Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
A Third Party's Perspective on Third Party Risk
Implications of the SEC Cybersecurity Disclosure Rule
Privacy Issues from Third-Party Website Tags
What's the Tea in L&E? Employee Devices: What is #NSFW?
Preparing for a Government Healthcare Audit
Tackling Credit Push Fraud: Understanding Nacha's Risk Management Package (Part Two) — Payments Pros: The Payments Law Podcast
Compliance into The Weeds: The Complexity of Risk Assessments
Behavioral Health Compliance
The Importance of Assessment Areas
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
What Physicians Need to Understand About Balance Billing
What Nonprofit Board Leadership Needs To Know About Internal Investigations
Taking a Behavioral Approach to Compliance
Episode 291 -- Interview of Mary Shirley on Her New Compliance Book
ChatGPT Risks for Compliance Programs
Season 2 Episode 3 - The Role of Ethics and Compliance Programs in International Business
In the Boardroom With Resnick and Fuller - Episode 4
What Non-Financial Institutions Need to Know About Gramm-Leach-Bliley
"Board-er" Patrol in Privacy and Cyberattacks - Unauthorized Access Podcast
From potential cartel behaviour to repaying government loans, deal teams should remain alert to lingering issues rooted in a company’s response to the pandemic. The recovery of the European PE market since the early days of...more
Driven by mega-deals and a healthy spike in U.S. mergers and acquisitions (M&A) transactions, thus far 2019 has been an exceptionally active year in the global M&A market. Through the end of Q3 2019, deal volume reached $2.49...more
Driven by the influence of shareholders, activists and competitive market forces, public companies are demonstrating renewed focus on their core businesses. Reductions in the U.S. corporate tax rate from 35% to 21% have...more
During Akin Gump Strauss Hauer & Feld LLP’s most recent cybersecurity event, “Tackling Cybersecurity in the Boardroom,” hosted on November 12, 2015, our panels discussed a number of issues facing directors....more
1. Start Early - Buyers should begin conducting cybersecurity risk assessments early in the engagement process. The target should be able to identify which information technology systems and data sets are key to the...more