Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
A Third Party's Perspective on Third Party Risk
Why Time Matters: Partners Lindsay Gerdes and Michael J. Bronson on Swift Action in Government Investigations
Consumer Finance Monitor Podcast Episode: Why do Fintechs Want to Become Banks?
Privacy Issues from Third-Party Website Tags
What's the Tea in L&E? Employee Devices: What is #NSFW?
Episode 331- NAVEX State of Risk and Compliance Programs
What the Board Should Be Asking About the Compliance Program
Video: Artificial Intelligence Use in Political Campaigns
Episode 329 -- Bryn Sedlacek from Aravo on TPRM Holistic Risks and Unified Visibility
Compliance Lessons from Dating in Your 50s
The Justice Insiders Podcast - AI-Washing: Everything Old Is New Again
The AI Shakeup: New Tech Innovations and the Future of Corporate Law
Principled Podcast: S11E7 | Fortifying Ethical Frameworks: Navigating Emerging Risks in the Middle East
Managing Compliance Risk for Human Trafficking and Modern Slavery
Common Scenarios Triggering False Claims Act Violations, Part 3: Claims and Investigations
Navigating Bank-Fintech Partnerships: Avoiding Common Pitfalls — The Consumer Finance Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
Revisiting Financial Institution Incentive Compensation Rules Under Dodd-Frank — The Consumer Finance Podcast
Episode 325 -- AI and Emerging Compliance Frameworks
Social media platforms have become an integral part of our daily lives, enabling us to connect with friends, family, and communities worldwide. However, the openness of these platforms also exposes users to the risk of...more
This week, in addition to the news-catching, ongoing dispute between Twitter and Elon Musk, Twitter’s former head of cybersecurity, Peiter Zatko, claimed in a whistleblower filing with several federal agencies that Twitter...more
Riot Games’ (Riot) team-based, first-person-shooter game, Valorant, has received mixed emotions upon its announcement that it will monitor the game’s voice chat. Team-games especially benefit from players being able to...more
Billions of Google searches occur every day. Sources estimate that the average person conducts between three to four daily Google searches....more
Cyberbullying is nothing new. A majority of teens have experienced the phenomenon and college campuses certainly are not immune. Just because something is common does not make it simple to deal with, however. And this is...more
Prior to the advent of social media and especially the #MeToo movement, employers were generally comfortable drawing a bright line between what employees did on their own time and workplace misconduct. ...more
It’s a Saturday afternoon, and your cell phone rings: it’s your company’s CEO. Curious why the CEO would choose to call you on a quiet Saturday, you answer, only to hear a relieved voice on the end: “Oh Jack, you don’t know...more
When seasoned investigators are exposed to online scams, the protective warnings they give to others on social media safety and internet fraud suddenly become real. Read on to see how one of our own dodged an online rental...more
Social media is one of the most significant developments in communication and has changed the way and speed at which people interact with one another. It has naturally infiltrated the working environment and brought about...more
Social media is so powerful that some argue Russian manipulation of it changed the result of a U.S. presidential election. In the employment context, social media is not quite that powerful, but employment context social...more
It is well known that hackers and fraudsters surf Facebook to find individuals who have not protected their information through Facebook’s privacy settings. People put a lot of information on Facebook that is very personal...more
LinkedIn is the biggest online network of professionals in the world. Many employers encourage staff to use LinkedIn to promote their organisation. While employees may share content relating to their organisation, they...more
I was fortunate this week to be able to attend and speak at the annual Privacy Xchange Conference sponsored by CyberScout. There were amazing presentations during the conference, but one in particular touched me and is worthy...more
We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more
In the past five years, employers both big and small have become accustomed to social media and increased technology in the workplace. Everyone and their parents are on Facebook, and one cannot go anywhere without being asked...more
Explore four areas key to managing social media use by employees in your organization. Craft a best practice social media policy, navigate thelegal landscape, and view examples of organizations that have established social...more