Workplace Sexual Assault and Third-Party Risk: What’s the Tea in L&E?
From Forest to Fortune: Navigating Workplace Ethics With Robin Hood — Hiring to Firing Podcast
Innovation in Compliance: Mastering Communication: Insights from Dr. Dennis Cummins on Speaking and Selling without Selling
Great Woman in Compliance: The Power of Vulnerability with Cricket Snyder
Innovation in Compliance: The Power of Accountability and Team Culture with Gina Cotner
2 Gurus Talk Compliance: Episode 55 – The From Worse to Worser Edition
Compliance Tip of the Day: COSO Governance Framework: Part 4, Culture
Tips for Conducting a Trade Secret Assessment with Rob Jensen
New Virginia "Workplace Violence" Definition and Healthcare Reporting Law: What's the Tea in L&E?
Work This Way: An Employment Law Video Podcast | Episode 51: Smarter Recruiting Strategies with Rhiannon Poore of Forge Search
Daily Compliance News: July 8, 2025, The Learning on the Job Edition
Summer Strategies for Work Success
Work this Way: An Employment Law Video Podcast | Episode 49: Building Culture by Investing in People with Silvia King of Southern First Bank
Performance Reviews: Lessons from Severance — Hiring to Firing Podcast
Coffee Badging: Mastering the Art of Office Presence — Hiring to Firing Podcast
Creativity and Compliance: Nourish Your Audience: A New Approach to Compliance Training
Work This Way: A Labor & Employment Law Podcast | Episode 47: Coaching Leaders & Building Culture with Robyn Knox of The HR Business Connect
Sunday Book Review: May 18, 2025, The Books on Engaged Training Edition
How Modern Workplaces Navigate Generational Shifts: One-on-One with Jeff Landes
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
In its FY 2026 budget, Ohio quietly folded in a sweeping cybersecurity mandate that will require every “political subdivision” to have a cybersecurity program that aligns with recognized industry frameworks and adopt strict...more
Artificial intelligence (AI), machine learning algorithms, and other emerging technologies impact nearly every business and industry. The rapid deployment of Generative AI (GenAI) is reshaping how organizations do business...more
Ensure your vendors are crisis-ready by recognizing these key indicators of weak continuity planning. The interconnected nature of modern business means that your vendors’ operational resilience can, and frequently does,...more
Employee security awareness training is a best practice and a “reasonable safeguard” for protecting the privacy and security of an organization’s sensitive data. The list of data privacy and cybersecurity laws mandating...more
Tomorrow is International Data Privacy Day, so a happy day to all! More seriously, data privacy concerns and legislation continue to rapidly increase. It has been estimated that by the end of 2024 more than 75 percent of...more
After years of anticipation, the Federal Acquisition Regulation (FAR) Council has announced the arrival of its proposed rule to enhance the safeguarding of Controlled Unclassified Information (CUI) in federal contracts (the...more
On October 2, 2024, New York adopted new regulations requiring general hospitals to implement heightened cybersecurity safeguards. General hospitals, as defined in Article 28 of the NY Public Health Law, generally must begin...more
The NIS 2 Directive requires a wide range of in-scope organizations to adopt robust cybersecurity measures and incident response plans....more
Think of it as the compliance version of The Butterfly Effect – a small, unnoticed, action, or failure to act, somewhere in the organization that balloons over time into a much larger, material issue. Maybe an employee is...more
On July 26, 2023, the Securities and Exchange Commission (SEC) implemented new cybersecurity rules to require disclosure of material cybersecurity incidents within four business days, with limited exceptions. Additionally,...more
EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more
As we pass the half-way mark of 2022, many are reflecting on their privacy compliance progress. One area that seems to be a constant battle is training. How much is needed? What kind of training? What are expectations from...more
How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more
In many ways, the COVID-19 pandemic has served as a prime example of punctuated equilibrium. Shifts that have been slowly building for decades seemingly occurred overnight, giving us the contradictory sense that these changes...more
While hindsight may be 20/20, how can we use this to gain foresight into 2021? The last twelve months have permanently altered the role of risk and compliance—increasing it in scope and elevating the function to a...more
The global food and beverage e-commerce market is expected to grow to $22.4 billion in 2020, possibly reaching $36.4 billion in 2023. That’s up from $14.9 billion in 2019. Food and beverage e-commerce revenue in the United...more
The coronavirus crisis is far from over, and compliance professionals still need every scrap of guidance that regulators can provide about how to run compliance programs in these difficult times. So when the Securities and...more
We recently reported on the New York State Department of Financial Services' (DFS) first enforcement action under its 2017 cybersecurity regulation ("Part 500"), which prescribes how financial services companies licensed to...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
We are excited to bring the healthcare compliance sessions and updates to you as an interactive, online experience. Watch, listen, and ask questions. Each hour, attendees will be able to select from four concurrent sessions....more
This two-day Regional Compliance and Ethics Conferences provide attendees with a forum to interact with local compliance professionals, share information about your compliance successes and challenges, and create educational...more
Our Regional Compliance Conferences provide attendees with a forum to interact with local compliance professionals, share information about your compliance successes and challenges, and create educational opportunities for...more
When the federal government fails to assume responsibility for establishing law and policy in important federal areas of jurisdiction, the individual states then spring into action to fill the vacuum. ...more
Companies are hyper-focused on third-party risks, especially when it comes to anti-corruption risks. And for good reason – a large percentage of FCPA enforcement actions involve illegal use of third parties to carry out...more
The global chaos unleashed by the WannaCry ransomware virus reinforces that cyberattacks are not just the problem of IT departments. Compliance must play an integral part of any organization’s cross-functional cybersecurity...more