Risk Mitigation Risk Assessment

News & Analysis as of

Financial Services Quarterly Report - Third Quarter 2016: Managing the Compliance Aspects of Private Equity Investments

International business transactions can be subject to intense scrutiny due to the broad scope of the U.S. Foreign Corrupt Practices Act (FCPA) and the UK Bribery Act, in addition to other similar anti-corruption measures...more

With Penalties On The Rise, It's Time For Employers To Clean House Before OSHA Arrives

For the first time in twenty-five years, Occupational Safety and Health Administration (OSHA) fines have increased significantly. In particular, last fall Congress enacted legislation that required all federal agencies to...more

Should You Sue Your Client or Customer?

Business owners, executives and managers are well aware of something more frustrating than rush hour traffic: clients or customers who don’t fulfill their obligations. So, what are your options? One option is to take legal...more

[Webinar] Statutory Changes, New Regulations, and Compliance Deadlines Under the Food Safety Modernization Act - October 4th,...

This online presentation will discuss the revisions to the Food Safety and Modernization Act as well as the regulations implementing the Act. The primary focus of the presentation will be on the new rules affecting food...more

Top Four Ways Smart Companies Mitigate Litigation Risk

Do you worry about what would happen if that one “smoking gun” got into the hands of your adversary? Have your employees been educated on the “do’s” and “don’ts” of drafting documents, particularly e-mails? Does your...more

[Event] Data Breaches - What To Do When Your Client Falls Victim - September 28th, Mountain View, CA

The number of data breaches has risen significantly in the past few years. More and more companies, both large and small, are having their computer networks compromised and are looking for guidance on how to respond. This...more

NIST and FAIR develop tool to merge cybersecurity risk standards

One key issue when developing a cybersecurity protocol for your business is ensuring compliance with industry standards to protect your business and adequately address cybersecurity risks. Fail to comply with the standard for...more

Cyber Risk and Reality – Procuring Transportation in the 21st Century

With the rapid pace of innovation and deployment of intelligent transportation systems (ITS) to enhance existing transportation infrastructure, transportation officials frequently procure and manage sophisticated systems that...more

King & Spalding Lawyers Discuss The Regulatory Landscape At Medical Device Cybersecurity Risk Mitigation Conference

On July 25 and 26, 2016, industry stakeholders assembled in Arlington, Virginia, to participate in the Medical Device Cybersecurity Risk Mitigation Conference sponsored by Q1 Productions. The conference focused on the...more

Dealing with Violence in Wake of the Attack in Orlando

The weekend of June 11, 2016, saw another act of violence committed against innocent and unsuspecting people as they gathered together, an occurrence that has become all too frequent in today's world. While the latest attack...more

Ukrainian bank loses $10 million in latest swift cyber-attack

An unnamed bank in Ukraine is the most recent victim in a series of cyber-attacks exploiting vulnerabilities in the international banking communications system. According to an independent IT monitoring organization, hackers...more

Global Boardroom Risk Solutions Newsletter

“Risk is sexy?” - Anonymous GC - Not every Director or General Counsel (GC) is likely to describe risk analysis as “sexy” but there is little doubt that risk issues have demanded a board level focus which would have been...more

[Webinar] Ethics and Cybersecurity - June 29th, 12pm CDT

With recent headlines about successful attacks on corporate computer systems, safeguarding client electronic information is an issue that all attorneys must address. This presentation will discuss the ethical rules that...more

Cybersecurity News & Notes – June 2016 #2: A brief digest of cybersecurity news you can use...

In Case You Missed It: The SEC fined Morgan Stanley $1 million for a 2014 data breach. While the FTC had declined to pursue an enforcement action, blaming the breach on technical issues rather than any actions or omissions...more

Dawn raids: How to prepare for, manage, and mitigate the increasing risk to multinational tech companies

Dawn raids and enforcement actions throughout Europe are becoming more and more prevalent. And increasingly, the targets of these raids are multinational tech companies with foreign headquarters, which through their global...more

2016 Trends #8: Getting Serious About Anti-Bribery & Corruption Efforts and Third-Party Risk Management

By now, most organizations understand the importance of identifying and addressing any exposure they have to violations of anti-corruption and bribery (ABC) laws. Much attention has been given to recent cases, and to...more

Addressing Adulterated Food Risk

As we enter 2016, adulterated food-related investigations are leading the headlines—and should be leading companies in the food and beverage industry to ask what they can do to prevent and prepare for a potential outbreak on...more

Best in Law: Data Security and the Inside Job

If you are a business owner in the Inland Empire, what would you identify as the greatest threat to the security of your data? Is it hackers looking for credit-card numbers? Could it be foreign governments stealing industrial...more

Tips for Going Global: Plan Before You Expand

Companies enjoying success in the U.S. often seek global expansion to gain strategic benefits from accessing new markets—new revenue potential, talent acquisition and increased brand awareness. Before replicating your...more

The Asia-Pacific Investigations Review 2016

It goes without saying that wrongful conduct in a corporate setting can have drastic and irreparable legal, commercial and reputational consequences for the individuals and entities involved. Internal investigations, which...more

Gavel to Gavel: Ambiguity poses risks

As a business owner, you’ve probably put together a team of skilled individuals to help effectively market your products and services by developing memorable and informative product labels, advertisements, and marketing...more

New Study Highlights Anti-Bribery & Corruption Gaps & Risks

Everyone reading this post should have conducted a corporate risk assessment (CRA) in the past couple years. If not, stop reading and go conduct one now. Seriously, how can you know if your compliance program resources,...more

The Modern Slavery Act 2015

The UK’s Modern Slavery Act is an effort by the government to end all forms of labour exploitation. The UK’s Modern Slavery Act 2015 aims to prevent all forms of labour exploitation and increase transparency of labour...more

Update on Significant DOT, FAA and Other Federal Agencies’ Aviation-Related Regulatory Actions - October 2015

This edition of the Cozen O’Connor Aviation Regulatory Update reports on Congress’s six-month extension of FAA’s reauthorization; new U.S. Bilateral Aviation Safety Agreements with the European Union and Canada; the FAA’s...more

SEC Issues Cybersecurity Examination Risk Alert

On September 15, the Securities and Exchange Commission’s (SEC) Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert re-emphasizing the careful scrutiny it will give to the data security practices of...more

126 Results
View per page
Page: of 6
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.