8 Key Takeaways | Strategies to Drive Influence With and Without Authority
Moving Beyond the Usual Helpline Data
Nonprofit Basics: Grant Agreement Best Practices
From Forest to Fortune: Navigating Workplace Ethics With Robin Hood — Hiring to Firing Podcast
Adventures in Compliance: The Novels - The Valley of Fear, Introduction and Compliance Lessons Learned
[LEGAL MARKETING MOMENTS] A Simple Tip to Master Generative AI Prompts
FCPA Compliance Report: 10 Core Principles for Effective Internal Investigations with Michelle Peirce
Avoiding a Bored Board
Compliance Tip of the Day: Crowd Sourcing Risk Intelligence
Great Women in Compliance: The Compliance Influencer with Bettina Palazzo
Innovation in Compliance: The Power of Accountability and Team Culture with Gina Cotner
Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Julie Mortimer of Mills & Reeve on The Right Way to Kickstart Your CRM Strategy - Passle's CMO Series Podcast EP176
Compliance Tip of the Day: COSO Governance Framework: Part 4, Culture
Tips for Conducting a Trade Secret Assessment with Rob Jensen
Bar Exam Toolbox Podcast Episode 318: Quick Tips -- The Final Two-Week Bar Exam Countdown
Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
Work This Way: An Employment Law Video Podcast | Episode 51: Smarter Recruiting Strategies with Rhiannon Poore of Forge Search
California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
Compliance Tip of the Day: Assessing Internal Controls
Social media is used by both organizations and employees—as a marketing tool for business, for entertainment, or for interacting with friends and family....more
Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more
Several federal agencies have teamed up to warn healthcare employers of the increased threat they face as a result of malicious cybercriminals aiming to take advantage of the pandemic to wreak havoc on their operations. The...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more