Enhancing Compliance: The Power of Independent Monitorships in Consumer Protection — Regulatory Oversight Podcast
Episode 331- NAVEX State of Risk and Compliance Programs
What the Board Should Be Asking About the Compliance Program
Common Scenarios Triggering False Claims Act Violations, Part 3: Claims and Investigations
Compliance into the Weeds: Of Fat Fingers, Internal Controls and Compliance
Vicky Hanks of Blake Morgan on Building an Effective Employee Brand - Passle's CMO Series Podcast
Better Investigative Interviewing
Hot Topics in International Trade
Episode 301 -- Steve Naughton on Compliance and Complaince Education at Loyola Law School Program
Episode 298 -- Electronics Communications Risks and Ephemeral Messaging
Episode 297 -- Susan Divers on LRN's 2023 Program Effectiveness Report
The Justice Insiders Podcast: SEC Plays Chicken with Jarkesy
JONES DAY TALKS®: The Evolution of Corporate Compliance Programs: Key Issues for Multinational Companies
Compliance & Disaster Preparedness
Compliance Series Part 3: Ensuring Compliance Programs are Effective
Compliance Programs Part 2: Designing a Successful Compliance Program
Compliance Programs Part 1: What is a Compliance Program and Why do Businesses Need One?
Law Firm ILN-telligence Podcast: Episode 73: Daniel García Piñeros, Gamboa, García & Cardona Abogados
Episode 284 -- How to Implement a Compliance Compensation System
Episode 276 -- Review of Phillips and Franks Int'l SEC FCPA Settlements
Judge Engelmayer’s 107-page dismissal of most of the U.S. Securities and Exchange Commission (SEC)’s claims against SolarWinds provides valuable guidance, and some comfort, for public companies and Chief Information Security...more
Last month, the SEC announced another enforcement action emphasizing the need for early disclosure of cybersecurity events. In the recent action, the company had taken three weeks to act on internal alerts of malware on its...more
Lately, I have been asked a lot about security in Business Central and how good it is… Permissions, Roles, Field Level Permission with an APP, and so on. How do you know if anything has been compromised, or if you have a...more
When planning for disasters, organizations are typically focused on things like call trees, backup data servers, and alternative work locations. In the crush to survive the immediate threat it’s easy to forget about...more
Recently, the Financial Crimes Enforcement Network (FinCEN), a bureau of the U.S. Treasury Department, released a report on ransomware trends stating that during the first half of 2021, 68 different ransomware variants...more
A ransomware attack is a major threat affecting all sectors of business, including healthcare. Organizations typically follow state and federal privacy laws as part of their ransomware prevention and response measures....more
Compliance teams looking to stay ahead of the changing landscape need to be up to date on the latest developments. Join us for Global Compliance Updates in collaboration with the DIFC Academy, on 2–3 November 2021. This...more
There has recently been a rash of similar anonymous whistleblower tips to public companies, each claiming that an unnamed company supervisor boasted about reaping profits from insider trading. The number of public companies...more
How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more