California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
Compliance Tip of the Day: COSO Objective 3 – Control Activities
Compliance Tip of the Day – COSO Objective 1 – Control Environment
Hiring Smarter: Best Practices for Interviews: What's the Tea in L&E?
Compliance Tip of the Day: Code of Conduct as an Internal Control
California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Compliance Tip of the Day: Risk Assessments and Internal Controls
FCPA Compliance Report: The Role of Culture and Data in Fraud Risk Management - A Conversation with Vincent Walden
Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Work This Way: A Labor & Employment Law Podcast | Episode 46: The 2025 Greenville SHRM Conference with Tyler Clark and Brittany Goforth of GSHRM
Compliance tip of the Day: Communication Through Persuasion
Compliance Tip of the Day: Middle Managers as the Eyes and Ears of Compliance
Joe Green & Monica Rodriguez Kuniyoshi on Integrating Generative AI with Your Experts - Passle CMO Series Podcast RE-RELEASE:
Compliance Tip of the Day – Role of Chatbots in Compliance
FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
Compliance Tip of the Day: Embedded Compliance
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more
This three-and-a-half-day, classroom-style learning experience is designed for compliance professionals ready to advance their career by mastering the fundamentals of compliance program management in a healthcare setting....more
The human element in your supply chain - There is little risk in claiming that ESG (Environment, Social, Governance) has been one of the most used acronyms over the last few years. Some salient examples that changed how...more
In a recent presentation by Ward and Smith attorney Angela Doughty, in-house counsel received an overview of Artificial Intelligence (AI), how it can be used for various legal tasks such as research, discovery, and contract...more
While new forms of artificial intelligence and machine-learning systems, or AI, have garnered headlines in the mainstream press, many companies are evaluating its use in their businesses. Perhaps to a greater extent than with...more
Canada’s leading event for the turnaround community is returning to Calgary! Focusing on the most pressing issues affecting the industry The Canadian Institute’s 20th Annual Shutdowns Turnarounds Superconference ensures you...more
The cyber insurance market size is currently valued in the billions, and this does not include insurance policies that do not explicitly mention cyber incidents but may nevertheless cover them. With this in mind,...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
As hand gels and toilet paper fly off the shelves and children across the world cross their fingers for school closures, the COVID-19 strain of coronavirus has taken over the news. ...more
Our one-day regional conferences are dedicated to providing the latest news in healthcare compliance regulatory requirements. Professionals who attend will learn about relevant topics that will keep them ahead of trending...more
Healthcare industry business, legal and compliance executives and investors will learn strategies for proactively managing and effectively responding to compliance risks, investigations and litigation at our fourth annual...more
McDermott Will & Emery’s Hospital & Health System Innovation Summit will prepare innovation leadership teams to address the business, regulatory compliance and legal challenges they may face when navigating innovation efforts...more
American Conference Institute’s 8th Asia Summit on Anti-Corruption stands apart as one of the best networking and compliance benchmarking opportunities in the APAC region. Each year, senior government officials from...more
In this episode, Linda Odom and Ernest Simons discuss the increase of M&A deals and investors’ due diligence regulatory concerns. The episode also addresses the implications of contracts for consumer, business, and vendor and...more
Independent schools, like other non-profits, have valuable digital assets that bring cybersecurity obligations with them. For example, schools typically extend financial aid to students and medical benefits to employees only...more
• The NFA has determined that registered CPOs must implement an internal controls system and highlighted best practices for such a framework. • In response to certain frequently asked questions, the NFA has also updated its...more
The Background: Technology has transformed the way that directors receive and review information and communicate with each other and with management. The Issue: Although many modern board practices are more secure and...more
On August 7, the SEC’s Office of Compliance Inspections and Examinations (OCIE) issued a risk alert containing observations from its Cybersecurity 2 Exam Initiative. As a follow-up to the 2014 Cybersecurity 1 initiative, the...more
The SEC announced last week that an investment adviser had agreed to settle charges that it failed to take required steps to protect against and respond effectively to a cybersecurity breach. The action comes on the heels of...more
An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more
I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more
Symantec, the American IT security company, recently released its 2015 Internet Security Threat Report that summarizes the number and types of threats and vulnerabilities seen in 2014. The report also analyzes trends and...more
On April 28, 2015, the U.S. Securities and Exchange Commission’s Division of Investment Management (the “Division”) issued a Guidance Update to investment and fund advisers on the topic of improving cyber security. While it...more
Many have heard that “it is not a matter of if a company will be attacked, but when.” Statements like this used to be met with skepticism – companies would say we do not have information hackers want, we outsource our...more
This past year has been called the "year of the massive data breach," with many high-profile attacks on well-known companies. Skadden partners Cyrus Amir-Mokri, Patrick Fitzgerald, Marc S. Gerber, Stuart D. Levi and Timothy...more