Workplace Sexual Assault and Third-Party Risk: What’s the Tea in L&E?
From Forest to Fortune: Navigating Workplace Ethics With Robin Hood — Hiring to Firing Podcast
Innovation in Compliance: Mastering Communication: Insights from Dr. Dennis Cummins on Speaking and Selling without Selling
Great Woman in Compliance: The Power of Vulnerability with Cricket Snyder
Innovation in Compliance: The Power of Accountability and Team Culture with Gina Cotner
2 Gurus Talk Compliance: Episode 55 – The From Worse to Worser Edition
Compliance Tip of the Day: COSO Governance Framework: Part 4, Culture
Tips for Conducting a Trade Secret Assessment with Rob Jensen
New Virginia "Workplace Violence" Definition and Healthcare Reporting Law: What's the Tea in L&E?
Work This Way: An Employment Law Video Podcast | Episode 51: Smarter Recruiting Strategies with Rhiannon Poore of Forge Search
Daily Compliance News: July 8, 2025, The Learning on the Job Edition
Summer Strategies for Work Success
Work this Way: An Employment Law Video Podcast | Episode 49: Building Culture by Investing in People with Silvia King of Southern First Bank
Performance Reviews: Lessons from Severance — Hiring to Firing Podcast
Coffee Badging: Mastering the Art of Office Presence — Hiring to Firing Podcast
Creativity and Compliance: Nourish Your Audience: A New Approach to Compliance Training
Work This Way: A Labor & Employment Law Podcast | Episode 47: Coaching Leaders & Building Culture with Robyn Knox of The HR Business Connect
Sunday Book Review: May 18, 2025, The Books on Engaged Training Edition
How Modern Workplaces Navigate Generational Shifts: One-on-One with Jeff Landes
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
I didn’t plan on working in cybersecurity. My path wasn’t exactly traditional, but every job I had taught me how systems break—technical or operational, it didn’t matter. ...more
Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more
Artificial intelligence (AI) is everywhere these days, including your workplace. While there is no one-size-fits-all AI policy that will work for every company, here are our general thoughts about how employers can...more
Most human resources professionals are concerned about the privacy and security of the vast amounts of personal information they manage. This article discusses steps to consider taking against the challenges. Deluge of...more
EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more
Most businesses began 2021 with ambitions to return to the office. But in keeping with a trend of disruption, we are faced with new COVID variants, questions on when and how schools will respond, a cultural shift towards...more
In many ways, the COVID-19 pandemic has served as a prime example of punctuated equilibrium. Shifts that have been slowly building for decades seemingly occurred overnight, giving us the contradictory sense that these changes...more
As a result of the COVID-19 pandemic, millions of Americans have deserted the physical workplace. Modern technology and remote access capabilities have made it possible to transform almost any job to a telework position. As...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
The Internet Society’s Online Trust Alliance just released its 2018 Cyber Incident & Breach Trends Report, which says “2018–Some Better, Some Worse, All Bad.” That’s our experience, too. Below are our highlights from the...more
Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more
October is Cybersecurity awareness month. Now is a better time than ever to look at your current practices at the office and even at home. It is important to know that we all play a role in keeping our work and personal data...more
According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more
I had the pleasure of moderating an excellent panel at the Advanced Cyber Security Center’s annual conference on November 4. The panel’s topic for discussion was “What is Reasonable in Cybersecurity: Responsibility and...more
A timely new resource for business executives, technology professionals, and lawyers alike is the newly-published Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers from the New York...more