Meeting the Needs of General Counsel: Beyond the Basics of Legal Advice - On Record PR
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
A Third Party's Perspective on Third Party Risk
Why Time Matters: Partners Lindsay Gerdes and Michael J. Bronson on Swift Action in Government Investigations
Consumer Finance Monitor Podcast Episode: Why do Fintechs Want to Become Banks?
Privacy Issues from Third-Party Website Tags
What's the Tea in L&E? Employee Devices: What is #NSFW?
Episode 331- NAVEX State of Risk and Compliance Programs
What the Board Should Be Asking About the Compliance Program
Video: Artificial Intelligence Use in Political Campaigns
Episode 329 -- Bryn Sedlacek from Aravo on TPRM Holistic Risks and Unified Visibility
Compliance Lessons from Dating in Your 50s
The Justice Insiders Podcast - AI-Washing: Everything Old Is New Again
The AI Shakeup: New Tech Innovations and the Future of Corporate Law
Principled Podcast: S11E7 | Fortifying Ethical Frameworks: Navigating Emerging Risks in the Middle East
Managing Compliance Risk for Human Trafficking and Modern Slavery
Common Scenarios Triggering False Claims Act Violations, Part 3: Claims and Investigations
Navigating Bank-Fintech Partnerships: Avoiding Common Pitfalls — The Consumer Finance Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
Revisiting Financial Institution Incentive Compensation Rules Under Dodd-Frank — The Consumer Finance Podcast
California recently released GenAI Guidelines for Public Sector Procurement, Uses and Training, as well as a GenAI Risk Assessment. What do you need to know? Key points: •Generative Artificial Intelligence (GenAI) is...more
Introduction - Over 400 New South Wales (NSW) government entities, including government agencies, state owned corporations, and councils (collectively, Covered Entities) are required to conduct modern slavery due diligence...more
This paper emphasizes the significance of risk and dispute management during the lifecycle of a construction project, highlighting how the early detection of issues can contribute to successful project outcomes. It emphasizes...more
President Biden signed into law on December 23 legislation that will, for the first time, require U.S. Customs and Border Protection (“CBP”) to detain all imports that are made wholly or partly in the Xinjiang Uyghur...more
On December 15, 2021, Congress passed the National Defense Authorization Act (NDAA or Act) for Fiscal Year (FY) 2022, which President Biden is expected to sign into law soon. As usual, the NDAA contains numerous provisions...more
Consumer companies around the world are incorporating sustainability, business integrity, and brand purpose into their business operations. This can include procuring ethically sourced products, ensuring fair pay, or...more
On December 20, 2019, President Trump signed into law the National Defense Authorization Act for Fiscal Year 2020 (“NDAA 2020”), which includes numerous sanctions-related provisions. The law includes the previously introduced...more
Maria Panichelli and Robert Ruggieri are presenting a 3-part educational webinar series for the Virginia Procurement Technical Assistance Program on contract performance. Part II - Using the CDA Litigation Process to Resolve...more
Global companies need to actively work to prevent fraud and corruption. Fraud and corruption go hand-in-hand. To commit bribery, bad actors have to gain access to money for unauthorized (illegal) purposes. A failure to...more
Compliance practitioners are opportunists. They have to look for openings in the corporate resource world to build partnerships with related functions. To put it another way, they are purveyors of compliance thinking – they...more
Third party risk management is easily one of the most challenging risks for compliance officers. With all the attention and hype surrounding third party risk, companies have marshaled attention and resources to mitigate the...more
The headlines about massive cyber-security breaches just keep coming these days. Corporate giants Vodaphone, Home Depot, Talk Talk and JP Morgan Chase have all been hacked—to and they're far from the only ones.. But the...more
Today as companies increasingly realize the value of strong cybersecurity, those CIOs who successfully implement an effective cybersecurity system should be viewed as a critical part of the revenue generation effort. An...more
New laws and regulations require contractors who supply information technology in their products to control supply chain risk. The US Government (USG) has adopted a series of laws and regulations that focus increased...more