers to deliver news tailored for you. Sign Up for any (or all) of our 25+ Newsletters. Some states have laws and ethical rules regarding solicitation and ...
We all have a role to play in protecting Harvard Business School’s (HBS’s) data and systems—and our own. Practicing good security habits is always important, especially so in times of heightened risk.
When Connecticut Attorney General William Tong described granting the Department of Government Efficiency (DOGE) access to Treasury Department records as potentially the largest data breach in ...
The amount of data being collected, processed, and stored in vehicles is exploding, and so is the value of that data. That raises questions that are still not fully answered about how that data will ...
Imagine an AI system that predicts your shopping habits or medical conditions with stunning accuracy. These advancements rely on AI processing huge datasets, which often include sensitive personal ...
As Elon Musk’s Department of Government Efficiency has promoted cuts across the federal government, it has remained quiet about a central tenet of its work: access to personal, sensitive data on ...