Risk Management

News & Analysis as of

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

Technology is Transforming Third Party Risk Management: Predicting the Future

The definition of “effectiveness” for a third party risk management program is quickly changing — how is your organization keeping up? I usually avoid predicting the future because you are bound to get something wrong. ...more

Why It's Wise to Pay Attention to Your FCPA Compliance

Companies in the automotive industry would be wise to pay attention to Foreign Corrupt Practices Act (the “FCPA”) compliance. What has in the past been a risk management issue principally for massive multi-national...more

10 Tips for Fostering a Business Culture of Cybersecurity Awareness

Businesses are recognizing the need for new approaches to data security as high-profile cybersecurity incidents reveal the true impact a data breach can have on an organization. One of the biggest realizations is that IT...more

Alert: Cybersecurity Risk Management for Communications Companies

An industry-led committee advising the Federal Communications Commission ("FCC") on cybersecurity released its final report on best risk management practices tailored to each of five main industry segments—broadcasting,...more

Liability for Commercial Speech: A Guide to False Advertising, Commercial Disparagement, and Related Claims

This volume summarizes related bodies of law – false advertising, commercial disparagement, and defamation – that govern the conduct of business communications. It sets forth elements, damages, and related defenses for each...more

Too Small to be Hacked?

We are not the size of Target or Home Depot, we won’t be a target of cyber-attack. This is a dangerous assumption. Recently reported in the news was that ISIL (a terrorist organization) had hacked and taken over certain...more

Care Recipients’ Limited Right to Discriminate Based on Protected Characteristics of Care Provider

Healthcare provider institutions including hospitals, clinics, medical practices, nursing homes and home health care providers (here, “Institutions”) are occasionally called upon to balance the preferences of Consumers...more

Compliance Responses to Economic Downturns: A Focus On The Energy Sector – Part Two

II. Doing Less with Less - The current economic downturn in the energy space seems to follow a pattern, with businesses’ exhibiting predictable Pavlovian responses. When oil prices drop precipitously, companies who are...more

Top Business Risks For Cloud Computing

As anyone who watches television knows, cloud computing is a term that is as ubiquitous as “scalable” and “software as a service.” The decision to utilize cloud technology offers many benefits. But for the business lawyer...more

A Front-Line View of Compliance: Q & A with Richard Bistrong

This week Maurice Gilbert, publisher of Corporate Compliance Insights and managing partner of Conselium Executive Search, interviews Richard Bistrong about Front-Line Anti-Bribery LLC - Q: Well Richard, this is now...more

Proving the Business Value of a Strong Organisational Culture: Four Keys to Serco’s Success

We’re thrilled to have U.K.-based Robert Smith, Director Assurance at Serco Group PLC (Serco), a NAVEX Global client, share his thoughts on how he and his team are helping Serco build and sustain a strong organisational...more

Hong Kong Regulatory Update - March 2015

This Hong Kong regulatory update is intended to provide a brief overview of the principal Hong Kong regulatory developments in the preceding three months relevant to companies listed or proposed to be listed on The Stock...more

Technology is Transforming Third Party Risk Management: Predicting the Future

I usually avoid predicting the future because I am often wrong. But in this case I’m going to make an exception. Here is my 100 percent, sure-to-be true prediction: technology is going to change how compliance professionals...more

A Different Kind of Data Breach—Loss or Disclosure of Company Information by Employee Theft

Data breaches are all over the news, but those stories most often cover high-profile cybersecurity breaches that result from the malicious efforts of hackers or other outsiders. Just as insidious, and more likely to occur,...more

OCC Deputy Comptroller Discusses Risk Management Practices

On February 25, OCC Deputy Comptroller Darrin Benhart delivered remarks at the 16th Annual Global Association of Risk Professionals (GARP) Risk Management Conference on the OCC’s efforts to improve its ability to “identify,...more

Managing Risks in Vendor Relationships

For years, banks have relied on third party vendors to provide specialized products or services, or have used outsourcing as a way to reduce internal operating costs. In the wake of the financial crisis, however, regulators...more

War (and Construction Scheduling) is Hell?

On February 26, 2015, Roy Cooper of Arcadis and I reprised our popular Workshop for the University of Hartford’s Construction Institute, “Managing Legal Exposures.” One of the slides in our presentation quotes a wise jurist...more

Sentencing of CEO Highlights Importance of a Good "Tone at the Top"

Highlighting the peril of unethical business leadership, a judge recently sentenced the former CEO of a bankrupt cash-management firm to 14 years in prison for defrauding more than 70 customers of more than $665 million...more

Cyber Risk as a Regulatory Issue: Tales of Encryption

Spurred by the prescient reporting found in this space (and, just maybe, by the Anthem data breach, which occurred a week later), insurance regulators have recently engaged in a flurry of regulatory activity relating to cyber...more

Reasons When Plan Sponsors Should Change Their Plan Providers

People are afraid of change and sometimes; change can be a good thing. Change for the sake of change isn’t a good idea and there are times when change is absolutely necessary. This article is about when it’s probably a good...more

The Foreign Corrupt Practices Act: A Pitfall in International Trade

The Foreign Corrupt Practices Act (“FCPA”) should be top of mind for any manufacturer conducting or considering international business. Indeed, any doubts that the government was still interested in investigating and...more

Big Data Analytics and an Evolving Standard of Care?

IBM's Watson, the natural-language processing computer perhaps most famous in popular culture for obliterating its opponents on a January 2011 evening of Jeopardy!, has more recently been making news in the healthcare...more

A Risk Manager with a Law Degree Is Still a Risk Manager

In the health care industry the line between attorneys and risk managers is often blurred. That’s only natural because a key duty of risk management is to avoid and mitigate legal liability. And it’s increasingly common for...more

A Few Takeaways from the OCIE Cybersecurity Examination Sweep Summary

On February 3, 2015, the Securities and Exchange Commission’s (“SEC”) Office of Compliance Inspections and Examinations (“OCIE”) released a Risk Alert (the “2015 Risk Alert”) with summary observations from its recently...more

524 Results
|
View per page
Page: of 21