California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Work This Way: A Labor & Employment Law Podcast | Episode 46: The 2025 Greenville SHRM Conference with Tyler Clark and Brittany Goforth of GSHRM
Compliance tip of the Day: Communication Through Persuasion
Compliance Tip of the Day: Middle Managers as the Eyes and Ears of Compliance
Joe Green & Monica Rodriguez Kuniyoshi on Integrating Generative AI with Your Experts - Passle CMO Series Podcast RE-RELEASE:
Compliance Tip of the Day – Role of Chatbots in Compliance
FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
Compliance Tip of the Day: Embedded Compliance
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Law School Toolbox Podcast Episode 496: The Early BigLaw Recruiting Timeline (w/Sadie Jones)
Whistleblower Challenges and Employer Responses: One-on-One with Alex Barnard
Compliance Tip of the Day: Compliance By Design
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
Podcast - How to Use Humor and Anger Effectively in the Courtroom
Podcast - At Trial, Less Is More
Enhancing Workplace Feedback: Lessons From Harry Potter — Hiring to Firing Podcast
The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more
A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more
The Washington Post (2013) found that one-sixth of all embezzlement cases in the U.S. involve nonprofit and religious organizations, ranking just behind the financial sector. This statistic is jarring but not entirely...more
The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more
Attend ACI's 19th Annual BIG FOUR Pharmaceutical Pricing Boot Camp for an intensive online bootcamp that will provide you with a thorough understanding of essential government contracting processes and pricing concepts for...more
Cyber security supply chain risks are growing, and attacks on vendors and other third parties cause severe disruption to businesses. For example, in recent years we have seen many incidents that have involved threat actors...more
While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more
As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more
Another school year is winding down, and educational leaders perhaps have never been more ready for summer break. From the Trump administration’s significant policy shifts to deeply consequential litigation playing out to...more
Managing risk in the employment law circus isn’t always easy when the rules change like they are contortionists. The 41st Annual Employment Law Update will highlight recent changes to the law and how employers can most...more
On April 3, NIST published practical incident response guidance aligned with its CSF 2.0 framework. The guidance outlines best practices in security incident preparation and response for organizations mapped across each of...more
Organizations seeking to improve their cybersecurity posture in 2025 must assess what happens after an incident has occurred, and how an incident response team will be able to mobilize to respond. This article provides...more
Artificial intelligence (AI), particularly generative AI, thrives on vast amounts of data, fueling AI capabilities, insights, and predictions. But with this reliance on data comes potential privacy and security risks. And...more
As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more
On January 28, the Financial Industry Regulatory Authority (FINRA) published the 2025 update to its annual Regulatory Oversight Report.1 The report collects recent observations and findings from FINRA's oversight programs –...more
Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more
Stay on top of the complexities of government contracting - Few industries are as heavily regulated or complex as government contracting. If your organization performs government-contracted services, or if you are charged...more
Les cybermenaces se multiplient et évoluent sans cesse, ce qui oblige les organisations à maintenir leur résilience opérationnelle et à protéger leurs actifs clés, comme leurs infrastructures critiques et leurs données...more
Class actions arising from data breach represented the fastest growing segment of class action filings. In 2023, more than 2000 class actions were filed, more than triple the amount filed in 2022. These cases were filed in...more
Cybersecurity threats continue to grow and evolve, increasing pressure on organizations to maintain operational resilience and protect their key assets, such as critical infrastructure and sensitive data. As cyberattacks...more
Staying the course in compliance is crucial, especially during uncertain political times. Regulatory updates like the new AML rule and Cybersecurity can have a significant impact on your program, and it's important for...more
In 2021, Congress created the Internet of Things Advisory Board (IoTAB) within the Department of Commerce and charged it with providing advice to the Internet of Things Federal Working Group, a collaboration of Federal...more
On September 6, 2024, the U.S. Department of Labor (DOL) issued Compliance Assistance Release No. 2024-01, titled “Cybersecurity Guidance Update.” The updated guidance clarifies that the DOL cybersecurity guidance applies to...more
The conclusion of Cybersecurity Awareness Month is a reminder of the importance for organizations to implement robust security measures and promote good cyber hygiene. As we noted in our State of the Cyber Landscape webinar,...more
In today’s data-driven environment, effective communication during a cybersecurity breach is crucial for maintaining employee trust and confidence. This fourth article in our five-part series on employee data privacy focuses...more