Prescient

Home > Archives for Prescient

About Prescient

This author has not yet filled in any details.
So far Prescient has created 53 blog entries.

Ephemeral Communications Compliance

Nearly every organization in the world is concerned about data. More specifically, they’re concerned with how they store and share information internally and externally while maintaining security. Even with small amounts of data, this is no small task in our ever-connected world. This is one of the reasons ephemeral messaging has become so popular for both business and personal use.

By |2019-10-17T14:46:39-06:00October 25th, 2019|Cyber|0 Comments

Keeping Up with the Pace of Regulations: How Lawyers Can Best Use Technology

On September 25th, 2019, Prescient’s Associate Director of Communications, Asha Underiner, presented at the 2019 International Bar Association held in Seoul, South Korea on the topic “Technological and Analytic Solutions to Address Evolving Due Diligence Requirements.” Along with Juliet Tainui Hernandez, Partner, Chief Compliance Officer at Norton Rose Fulbright LLP; Valentina Zoghbi, Head of Compliance at CMS; Simon Davis, Head of Commercial Litigation at Clifford Chance; Richard Harrison, Partner, Head of Lawyers’ Liability at Clyde & Co; and Sun Hee Kim, Partner at Yulchon, Asha contributed to a panel titled “The Role of Artificial Intelligence (AI) and other New Technologies in supporting compliance and helping compliance and in-house teams work smarter.” The following reflection represents a continuation of the topics discussed during the meeting.

By |2019-10-17T14:54:22-06:00October 18th, 2019|Due Diligence|0 Comments

Continuous Diagnostic & Monitoring Program Brings Together Cyber Experts

The Continuous Diagnostic & Monitoring (CDM) Program is a multi-agency platform and initiative to identify and predict which techniques, models, and emerging technologies cybercriminals and attackers are currently leveraging and will be exploiting in the future. The CDM Central conference will discuss several public and private sector efforts to establish security beyond perimeters, safeguard mobile devices, and protect sensitive data in the cloud. The objective is to pinpoint tactical and strategic risk coordinates for successful risk management in “Navigating the Cyber Roadmap”.

By |2019-10-24T09:39:47-06:00October 9th, 2019|Cyber|0 Comments

A Brief History of Corporate Espionage

In the early 1700s, a French Jesuit missionary in China sent detailed porcelain manufacturing information back to France. In the 1800s, the British East India Co. hired Robert Fortune, a Scottish botanist, to travel to China and smuggle tea to help India gain a competitive edge in the tea market. And in 2018 and 2019, two Apple Inc. engineers were accused of stealing valuable trade secrets (photos and electronic files) related to Apple’s autonomous car program, Project Titan. Clearly, just as business has changed along with the technology we use daily, so too have the methods of spying. But the essence of corporate espionage–known also as industrial or economic espionage–remains unchanged.

By |2019-10-07T16:14:12-06:00September 27th, 2019|Investigations|0 Comments

Elizabeth Holmes & Theranos: From Innovator to Fraudster

When it comes to technological breakthroughs, the focus remains on paradigm shifts: everyone wants to take part in the next big thing, the next breakthrough that will revolutionize the way that the world works. As the self-styled Steve Jobs of the healthcare industry, Elizabeth Holmes promised investors this degree of innovation with her startup, Theranos. Years later, with Holmes’ criminal trial date announced for the summer of 2020, her Silicon Valley debacle creeps back into the national spotlight, positing her as a fraud rather than an innovator.

By |2019-10-07T16:15:55-06:00September 20th, 2019|Due Diligence|0 Comments

Hindsight is 20/20: How-to Avoid Investing in a Soon-to-Fail Startup

It’s no secret that many of the tech industry’s current giants had humble beginnings as small startups in dire need of financial support from investors. Just the opposite, in fact: once a firm is more established, an underdog story of early self-sufficiency can make for a great marketing campaign about passion, ambition, and leadership coming together to create a service or product - with the help of a little seldom-mentioned outside funding.

By |2019-10-07T16:19:26-06:00August 30th, 2019|Due Diligence|0 Comments