Risk Management

News & Analysis as of

Cybersecurity Update - July 2015

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

Human Rights as a Business and Reputational Risk

News reports on human rights issues have become a steady drumbeat for companies in a variety of industries that operate in and source from nations in the developing world. The risks to companies posed by human rights abuses...more

Brokers Beware: Will the SEC Extend New Cyber Guidance to Brokers and Investment Advisers?

Against the backdrop of a steady stream of cyber-attacks and data breaches, Securities and Exchange Commissioner Luis A. Aguilar recently spoke about his hope to expand upcoming SEC cyber security guidance, known as...more

Toshiba Scandal Underscores the Importance of a Speak-Up Culture

In what’s being called the most damaging event in the company’s 140-year history, Toshiba admitted this week to overstating its operating profit by $1.22 billion during the past several years. This staggering figure and...more

Your Questions: Let’s Talk Risk - A Q&A Session about How to Achieve a Risk-based Approach to Compliance Management

Risk is at the heart of every compliance program. But that’s sometimes easier said than done. In January 2015, Kwamina Williford, Partner at Holland & Knight; Chris Caron, Compliance Director at Kiewit; and Joe LeBas of...more

State Breach Notification Laws – Updates From the 2015 Legislative Sessions, 6 Action Steps for Companies

This is proving to be a banner year for new breach notice requirements. In the period between 2006 and 2009, most US states enacted data breach notice laws. This year, we are seeing a wave of “second-generation” breach notice...more

How to Assess and Improve Your Corporate Cyber Security Infrastructure

It's no secret that data breach is becoming more and more common as sophisticated hackers penetrate corporate and governmental networks at what seems to be a breakneck pace. No business or institution with an internet...more

P3s: Managing Risks and Rewards

Overview - Successful P3s—Public-Private Partnerships—can be blessings for state and local governments searching for new ways to finance many types of critical “infrastructure”—roads, schools, prisons, and more—and...more

Health Care Rep and Warranty Insurance: New Solutions for Private Equity Buyers and Sellers

Whether in an auction or proprietary transaction, risk allocation has typically been a function of indemnities tied to reps and warranties and the type of credit supporting the type of supporting credit. Holdbacks, earnouts,...more

Legal Issues Business Leaders Need to Know in 2015: Top 10 Checklist

A compilation of time-sensitive and trending legal and regulatory issues that general counsels and business leaders should be aware of in 2015. Employers Should be Aware of Multigenerational Workforce Risk - For...more

Privacy and Security Guidance: Cloud Computing in the MUSH Sector

I. Purpose of this Guidance Document and How to Apply - This document is intended to be used by decision makers in the MUSH Sector when considering using cloud services....more

New Whitepaper: Reasonable Steps to Protect Trade Secrets

Every company has trade secrets (so-called “crown jewels”)– confidential business and technical information – that if exposed, could result in lost sales, competitive advantage or the ability to further innovate....more

Rolling the Dice: Casinos, FinCEN and AML Compliance

FinCEN has many important responsibilities but one of its more interesting assignments is oversight of anti-money laundering compliance by casinos (and card clubs). Casinos are under increasing scrutiny these days for lax AML...more

Bridging the Week - July 2015 #2

Alleged Fictitious Sales to Facilitate Improper Money Pass Prompts CFTC Injunctive Action and Asset Freeze: The Commodity Futures Trading Commission filed a lawsuit in a federal court in Illinois against Yumin Li and Kering...more

The WSGR Data Advisor

In this issue: - Navigating Public Company Cybersecurity Obligations: Advising Boards and Disclosing to Investors - FTC Updates School-Related COPPA Guidance - Status Update on the EU Data Protection...more

Grexit: Grief or Gift?

On July 5, the Greeks voted emphatically against their creditors’ proposals. Earlier that week, the IMF released a report in which it recommended a comprehensive recover plan that included a debt relief or a debt moratorium...more

Federal Reserve Orders Bank Holding Company to Strengthen its Firmwide Risk Management, Cites Capital Planning and Liquidity Risk...

On July 7, the Board of Governors announced the execution of an enforcement action against a Boston-based bank holding company over deficiencies identified by the Federal Reserve Bank of Boston concerning the company’s...more

The State of Anti-Bribery & Corruption Programs: Key Trends and Takeaways from Recent Research Report

Kroll and Compliance Week’s 2015 Anti-Bribery and Corruption Benchmarking Report, surveyed global compliance executives and revealed that, while compliance officers are aware of the risks of anti-bribery and corruption (ABC),...more

FFIEC Tool Helps You Assess Cyber Risk

The Federal Financial Institutions Examination Council (FFIEC) has released its long-awaited Cybersecurity Assessment Tool (Assessment) to help financial institutions identify the inherent risks faced by a company and...more

FFIEC’s Cybersecurity Assessment Tool: Guidance for CEOs and Boards - Senior Management and Boards Should Be Actively Addressing...

The Federal Financial Institutions Examination Council (FFIEC) released a Cybersecurity Assessment Tool (CAT) on June 30, 2015, to assist organizations in identifying cyber risks and assessing their cybersecurity...more

FFIEC’s Cybersecurity Assessment Tool: Guidance for CEOs and Boards - Senior Management and Boards Should Be Actively Addressing...

The Federal Financial Institutions Examination Council (FFIEC) released a Cybersecurity Assessment Tool (CAT) on June 30, 2015, to assist organizations in identifying cyber risks and assessing their cybersecurity...more

Global Risk and Compliance: Q&A with Katherine Peavy

CREATe is delighted to announce the addition of Katherine Peavy to our team of experts. Katherine is a global compliance executive with more than 15 years’ experience in China managing multicultural teams to implement...more

The Top 10 Priorities For Your Information Governance Program

The title, of course, begs the question: does your business even have an Information Governance Program? If not, you should get one—quick. An integrated Information Governance Program is considered a “best practice” to...more

Who is responsible for risk? As we continue to untangle the impact of the financial crisis, companies are finally asking who...

Prior to the financial crisis, risk management was often a box-ticking exercise of little or no interest to executives. Since then, however, it has climbed to the top of the boardroom priority list. The fall of Lehman...more

Financial Services Quarterly Report - Second Quarter 2015: Incentive-Based Compensation: Dodd-Frank and the Example of Europe

After a four-year hiatus, some of the more controversial elements of the executive compensation rules mandated by the U.S. Dodd-Frank Act are back on the table. This article explores these elements – principally in the...more

606 Results
|
View per page
Page: of 25

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×