Why Privacy is Your Secret Weapon Against Third-Party Risk
Due Diligence in AI: 3 things you need to survive AI scrutiny
Enhancing Compliance: The Power of Independent Monitorships in Consumer Protection — Regulatory Oversight Podcast
Investigations and Cognitive Interviews
Consumer Finance Monitor Podcast Episode: Regulators Escalate Focus on the Risks of Bank Relationships with Fintechs and Other Third Parties
Fraud Prevention Techniques for Nonprofit Organizations - Part 3
AGG Talks: Women in Tech Law Podcast - Episode 4: Preparing for a Transaction? What Emerging Growth Companies Need to Know
Meeting the Needs of General Counsel: Beyond the Basics of Legal Advice - On Record PR
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
A Third Party's Perspective on Third Party Risk
Why Time Matters: Partners Lindsay Gerdes and Michael J. Bronson on Swift Action in Government Investigations
Consumer Finance Monitor Podcast Episode: Why do Fintechs Want to Become Banks?
Privacy Issues from Third-Party Website Tags
What's the Tea in L&E? Employee Devices: What is #NSFW?
Episode 331- NAVEX State of Risk and Compliance Programs
What the Board Should Be Asking About the Compliance Program
Video: Artificial Intelligence Use in Political Campaigns
Episode 329 -- Bryn Sedlacek from Aravo on TPRM Holistic Risks and Unified Visibility
Compliance Lessons from Dating in Your 50s
The Justice Insiders Podcast - AI-Washing: Everything Old Is New Again
The US Department of Justice (DOJ) recently issued a Statement of Interest that underscores the need for careful evaluation of every survey and other information exchange managed by trade associations for the unique risks to...more
In the weeks following a defective software update that disrupted several industries globally, including financial services, aviation, retail, and emergency services, remediation efforts remain ongoing while organizations...more
On August 15, 2024, the Department of Defense (DOD) announced the much-anticipated Proposed Rule that would amend the Defense Federal Acquisition Regulation Supplement (DFARS) to include Cybersecurity Maturity Model...more
More than 20 storms—11 of which will become hurricanes, and 5 of which will become Category 3 or greater hurricanes. That's one prediction for the Atlantic hurricane season. Not to worry, you say. Your operations are located...more
On May 14, Outfox Hospitality LLC, the parent company of the retail chain Foxtrot Market, along with its affiliates, filed for Chapter 7 bankruptcy protection in the Bankruptcy Court for the District of Delaware, with the...more
While OFAC’s enforcement actions and guidance points to important steps exporters must take when relying on third-party distributors and other intermediaries, the “reason to know” and affirmative obligations to monitor resale...more
Regulators have sent numerous messages that companies who source from abroad need to subject their entire supply chain to extensive due diligence, based on state-of-the-art compliance measures to minimize supply chain risks....more
The sheer proliferation of supply chain transparency and accountability regulations at international scale itself warrants a closer look at the level of scrutiny required of organizations with complex, multi-faceted, global,...more
Hosted by American Conference Institute, the 3rd Annual Summit on ESG returns for another exciting year with ESG professionals gathering to address key pillars and trends driving ESG in 2023. Attendees will gain insights...more
Williams Mullen’s What to Do if Your Suppliers Are in Distress video series describes how to identify your critical suppliers that might be in jeopardy, provides suggestions on how you can help them, and shares how you can...more
When two companies aim to combine, there are countless issues that can arise during the integration stage. As part of any successful merger process, a carefully crafted integration strategy should consider all the potential...more
In recent years unexpected supply chain disruptions made it difficult for some automotive suppliers to manufacture components needed to fulfill their downstream orders on time and on budget. Although looking to alternate...more
Effective Third-Party Risk Management (TPRM) is all about understanding that working with any third-party vendor or supplier carries an inherent risk. Across all industries, organizations are faced with a two-fold...more
Welcome to a blog post series on Exiger’s fight to secure supply chains, sponsored by Exiger LLC. In this series, we will explore the ongoing efforts of Exiger to lead the discussion and enhancement of Supply Chain Risk...more
Explore ways to strengthen your compliance program and better mitigate potential risks - Few industries are as heavily regulated as defense and government contracting, and few also have such a large investment in...more
Matt Kelly, Editor & CEO of Radical Compliance makes a strong case in this podcast for a need to reassess cyber risk. It is becoming, he says, less of a technical issue and more about how companies interact with others: ...more
The EU is working on its next move toward sustainability and plans to oblige companies to address adverse sustainability impacts in their own operations and in their value chain. While the European Commission is working on...more
In late December 2021, the United States banned imports of disposable gloves produced in Malaysia by manufacturer Brightway Holdings over allegations of forced labor....more
Given the dangers of third-party risk, it’s not surprising that so many organizations have developed supplier codes of conduct. Like everything else in compliance, though, the trick is in just having one, its in having the...more
The supply chain for products is becoming vastly complex as more and more products involve technology components. Technology may be embedded in products to achieve their intended purpose; remotely connected to monitor and...more
The more things change, the more things stay the same. As risk and compliance matures as an industry, we sometimes forget the foundational best-practices that our programs are built upon. This Friday, we revisit a post from...more
Learning objectives: - Key Challenges/opportunities when implementing a third party due diligence system - Project (implementation) team - Project scope; - Integration with other systems - Escalation and extended...more
[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more