Insights2019-09-23T16:12:26-06:00

Insights

Our Blog

Get the latest industry news, Prescient expert insights, and investigation techniques here!

  • Smartphone app on the screen

Ephemeral Communications Compliance

Nearly every organization in the world is concerned about data. More specifically, they’re concerned with how they store and share information internally and externally while maintaining security. Even with small amounts of data, this is no small task in our ever-connected world. This is one of the reasons ephemeral messaging has become so popular for both business and personal use.

  • Technological and Analytic Solutions to Address Evolving Due Diligence Requirements

Keeping Up with the Pace of Regulations: How Lawyers Can Best Use Technology

On September 25th, 2019, Prescient’s Associate Director of Communications, Asha Underiner, presented at the 2019 International Bar Association held in Seoul, South Korea on the topic “Technological and Analytic Solutions to Address Evolving Due Diligence Requirements.” Along with Juliet Tainui Hernandez, Partner, Chief Compliance Officer at Norton Rose Fulbright LLP; Valentina Zoghbi, Head of Compliance at CMS; Simon Davis, Head of Commercial Litigation at Clifford Chance; Richard Harrison, Partner, Head of Lawyers’ Liability at Clyde & Co; and Sun Hee Kim, Partner at Yulchon, Asha contributed to a panel titled “The Role of Artificial Intelligence (AI) and other New Technologies in supporting compliance and helping compliance and in-house teams work smarter.” The following reflection represents a continuation of the topics discussed during the meeting.

Continuous Diagnostic & Monitoring Program Brings Together Cyber Experts

The Continuous Diagnostic & Monitoring (CDM) Program is a multi-agency platform and initiative to identify and predict which techniques, models, and emerging technologies cybercriminals and attackers are currently leveraging and will be exploiting in the future. The CDM Central conference will discuss several public and private sector efforts to establish security beyond perimeters, safeguard mobile devices, and protect sensitive data in the cloud. The objective is to pinpoint tactical and strategic risk coordinates for successful risk management in “Navigating the Cyber Roadmap”.

Ephemeral Communications Compliance

Nearly every organization in the world is concerned about data. More specifically, they’re concerned with how they store and share information internally and externally while maintaining security. Even with small amounts of data, this is no small task in our ever-connected world. This is one of the reasons ephemeral messaging has become so popular for both business and personal use.

Keeping Up with the Pace of Regulations: How Lawyers Can Best Use Technology

On September 25th, 2019, Prescient’s Associate Director of Communications, Asha Underiner, presented at the 2019 International Bar Association held in Seoul, South Korea on the topic “Technological and Analytic Solutions to Address Evolving Due Diligence Requirements.” Along with Juliet Tainui Hernandez, Partner, Chief Compliance Officer at Norton Rose Fulbright LLP; Valentina Zoghbi, Head of Compliance at CMS; Simon Davis, Head of Commercial Litigation at Clifford Chance; Richard Harrison, Partner, Head of Lawyers’ Liability at Clyde & Co; and Sun Hee Kim, Partner at Yulchon, Asha contributed to a panel titled “The Role of Artificial Intelligence (AI) and other New Technologies in supporting compliance and helping compliance and in-house teams work smarter.” The following reflection represents a continuation of the topics discussed during the meeting.

Continuous Diagnostic & Monitoring Program Brings Together Cyber Experts

The Continuous Diagnostic & Monitoring (CDM) Program is a multi-agency platform and initiative to identify and predict which techniques, models, and emerging technologies cybercriminals and attackers are currently leveraging and will be exploiting in the future. The CDM Central conference will discuss several public and private sector efforts to establish security beyond perimeters, safeguard mobile devices, and protect sensitive data in the cloud. The objective is to pinpoint tactical and strategic risk coordinates for successful risk management in “Navigating the Cyber Roadmap”.

View All Blogs

Latest Case Studies & Whitepapers

View All Case Studies