Guidepost in Motion: Off The Chain Part 2 Innovations and Best Practices in Crypto and Blockchain
Cyberside Chats: Don’t silo your risk from legal (with Ingrid Rodriguez)
Digging Deeper Episode 10: Misguided or Misconduct? Understanding Bad Behavior in the Corporate World
M365 in 5 – Part 7: Teams Audio/Video (A/V) Conferencing
M365 in 5 – Part 6: Teams Channels – The virtual collaboration workspace
M365 in 5 – Part 5: Teams Chats – Modern communications
M365 in 5 – Part 4: Teams – An introduction to collaboration
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Sitting with the C-Suite: Differentiating Through Client Service
Sitting with the C-Suite: Culture Integration in a Remote Work Environment
Sitting with the C-Suite: HaystackID and NightOwl Merger Overview
Sitting with the C-Suite: Managing through Challenging Times? Focus on the Key Three
Nota Bene Episode 91: China Q3 Check In - Trade Wars, GDP Growth, Pandemic Comparatives, and Hong Kong with Michael Zhang
Sitting with the C-Suite: COVID 19 Impact – Four Sectors of Change for the Legal Industry
Sitting with the C-Suite: Legal Industry Technology Adoption
Sitting with the C-Suite: Trial Prep as a Launchpad for Services
Sitting with the C-Suite: eDiscovery Observations – Historical Lookback to 1990s and 2000s
Sitting with the C-Suite: Servient – What’s Next
Cybersecurity is integral to protecting sensitive information, ensuring regulatory compliance, managing financial risks, maintaining reputation, ensuring business continuity, gaining a competitive advantage, adapting to...more
In an era marked by heightened global regulatory scrutiny and enforcement, the landscape of risk and compliance is undergoing an evolution making the strategic imperative for effective, risk-based compliance initiatives...more
Getting a successful risk management program off the ground can be daunting for even the most intrepid information security professionals. It doesn’t have to be rocket science. In this webinar, we’ll explore with guest...more
Over the past few months, the OIG shorts series focused on structuring and implementing a comprehensive and effective ethics and compliance program. Many times, this requires a mindset shift from a checking-the-box mentality...more
Privacy & Compliance expert from Microsoft, Ingrid Rodriguez, joins hosts Jerich Beason & Whitney McCollum to discuss taking risk out of silos. They talk about how the entire organization needs to have understanding of the...more
You executives and managers who are in my age group (that is, you didn’t grow up with mobile devices and computers) listen up. According to several studies, you pose a higher security risk to your organization than the...more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
The Office of Inspector General of Health and Human Services expects board members, board audit/compliance committee members, and senior level leaders of organizations to be experienced in compliance oversight. The Board &...more
Darkreading.com reported that the “…CISO is a "must have" position” in the results of a survey of “400 C-suite executives from enterprises across the UK and USA” and of course that “C-level executives say that a cyber...more
The Federal Financial Institutions Examination Council (FFIEC) released a Cybersecurity Assessment Tool (CAT) on June 30, 2015, to assist organizations in identifying cyber risks and assessing their cybersecurity...more
Although Insights is intended to cover a wide range of issues, there are a number of topics we believe will be of particular interest to directors and senior corporate executives. Below is an introduction to these topics and...more
Today as companies increasingly realize the value of strong cybersecurity, those CIOs who successfully implement an effective cybersecurity system should be viewed as a critical part of the revenue generation effort. An...more