Risk Mitigation

News & Analysis as of

Cybersecurity Update - July 2015

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

7th Circuit Opens Door to Data Breach Class Actions

On July 20, 2015, the U.S. Court of Appeals for the 7th Circuit issued an opinion that could dramatically change the class action landscape for companies that are victims of hackers. In Remijas v. Neiman Marcus Gp., the 7th...more

How to Succeed in Africa by Choosing Partnership over Corruption

Big opportunities for exporters in Africa - There is no doubt that the continent of Africa is a land rich in opportunities for international businesses. With an abundance of natural resources, some of the world’s fastest...more

Your Questions: Let’s Talk Risk - A Q&A Session about How to Achieve a Risk-based Approach to Compliance Management

Risk is at the heart of every compliance program. But that’s sometimes easier said than done. In January 2015, Kwamina Williford, Partner at Holland & Knight; Chris Caron, Compliance Director at Kiewit; and Joe LeBas of...more

Breaking Down Compliance: The Keys to Creating a Successful Compliance Program—As Told through the Letters of COMPLIANCE

Still being a young role and profession, many people are working to define what makes a successful compliance professional and program, and what can help them improve. After traveling the country for the past few months at...more

New Whitepaper: Reasonable Steps to Protect Trade Secrets

Every company has trade secrets (so-called “crown jewels”)– confidential business and technical information – that if exposed, could result in lost sales, competitive advantage or the ability to further innovate....more

The evolving nature of legal risk: Legal risk, as we once understood it, is changing. Companies need to be prepared to respond...

Over the past decade, many of the legal risks facing companies under US law have narrowed dramatically while others have proliferated. The advent of streaming news and social media means that local issues can become global...more

Summary of HUD's LEAN 232 Program E-mail Blast: Office of Residential Care Facilities (ORCF), June 24, 2015

The June 24, 2015 LEAN Email Blast contains information on the new protocol for release of R4R and NCRE, handling aged account receivables, clarification on UPL revenues, a 241(a) status update, a new IRR legal checklist and...more

Addressing Environmental Issues in Real Estate Development

Dealmakers sometimes overlook environmental issues when negotiating transactions, leaving important business and legal issues unaddressed until they inevitably pop up shortly before closing and send everyone scrambling. This...more

Profile of a Malicious Insider: Top Warning Signs

How are your company’s crown jewels – trade secrets, digital assets and the like – most likely to be compromised? Although coverage in the media would suggest that nation states or competitors are most likely to be the...more

Twitter Terrorism: Criminals Choose the Hack Attack

In what appears to be yet another brazen demonstration of capability following an earlier hijack of government social media sites, a group calling itself the Syrian Electronic Army (SEA) recently hacked into the U.S. Army’s...more

4 Key Benefits of Compliance Technology: How to Build the Business Case for Investing in Modern Compliance Technology

Let’s face it, we live in a technological world where we expect to get more intelligent information faster than ever before. Yet compliance functions are still spending a disproportionate amount of time collecting data with...more

Boardroom Perspectives: Oversight of Material Litigation in Four Practical Steps

Public companies in the United States are subject to litigation in various areas, including: shareholder litigation; government investigations and enforcement actions; environmental litigation and intellectual property...more

Data breach: how information governance reduces risk

With all the data breach activity over the past several years, any organization or individual that hasn’t been affected in some way almost feels left out. According to the Department of Health and Human Services, 120 million...more

Strategies For Businesses Protecting Electronic Data Within California: Part Three

In Parts One and Two of this e-alert series, we discussed the federal Computer Fraud And Abuse Act ("CFAA") and its California corollary the California Computer Data Access And Fraud Act (CDAFA). In Part Three, we provide a...more

Best Practices for Auditing & Monitoring Your Ethics & Compliance Program

To be defensible, it’s not enough to implement a strong ethics and compliance program. Regulators expect that companies are continually auditing and monitoring their programs and internal controls. Many companies with...more

ALERT: NIST Issues Final Guidance on Federal Contractor Cybersecurity Standards for Controlled Unclassified Information

On June 19, 2015, the National Institute of Standards and Technology (NIST) published the final version of guidance for federal agencies to ensure sensitive information remains confidential when stored outside of federal...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

[Webinar] How EU Companies Can Implement & Demonstrate Effective Anti Bribery Compliance in Emerging Markets - July 9, 9:00 am EST

European companies subject to FCPA jurisdiction or comparable European jurisdictions, and doing business in emerging markets such as the BRIC nations, face a rigorous compliance standard. Firms must have compliance processes...more

Cyber-Attacks: Threats, Regulatory Reaction and Practical Proactive Measures to Help Avoid Risks

I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Top Three Cybersecurity Misconceptions [Video]

Cybersecurity is an issue that should be top-of-mind for all companies. But there are three misconceptions about cybersecurity that can put companies at significant risk. In this video, Foley Partner Michael Overly discusses...more

Assessing Your Approach To Compliance Risk Management: Compliance Programs Should Be Risk-Based — Here's How You Get There

Risk assessments are one of the first steps on the path to an effective risk-based compliance program, but it’s how you continue to manage and mitigate risk that truly determines if your program is successful. Kwamina...more

That Really Happened? Using Sanitized Cases to Make Ethics & Compliance Concepts Real

Learn how and why to incorporate anonymized ethics and compliance cases into your ethics and compliance program to make E&C concepts real to employees. There has been quite a bit of buzz lately about the use of sanitized...more

Addressing Environmental Issues in Real Estate Development [Video]

Dealmakers sometimes overlook environmental issues when negotiating transactions, leaving important business and legal issues unaddressed until they inevitably pop up shortly before closing and send everyone scrambling. This...more

244 Results
|
View per page
Page: of 10

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×