Meeting the Needs of General Counsel: Beyond the Basics of Legal Advice - On Record PR
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
A Third Party's Perspective on Third Party Risk
Why Time Matters: Partners Lindsay Gerdes and Michael J. Bronson on Swift Action in Government Investigations
Consumer Finance Monitor Podcast Episode: Why do Fintechs Want to Become Banks?
Privacy Issues from Third-Party Website Tags
What's the Tea in L&E? Employee Devices: What is #NSFW?
Episode 331- NAVEX State of Risk and Compliance Programs
What the Board Should Be Asking About the Compliance Program
Video: Artificial Intelligence Use in Political Campaigns
Episode 329 -- Bryn Sedlacek from Aravo on TPRM Holistic Risks and Unified Visibility
Compliance Lessons from Dating in Your 50s
The Justice Insiders Podcast - AI-Washing: Everything Old Is New Again
The AI Shakeup: New Tech Innovations and the Future of Corporate Law
Principled Podcast: S11E7 | Fortifying Ethical Frameworks: Navigating Emerging Risks in the Middle East
Managing Compliance Risk for Human Trafficking and Modern Slavery
Common Scenarios Triggering False Claims Act Violations, Part 3: Claims and Investigations
Navigating Bank-Fintech Partnerships: Avoiding Common Pitfalls — The Consumer Finance Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
Revisiting Financial Institution Incentive Compensation Rules Under Dodd-Frank — The Consumer Finance Podcast
In today's digital landscape, where data is often dubbed the "new oil," ensuring the smooth operation of databases is crucial for businesses. Regular oversight, including monitoring database metrics, is essential to optimize...more
Process inefficiency can create problems that quietly stifle productivity and potential growth. In an era of rapid digitalization, companies that lag in business process improvement risk falling behind competitors who embrace...more
Over the past few decades, the commodity and energy trading and risk management (C/ETRM) landscape for the natural gas industry has been stable, dominated by a select few big players in the market – namely, ION Endur or...more
The name denotes the systems are focused on improving operations in trading and risk, but what’s in it for other business stakeholders who support the transaction lifecycle? We will highlight the top advantages our team has...more
Cybersecurity continues to be top of mind for federal and state policymakers. This advisory identifies and analyzes some major recent developments that present opportunities and challenges in the coming months for a broad...more
Approximately one year ago, in the immediate wake of Russia’s full-scale invasion of Ukraine, the United States (U.S.), United Kingdom (UK), and European Union (EU) launched a global sanctions campaign against Russia that...more
Business processes can get complicated over time in any organization. A fitting example of a core business process is the processing of payable invoices. The old-fashioned way of processing invoices is to receive the invoices...more
Getting the most out of your energy trading and risk management (ETRM) system means taking an ecosystem perspective to technology decisions that aim to extend and enhance the inherent capabilities of the platform. We’ve...more
Technology is at the forefront of minimizing the negative impacts of constant change. We seek out advancements to modernize business, sequence our day, and make our lives easier. Among these advancements in the business...more
I had the pleasure of moderating one of the panels at the World Oilman’s Minerals and Royalty Conference (MARC) held in Houston. The title of our session was “Managing Risk”, which of course is an extremely broad topic. We...more
Optimization tools are powerful additions to the arsenal of business systems for any company. The tools leverage the transactional advantages afforded by the discipline and interconnectedness of energy trading and risk...more
The full-scale invasion of Ukraine by a revanchist Russia continues to dominate headlines as the war enters its second month. While the sometimes-terrible choices facing those living in the conflict zone are unparalleled,...more
The U.S. Transportation Security Administration (TSA) issued its second Security Directive to the pipeline industry on July 20, 2021, following the Colonial Pipeline cybersecurity incident. ...more
Find out why an effective risk management strategy requires developing robust economic forecasting tools that simulate future cash flows. One such tool uses the “real-option” theory to model flexibility associated with energy...more
We all know and hear about third-party risks – over and over again. Despite this recurring theme, organizations continue to pay the price for failing to address third-party issues. It does not take a rocket scientist to...more
FCPA settlement actions often underscore specific compliance risks for legal and compliance professionals. If there ever was a case where third-party risks were bungled, and even intentionally embraced, the Foster Wheeler...more
Unravel the multiple layers of primary and secondary Russia Sanctions and strengthen your analytical decision-making process. The Russia sanctions landscape continues to evolve in many significant ways. ACI’s 4th...more
New cybersecurity requirements for oil and gas pipelines signal important changes to the regulatory landscape for midstream companies. A new security directive from the Transportation Security Administration (TSA), effective...more
Linear infrastructure projects, including oil and gas pipelines, electric transmission lines and transportation, have faced a number of regulatory challenges over the last year. Some of these challenges stem from changes in...more
Since the enactment of the Jones Act, courts have wrestled to define "seaman" and who is entitled to remedies under the Jones Act. The Jones Act grants a "seaman" a negligence cause of action against his employer and only a...more
The recent Colonial Pipeline ransomware event provides a strong incentive for organizations to evaluate their resiliency to cyberattacks. With ransomware being the No. 1 concern for many Security Officers surveyed in a recent...more
Find out why the cyberattack on Colonial Pipeline will have broad implications on how the energy industry defends and responds to future incidents....more
Find out why developing and continually maintaining a business continuity plan can help energy companies better prepare for unexpected disturbances....more
Find out why risk control and IT need to be aligned to gain maximum value in real-time commodity position and exposure reporting....more