Testing Your Compliance Program
Regulatory vs. Business Compliance
Grupo Empresarial y Control … ¿a qué te cojo ratón?
Episode 344 -- SEC Settles FCPA Case with Moog for $1.7 Million
Episode 342 -- How to Conduct an Internal Compliance Site Visit and Review
Enhancing Compliance: The Power of Independent Monitorships in Consumer Protection — Regulatory Oversight Podcast
Episode 331- NAVEX State of Risk and Compliance Programs
What the Board Should Be Asking About the Compliance Program
Common Scenarios Triggering False Claims Act Violations, Part 3: Claims and Investigations
Compliance into the Weeds: Of Fat Fingers, Internal Controls and Compliance
Vicky Hanks of Blake Morgan on Building an Effective Employee Brand - Passle's CMO Series Podcast
Better Investigative Interviewing
Hot Topics in International Trade
Episode 301 -- Steve Naughton on Compliance and Complaince Education at Loyola Law School Program
Episode 298 -- Electronics Communications Risks and Ephemeral Messaging
Episode 297 -- Susan Divers on LRN's 2023 Program Effectiveness Report
The Justice Insiders Podcast: SEC Plays Chicken with Jarkesy
JONES DAY TALKS®: The Evolution of Corporate Compliance Programs: Key Issues for Multinational Companies
Compliance & Disaster Preparedness
Compliance Series Part 3: Ensuring Compliance Programs are Effective
There is no better real-world example of significant data ethics complexities than Facebook. The data privacy scandal that has emerged over the past few years is a unique educational tool for any compliance professional or...more
Are you tasked with compliance management on a small team or for a smaller organization? Compliance professionals who manage programs for smaller organizations or with limited teams can face unique, sometimes daunting,...more
We have received several requests for a list of the compliance policies that make sense for every multinational company. So, as a follow-up to our earlier two posts providing “twelve steps to international compliance” (see...more
In July, the Innovation, Cybersecurity and Technology Committee of the National Association of Insurance Commissioners (NAIC) released an exposure draft of its model bulletin titled “Use of Algorithms, Predictive Models, and...more
In-person is back! Join us in Amsterdam for the 2023 European Compliance & Ethics Institute! Strengthen your compliance and ethics program by attending our 11th annual European Compliance and Ethics Institute, 20-22 March...more
Brazil’s Anti-Corruption and Compliance Community Will Gather for Large, 1:1 and Smaller-Group Discussion! As the longest-standing anti-corruption and compliance gathering in Brazil, Summit on Anti-Corruption Brazil is...more
Matt Kelly, Editor & CEO of Radical Compliance makes a strong case in this podcast for a need to reassess cyber risk. It is becoming, he says, less of a technical issue and more about how companies interact with others: ...more
It’s no secret that compliance is a huge part of a corporate lawyer’s job. Whether it’s internal or external compliance, there’s a lot that needs to be done to keep a business operating smoothly and on the right side of the...more
Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more
Compliance teams looking to stay ahead of the changing landscape need to be up to date on the latest developments. Join us for Global Compliance Updates in collaboration with the DIFC Academy, on 2–3 November 2021. This...more
An executive order was signed on May 12, directing the federal government to overhaul its approach to cybersecurity. Corporate compliance and risk management professionals should consider this order carefully — because, in...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
The growing frequency and public awareness of cyberincidents, evolution of technologies employed by intruders, and proliferation of personal data and infrastructure vulnerable to attack have all contributed to heightened...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
Cybersecurity and Privacy - Despite cries from corporations and privacy advocates across America for a unified federal privacy law, the nation’s toughest privacy law—the California Consumer Privacy Act (CCPA)—went into...more
The Ponemon Institute recently issued its 2020 Cost of insider Threats Global Report, which finds that the frequency and cost of insider threats is continued to increase. Sponsored by ObserveIT and IBM, the 2020 report is the...more
Over the past nine months in Hong Kong, luxury retailers have encountered a challenging market. Hong Kong has traditionally been a popular destination for Mainland Chinese seeking to purchase luxury goods, but recent...more
Our Basic Academies are ideal for professionals with some compliance knowledge and experience who are ready to support, enhance and manage a comprehensive compliance program. They are taught by compliance professionals,...more
We all know that businesses rely on a large number of third-party vendors to support their business operations. Many of these third parties require access to a company’s data and its internal information and technology...more
Robinson+Cole has the distinct pleasure to host the CISO Executive Network in Hartford and Boston. It is an opportunity to hang out with Chief Information Security Officers (CISOs), develop relationships with them, discuss...more
Every company should expect that at some point it will experience a data breach. Whether as a result of hackers, disgruntled employees, or careless acts such as losing an unencrypted phone or laptop, data breaches may subject...more
In this episode, the third of three building on Akin Gump’s annual Top 10 Topics for Directors report, partner Michelle Reed discusses the critical question of cybersecurity and the corporate world. Among the topics covered: ...more
• The NFA has determined that registered CPOs must implement an internal controls system and highlighted best practices for such a framework. • In response to certain frequently asked questions, the NFA has also updated its...more
In the aftermath of the Securities and Exchange Commission’s (“SEC”) latest Report of Investigation (“Report”) regarding cyberattacks via “spoofed or manipulated electronic communications,” companies should prepare to adjust...more