News & Analysis as of

Risk Management Policies and Procedures Risk Assessment

Accelerynt, Inc.

How I Learned to Prioritize in Cybersecurity—and Why It Changed Everything

Accelerynt, Inc. on

I didn’t plan on working in cybersecurity. My path wasn’t exactly traditional, but every job I had taught me how systems break—technical or operational, it didn’t matter. ...more

A&O Shearman

FCA findings on risk and wind-down planning in payment and e-money firms

A&O Shearman on

The UK Financial Conduct Authority (FCA) has published the findings of its multi-firm review into risk management and wind-down planning across e-money and payment firms. While the FCA had observed examples of good practice...more

Thomas Fox - Compliance Evangelist

Compliance Tip of the Day: Assessing Internal Controls

Welcome to “Compliance Tip of the Day,” the podcast that brings you daily insights and practical advice on navigating the ever-evolving landscape of compliance and regulatory requirements. Whether you’re a seasoned compliance...more

Paul Hastings LLP

The Changing Cyber Threat Landscape and Lessons Learned From Data Breaches

Paul Hastings LLP on

Last month, Paul Hastings sponsored the Cybersecurity Law Workshop at the Spring Privacy & Security Forum held at George Washington University in Washington, D.C. The Cybersecurity Law Workshop featured three panels of...more

Dentons

Ep. 67 – Integrating Quality & Safety into Your Compliance Program (Replay of Ep. 18)

Dentons on

If you’re trying to strengthen your organization’s compliance program, one of the most important recommendations from the Office of Inspector General’s (OIG) General Compliance Program Guidance is to integrate quality and...more

Thomas Fox - Compliance Evangelist

Compliance Tip of the Day: COSO Objective 5 – Monitoring Activities

Welcome to “Compliance Tip of the Day,” the podcast that brings you daily insights and practical advice on navigating the ever-evolving landscape of compliance and regulatory requirements. Whether you’re a seasoned compliance...more

Compliance and Ethics: Ideas & Answers

The Code Behind the Culture: Peer Benchmarking on Codes and Policy Management

An organization’s code of conduct often serves as the foundation upon which other elements of the compliance program—such as employee training and communications—are built. More than just a tool for establishing baseline...more

TNG Consulting

Should Clinicians on BITs Evaluate Risk?

TNG Consulting on

Clinicians play a crucial role in Behavioral Intervention Teams (BITs) and may be tasked with conducting certain types of risk assessments. However, this responsibility may not always align with their role. Their expertise is...more

TNG Consulting

Mandated Risk Assessment of Students: Part One – Authority to Mandate

TNG Consulting on

At NABITA, we are often asked whether a Behavioral Intervention Team (BIT), CARE team, Behavioral Threat Assessment and Management (BTAM) team, or, in some instances, the Threat Assessment Team (TAT) has the authority to...more

NAVEX

The Art of Compliance Testing and Monitoring

NAVEX on

Among all the elements of a corporate compliance program, perhaps the most difficult piece to understand is the testing and monitoring of your controls. Clearly the two are important. The U.S. Justice Department says so in...more

Farella Braun + Martel LLP

Fraud Risks in Nonprofit Organizations: Building an Effective Framework of Internal Controls

Fraud prevention is a critical issue for nonprofit organizations. Without the right safeguards, fraud can severely damage an organization’s reputation and financial health. Nonprofits, particularly those that grow rapidly or...more

Morris, Manning & Martin, LLP

AI Compliance and Governance for Professional Services Firms

Law firms, accounting firms, and consulting firms are embracing AI to improve efficiency, deliver insight, and stay competitive. But without intentional governance, compliance, and policy frameworks, these innovations can...more

Guidepost Solutions LLC

How to Make Smart Security Investments in Large-Scale Design Projects

When planning a major design development project, whether it’s a corporate campus, data center, or mixed-use facility, deciding how much to invest in security can be a complex question. A practical, risk-based approach to...more

Amundsen Davis LLC

Developing Effective Workplace Violence Programs in Health Care: Protecting Those Who Care for Us

Amundsen Davis LLC on

High rates of violent acts against heath care workers pose a serious risk to the safety and wellbeing of the medical and support professionals on the front lines of patient care. Studies show that health care workers are five...more

SEC Compliance Consultants, Inc. (SEC³)

Top Compliance Program Mistakes (and How to Avoid Them) (Part 1 of 2)

Chief Compliance Officers face the challenge of running a comprehensive yet efficient compliance program that nimbly adapts to changing regulatory requirements and business practices. As compliance consultants, we see our...more

Guidepost Solutions LLC

Why Schools Should Start Security Planning Now: Leveraging Summer to Build Safer Campuses

As the end of the academic year approaches, school administrators face a critical but often overlooked opportunity: the chance to proactively plan for next year’s physical security needs. School safety is always a top concern...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Basic Compliance Academy - July 21st - 24th, Nashville, TN

Grounded in the OIG’s General Compliance Program Guidance and DOJ’s Evaluation of Corporate Compliance Programs, our immersive, three-and-a-half-day, classroom-style Healthcare Basic Compliance Academy equips compliance...more

BakerHostetler

[Podcast] Rev Up! Ready or Not, Here AI Comes!

BakerHostetler on

Ashley’s guest today is Theresa Weisenberger, a partner at BakerHostetler and co-leader of BakerHostetler’s Artificial Intelligence practice. Theresa also co-leads BakerHostetler’s IP & Technology Transactions and...more

Ankura

Generative AI Risks: Legal and Compliance Insights - Part 2

Ankura on

The Bottomline: Five Practical Steps for Generative AI Risk Management - As the first line of defense, employees within business operations must own and manage risks related to the business, including risks resulting from...more

Thomas Fox - Compliance Evangelist

FCPA Compliance Report: Amanda Carty on a Due Diligence and Risk Management

In this episode of the Diligent Compliance Week 2025 Speaker Preview Podcasts series, Amanda Carty discusses her presentation at Compliance Week 2025, “Going Beyond Due Diligence in Risk Management.” Some of the issues she...more

Society of Corporate Compliance and Ethics...

[Event] Basic Compliance & Ethics Academy - July 7th - 10th, Singapore, Singapore

Ideal for practitioners who want to build strong foundational knowledge of compliance program management and how to apply that knowledge in practice. Attendees will come away better prepared to support, enhance, and manage a...more

Gardner Law

From Paper to Practice: Compliance Policies that Work

Gardner Law on

In the FDA-regulated industry, a compliance program isn’t just a formality—it’s a critical tool for protecting your business, patients, and reputation. Still, too many companies treat compliance policies as static...more

Society of Corporate Compliance and Ethics...

[Event] Basic Compliance & Ethics Academy - June 23rd - 26th, Brussels, Belgium

Ideal for practitioners who want to build strong foundational knowledge of compliance program management and how to apply that knowledge in practice. Attendees will come away better prepared to support, enhance, and manage a...more

Ankura

Remediation Happens: How To Identify, Mitigate and Resolve Related Risks

Ankura on

Remediation occurs for a host of reasons. You may identify remediation risk from internal activities (e.g., an audit, a control break) or external activities (e.g., a complaint, a regulatory exam, a lawsuit). Sometimes a...more

Hogan Lovells

NIST finalizes cybersecurity incident response framework profile aligned with CSF 2.0

Hogan Lovells on

On April 3, NIST published practical incident response guidance aligned with its CSF 2.0 framework. The guidance outlines best practices in security incident preparation and response for organizations mapped across each of...more

187 Results
 / 
View per page
Page: of 8

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide