Risk Assessment

News & Analysis as of

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Best Practices for Auditing & Monitoring Your Ethics & Compliance Program

To be defensible, it’s not enough to implement a strong ethics and compliance program. Regulators expect that companies are continually auditing and monitoring their programs and internal controls. Many companies with...more

Is Your Financial Institution the Next Target of a Cyber-Attack? [Video]

Not worried about cybersecurity at your financial institution? Then you are in the minority. Cyber-risk was identified as the number one worry of bank risk managers at a panel of bank chief risk officers at the American...more

Insurance Risks of Bitcoin: Lloyd’s Take

On June 12, global insurance giant Lloyd’s of London released a report titled Bitcoin: Risk Factors for Insurance. Lloyd’s knows a thing or two about risk—it has been underwriting for more than 300 years and has insured...more

ALERT: NIST Issues Final Guidance on Federal Contractor Cybersecurity Standards for Controlled Unclassified Information

On June 19, 2015, the National Institute of Standards and Technology (NIST) published the final version of guidance for federal agencies to ensure sensitive information remains confidential when stored outside of federal...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

IRWA Professionals Keenly Interested in Design-Build Issues

Identifying and allocating the risks associated with right-of-way acquisition in design-build projects was a hot topic for the standing-room only crowd at last week’s annual Education Conference of the International Right of...more

Cyber-Attacks: Threats, Regulatory Reaction and Practical Proactive Measures to Help Avoid Risks

I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more

FDIC Proposes New Premium Assessment System for Small Banks

On June 16, the Federal Deposit Insurance Corporation (FDIC) released a proposal to amend 12 CFR part 327 to refine the deposit insurance assessment system for small banks that have been federally insured for at least five...more

PCAOB Launches Audit Committee “Dialogue”

As part of its audit committee outreach efforts, the Public Company Accounting Oversight Board has established a webpage called "Audit Committee Dialogue" focusing on recurrent areas of concern identified by the PCAOB over...more

Is Your Financial Institution the Next Target of a Cyber-Attack?

In This Presentation: - Regulatory expectations for financial institutions - Risks for financial institutions - Planning to reduce risks - The Breach - Duties and responsibilities -...more

Compliance: It’s All About The Data – It's Time for Compliance to Mature

“The most commonly reported information includes the number of employees trained, hotline statistics and an inventory of compliance risks. This information, while important, does not necessarily help the board and senior...more

Treasury Department Publishes National Money Laundering Risk Assessment and National Terrorist Financing Risk Assessment

On June 12, 2015, Treasury Department issued its National Money Laundering Risk Assessment (NMLRA) and National Terrorist Financing Risk Assessment (NTFRA). This is the Department’s first NMLRA release in a decade and its...more

Upcoming HIPAA Audits May Target Financial Institutions—Here’s How to Prepare

Much like a tornado watch, the conditions appear to be right for a coming storm: the upcoming Phase 2 HIPAA audits. The Department of Health and Human Services Office for Civil Rights (OCR) has begun verifying contact...more

Four Compliance Metrics That Need to Die: Empty Metrics that Aren’t Worth Tracking or Reporting

I’m continuously struck by the compliance industry’s challenges around program measurement and reporting. Most recently, it was the annual Compliance Trends Survey from Compliance Week and Deloitte that delivered the bad...more

Top Three Cybersecurity Misconceptions [Video]

Cybersecurity is an issue that should be top-of-mind for all companies. But there are three misconceptions about cybersecurity that can put companies at significant risk. In this video, Foley Partner Michael Overly discusses...more

The Internet of Things

In this Presentation: - Internet of Things - definition - But what is it all about? - But not just that... - The IoT market in figures... - Beecham Research - view of the World - The Connected...more

Treasury Department Issues Comprehensive Assessment of US Money Laundering and Terrorist Financing Risk

For the first time in a decade, the Treasury Department has released its own anti–money laundering (AML) and terrorist financing Risk Assessments, which may both set a strategic framework for future AML regulatory...more

Assessing Your Approach To Compliance Risk Management: Compliance Programs Should Be Risk-Based — Here's How You Get There

Risk assessments are one of the first steps on the path to an effective risk-based compliance program, but it’s how you continue to manage and mitigate risk that truly determines if your program is successful. Kwamina...more

What You Need to Know About .Sucks Domain Names

Over the past two years, more than 500 new top-level domains (TLDs, or the words to the right of the dot in a domain name, such as .com or .edu) like .attorney, .consulting, .menu, and even .rocks have launched. But none has...more

Addressing Environmental Issues in Real Estate Development [Video]

Dealmakers sometimes overlook environmental issues when negotiating transactions, leaving important business and legal issues unaddressed until they inevitably pop up shortly before closing and send everyone scrambling. This...more

Going for Brokerages: FINRA and SEC Take Aim at Deficient Cyber Policies and Practices

On Feb. 3, the Securities and Exchange Commission (SEC) and the Financial Industry Regulatory Authority (FINRA) each released reports regarding cybersecurity issues for brokerage and advisory firms, both of which should be...more

Culture of Corruption in the Financial Industry: A Closer Look

A closer look at new research data about corruption in the financial industry: is the industry as far behind on organizational culture as it might seem?  A recent study, “The Street, The Bull and The Crisis: A Survey of...more

Outsourcing by Canadian Companies after the USA PATRIOT Act

Wondering about outsourcing your data to the U.S.? What follows is an update to one of our most popular posts: Outsourcing by Canadian Companies: Another Look at the USA PATRIOT Act, originally written in January 2013....more

Internal Investigations: The Three C’s – Confidence. Credibility. Cost.

In this issue: - THE THREE C’S — CONFIDENCE, CREDIBILITY AND COST - WHO CONDUCTS THE INVESTIGATION? - SCOPE OF THE INVESTIGATION - MINDSET AT THE OUTSET OF AN INVESTIGATION - THE NEED FOR...more

518 Results
|
View per page
Page: of 21

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×