Back to School: 3 Essential Employee Trainings
The New EEOC Guidelines on Workplace Harassment
Managing Employee Compliance in Highly Regulated Industries — Hiring to Firing Podcast
What's the Tea in L&E? Supervisor Liability: What Managers Need To Know
Clocking in with PilieroMazza: The Labor Equation: Pricing for Success
Webinar: Is Your DEI Policy Setting You Up for a Lawsuit?
DE Talk Podcast | The Platinum Rule of Diversity, Equity, & Inclusion
DE Talk Podcast | Embracing Generational Differences at Work
What's the Tea in L&E? Truth Hurts or Rumors? Lizzo’s Harassment Allegations Serve As A Good Reminder
Transforming Leadership with Wisdom from the LGBTQ Community: On Record PR
DE Talk | From Human “Doing” to Human “Being”: Transforming to Own Your 50
Employment Law Now VII-137 - Training Managers to Manage and Avoiding The Peter Principle
DE Talk | Uncovering the Non-Traditional Workforce: Recruiting & Retaining Talent in Addiction Recovery
Cybersecurity: What Healthcare Providers Need to Know
DE Talk | Moving Off the DEIB “Treadmill” & Onto Progressive Change
Compliance Training & Adult Learning Theory
DE Talk | Top 5 Actions to Take After You Complete Your Affirmative Action Plan
What’s the Tea in L&E? Is There Such a Thing as a Purely Verbal Counseling?
California Employment News: The Basics of Mandatory Harassment Prevention Training
Podcast: California Employment News - The Basics of Mandatory Harassment Prevention Training
Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more
Fight back against this major cyber threat. Business Email Compromise is one of the greatest cyber threats to businesses of all sizes and industries, particularly those involved in regular wire transfers of funds....more
- A tone-at-the-top business culture with CEO leadership is a critical component of effective anti-corruption and anti-bribery policy implementation. - CEO leadership helps set an example for lower management and company...more
Risk Management Question - What precautions can law firms, along with their lawyers and staff, take when they receive an unexpected request for protected health information (PHI) from someone claiming to be a...more
We all have been trained to look at website addresses with a critical eye to make sure they have “https,” as those websites are supposed to be secure. The “s” at the end signifies to us that it is secure. The lock at the...more
Computer systems around the world have been impacted by the largest cyber-extortion attack in history. According to news reports, the “ransomware” attack hit more than 200,000 victims in 150 countries since it started on...more
Enforcement activity under the Obama administration often made headlines for the eye-popping level of fines, with the Foreign Corrupt Practices Act (FCPA), Anti-Money Laundering (AML) regulations, and economic sanctions...more