Risk Mitigation

News & Analysis as of

Data breach: how information governance reduces risk

With all the data breach activity over the past several years, any organization or individual that hasn’t been affected in some way almost feels left out. According to the Department of Health and Human Services, 120 million...more

Strategies For Businesses Protecting Electronic Data Within California: Part Three

In Parts One and Two of this e-alert series, we discussed the federal Computer Fraud And Abuse Act ("CFAA") and its California corollary the California Computer Data Access And Fraud Act (CDAFA). In Part Three, we provide a...more

Best Practices for Auditing & Monitoring Your Ethics & Compliance Program

To be defensible, it’s not enough to implement a strong ethics and compliance program. Regulators expect that companies are continually auditing and monitoring their programs and internal controls. Many companies with...more

ALERT: NIST Issues Final Guidance on Federal Contractor Cybersecurity Standards for Controlled Unclassified Information

On June 19, 2015, the National Institute of Standards and Technology (NIST) published the final version of guidance for federal agencies to ensure sensitive information remains confidential when stored outside of federal...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

[Webinar] How EU Companies Can Implement & Demonstrate Effective Anti Bribery Compliance in Emerging Markets - July 9, 9:00 am EST

European companies subject to FCPA jurisdiction or comparable European jurisdictions, and doing business in emerging markets such as the BRIC nations, face a rigorous compliance standard. Firms must have compliance processes...more

Cyber-Attacks: Threats, Regulatory Reaction and Practical Proactive Measures to Help Avoid Risks

I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Top Three Cybersecurity Misconceptions [Video]

Cybersecurity is an issue that should be top-of-mind for all companies. But there are three misconceptions about cybersecurity that can put companies at significant risk. In this video, Foley Partner Michael Overly discusses...more

Assessing Your Approach To Compliance Risk Management: Compliance Programs Should Be Risk-Based — Here's How You Get There

Risk assessments are one of the first steps on the path to an effective risk-based compliance program, but it’s how you continue to manage and mitigate risk that truly determines if your program is successful. Kwamina...more

That Really Happened? Using Sanitized Cases to Make Ethics & Compliance Concepts Real

Learn how and why to incorporate anonymized ethics and compliance cases into your ethics and compliance program to make E&C concepts real to employees. There has been quite a bit of buzz lately about the use of sanitized...more

Addressing Environmental Issues in Real Estate Development [Video]

Dealmakers sometimes overlook environmental issues when negotiating transactions, leaving important business and legal issues unaddressed until they inevitably pop up shortly before closing and send everyone scrambling. This...more

Outsourcing by Canadian Companies after the USA PATRIOT Act

Wondering about outsourcing your data to the U.S.? What follows is an update to one of our most popular posts: Outsourcing by Canadian Companies: Another Look at the USA PATRIOT Act, originally written in January 2013....more

FFIEC: Beware Cyber Attacks, Destructive Malware

Why it matters - In a pair of joint statements, the Federal Financial Institutions Examination Council (FFIEC) cautioned financial institutions about cyber attacks compromising credentials and destructive malware. The...more

Survey Finds Companies More Prepared to Combat Global Corruption

The international community has made significant strides in combating corruption, with a proliferation of anti-bribery laws putting companies under pressure to ensure they — and their business partners — are able to detect...more

Estimating the Impact of Employee Engagement in Compliance and Ethics Training

In this on-demand webcast, The ROI of Compliance Training, David Houlihan, Principal Analyst of Blue Hill Research discusses the underlying business needs and dynamics related to the role of employee engagement in the...more

Technology in Healthcare [Video]

From the 2015 PLUS Medical PL Symposium session “Technology in Healthcare: EHRs & PHI,” moderator Patricia Marzella-Graubert (Swiss Re American Holdings Corporation) and panelist Alexander Grijalva (New York Presbyterian...more

Asset-Light

While asset-light strategies have been utilized for decades in the hotel industry, the strategy and how to implement it are a bit more complicated in the development space, whether for a hotel or time-share company. A typical...more

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

8 Strategies for Compliance Risk Management: How to Fortify Your Efforts, Reduce Risk and Increase Confidence in Your Program

As a compliance practitioner, your goal is to design and oversee a program that’s comprehensive enough to mitigate risk, strong enough to address issues that occur (because they always can, and will) and robust enough to...more

Encouraging Employees to Break the “Rules” to Do the Right Thing

Laws and regulations draw black lines in often-gray areas. That is their purpose; they exist to make it easier to tell what is “wrong” and what is “right” (as defined by whoever made the law). The U.S. government has...more

Strategies For Businesses Protecting Electronic Data Within California

Businesses in California have a number of tools with which to fight off unauthorized intrusions into their electronic data whether perpetrated by employees, former employees, disreputable competitors or random hackers....more

Corporate Risk Ownership: When There are Multiple Teams Involved, Who Owns What?

“We have a enterprise risk management team. Where does their role end and ours begin?” That’s a common question as compliance teams mature their programs into risk-based approaches. The truth is, compliance risk...more

EEOC, Court Flip Flops Reveal Challenges to Employers Facing Accommodation Requests

If even the U.S. Equal Employment Opportunity Commission (EEOC) and the courts cannot agree how far the Americans with Disabilities Act’s (ADA) accommodation obligation extends, how is an employer supposed to do so? As we...more

Fighting Back: Identifying Risks Posed by an Angry Current or Former Employee

Something lost is always in the last place you look (by definition). It can also sometimes be in the first. Although technology has made it possible for outsiders to manipulate and infiltrate your company’s systems...more

256 Results
|
View per page
Page: of 11

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×