Compliance into the Weeds: The Dark Side of AI in Employee Training
What to Do When Leadership Doesn’t Take Compliance Seriously
Compliance Tip of the Day - The ROI of Compliance
Moving Beyond the Usual Helpline Data
Avoiding a Bored Board
Compliance Tip of the Day: Compliance Responses to Design Intelligence
Compliance Tip of the Day: Avoiding CCO Liability
#Risk New York Speaker Series: Exploring AI Risks in Compliance with Gwen Hassan
Everything Compliance: Episode 155, To Tesla and Beyond Edition
Great Women in Compliance: Culture. Data. Ethics with Hui Chen
Compliance Amidst a Global Consensus Breakdown
Great Women in Compliance – Compliance is the Floor, Ethics is the Ceiling with Ellen Hunt
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
FCPA Compliance Report: Upping Your Game in Compliance
Compliance Tip of the Day: Empowering Middle Managers to Drive Compliance Transformation
Creativity and Compliance: From Compliance Enforcers to Trusted Advisors: The Path Forward
Compliance Tip of the Day: Middle Managers as the Eyes and Ears of Compliance
Great Women in Compliance: Exploring the Future of Compliance - Key Takeaways from Compliance Week 2025
Mistakes Lawyers Should Avoid When Moving into Compliance
Innovation in Compliance: Exploring the Fractional COO Model with La Tonya Roberts
As AI adoption accelerates in healthcare, compliance, privacy, and risk teams are under pressure to adapt. Join experts from NAVEX and Granite GRC to learn how a proactive AI governance strategy can help you stay compliant,...more
Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more
Getting a successful risk management program off the ground can be daunting for even the most intrepid information security professionals. It doesn’t have to be rocket science. In this webinar, we’ll explore with guest...more
Learning Objectives: - Learn the technical dos and don’ts in implementing security compliance frameworks such as SOC 2, ISO 27001 and HIPAA - Discussion about why security compliance is so critical for organizations...more
Currently defense contractors who receive or create Controlled Unclassified Information (“CUI”) from or for the U.S. Department of Defense (“DoD”) are subject to several contract-based cybersecurity requirements, including...more
What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more
October is cybersecurity awareness month. So, what better time than now to talk about the more detailed proposals emerging from the current administration to strengthen cybersecurity, and how compliance officers and CISOs...more
In many ways, the COVID-19 pandemic has served as a prime example of punctuated equilibrium. Shifts that have been slowly building for decades seemingly occurred overnight, giving us the contradictory sense that these changes...more
In February 2021, Virginia became the second state – after California – to enact state consumer data privacy legislation – the Virginia Consumer Data Protection Act (CDPA). During this webinar, we will analyze the CDPA. ...more
With state legislatures reconvening for 2021, numerous states already have seen California Consumer Privacy Act-like privacy legislation proposed, including Washington, New York and Minnesota. Other states are expected to...more