Risk Assessment

News & Analysis as of

Effective cybersecurity: 8 questions for you and your team

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

10 Tips for Fostering a Business Culture of Cybersecurity Awareness

Businesses are recognizing the need for new approaches to data security as high-profile cybersecurity incidents reveal the true impact a data breach can have on an organization. One of the biggest realizations is that IT...more

Too Small to be Hacked?

We are not the size of Target or Home Depot, we won’t be a target of cyber-attack. This is a dangerous assumption. Recently reported in the news was that ISIL (a terrorist organization) had hacked and taken over certain...more

Lessons Learned from Recent Data Security Breaches, Part Two

Because controlling access is essential to protecting privacy of PHI under HIPAA, the HITECH Security Rule essentially requires that a covered entity control physical and electronic access to the data system by implementing...more

Compliance Reponses to Economic Downturns: A Focus On The Energy Sector

I. The Problem - As I write, oil is hovering around $50 per barrel. The price will inevitably rebound, but all compliance officers need to be prepared for responding to economic downturns in their respective industries...more

What Scuba Diving Can Teach You About Policy Management: Three Key Lessons

What do policy management and scuba diving have in common? The need to mitigate risk, use the right equipment and prioritize training. You might not imagine that scuba diving and policy management could have much in...more

Board Reporting: Elevating Your E&C Program & Engaging the Board

In This Presentation: - The Board’s Roles and Compliance Responsibilities - The Board Report & Briefing vs. Training - Important Considerations for your Board Report - Case Study - How Can I Tell if my Board is...more

Business Litigation Report - February 2015

- Firm News: - Main Article: ..Traversing the Breach: Why You Need to Prepare for Data Breaches and How to Do It - Noted With Interest: ..Direct Purchasers and End Payors Accuse Brand Pharma of...more

Practical Advice on Risk and Compliance Program Assessments

Sometimes the compliance industry makes things harder than they really need to be. As a result, Chief Compliance Officers are left to modify and transform practices and tools to fit the real world. I understand why CCOs do...more

Tracy and Hepburn: CCOs and Internal Auditors

If you enjoy Spencer Tracy and Kate Hepburn movies like I do, you know the value of a great partnership. Tracy and Hepburn movies are classics, and their chemistry was powerful (on the screen and off)....more

SEC Report: Just How Prepared are Broker-Dealers and Advisors for Cyber- Attacks?

On February 3, 2015, the Securities and Exchange Commission’s (“SEC”) Office of Compliance Inspections and Examinations (“OCIE”) published a highly-anticipated summary of its examination sweep of 57 registered broker-dealers...more

Bribery, Beneficiaries and Guilty Feelings (or lack thereof)

Given the response to my recent Q and A with Jamie-Lee Campbell on “Culture Corrupts,” which from an analytics and engagement perspective, was one of my most read pieces on a global basis since I started blogging, I decided...more

Managing Risks in Vendor Relationships

For years, banks have relied on third party vendors to provide specialized products or services, or have used outsourcing as a way to reduce internal operating costs. In the wake of the financial crisis, however, regulators...more

International Fraud & Asset Tracing (3rd Edition), England & Wales

In this Guide: - Introduction - Managing the Internal Investigation - Disclosure from Third Parties - Steps to Preserve Assets/Documents - Civil Proceedings - Anti-Bribery/Anti-Corruption...more

International Fraud & Asset Tracing (3rd Edition), Hong Kong

In this Guide: - Introduction - Managing the Internal Investigation - Disclosure from Third Parties - Steps to Preserve Assets/Documents - Civil Proceedings - Anti-Bribery/Anti-Corruption...more

"CFIUS’s Annual Report to Congress Details Longer Process, More Aggressive Risk Mitigation"

Key Developments - The Committee on Foreign Investment in the United States (CFIUS) is an interagency, Executive Branch organization charged with identifying potential national security risks posed by foreign...more

Traversing the Breach: Why You Need to Prepare for Data Breaches and How to Do It

“At every board meeting, whether it’s monthly, whether it’s quarterly, cybersecurity should be on [the agenda]. If not, you’re going to wind up in a situation where you’re having an emergency board meeting to discuss...more

CFPB Deputy Director Discusses How the CFPB Prioritizes Its Risk-Focused Supervision Program

On February 18, Steven Antonakes, Deputy Director of the CFPB, delivered remarks before the Exchequer Club of Washington, D.C. regarding the CFPB’s risk-focused supervision program. In his remarks, Antonakes identified two...more

Farewell to Mr. Spock and Risk Assessment Under COSO

Leonard Nimoy died last Friday. He will be forever associated with the role of Mr. Spock in the original Star Trek television show which premiered in 1966. The original series ran for only three years but had a full life in...more

Goodyear’s Settlement with the SEC Emphasizes the Importance of FCPA Due Diligence in M&A Transactions and of Having a Robust...

On February 24, 2015, Goodyear Tire & Rubber Co. agreed to pay more than $16 million to settle charges that two of its subsidiaries allegedly paid $3.2 million in bribes that generated $14,122,535 in illicit profits. The SEC...more

Federal Trade Commission Guidance on the Internet of Things

On January 27, 2015, the FTC released its Staff Report on the so-called “Internet of Things” (IoT) – the ability of everyday objects (from refrigerators to wearable devices) to connect to the Internet and send and receive...more

FINRA Issues its Cybersecurity Report, Providing Tools and Encouragement to Broker-Dealers

FINRA recently issued a Report on Cybersecurity Practices (“Report”), growing out of its targeted examination of firms last year. To issue the Report, FINRA gave careful consideration to the needs of many broker-dealers for...more

The Foreign Corrupt Practices Act: A Pitfall in International Trade

The Foreign Corrupt Practices Act (“FCPA”) should be top of mind for any manufacturer conducting or considering international business. Indeed, any doubts that the government was still interested in investigating and...more

Board Oversight of Cyberrisks: Directors and Officers Litigation

The duty of a board to monitor and oversee organizational risk includes cyberrisks. As cyberrisks and incidents proliferate, boards are seeking to enhance the information they receive about cyberrisks and incidents. One...more

FCPA Compliance and Ethics Report-Episode 130, The Oscars and Compliance, Part IV with Jay Rosen [Video]

In this Part IV of my continued exploration of the Oscars and compliance with Jay Rosen, we look at the touchpoint which Hollywood and the movie industry has which might subject it to FCPA liability. ...more

429 Results
|
View per page
Page: of 18