Understanding BBB Ratings: Building Trust and Mitigating Risks — Regulatory Oversight Podcast
Episode 379 -- Update on False Claims Act and Customs Evasion Liability
Daily Compliance News: July 22, 2025, The I-9 Hell Edition
Compliance Tip of the Day: Avoiding CCO Liability
2 Gurus Talk Compliance: Episode 55 – The From Worse to Worser Edition
Daily Compliance News: July 17, 2025, The COSO Yanked Edition
Wire Fraud Litigants Beware: Fourth Circuit Ruling Protects the Banks — The Consumer Finance Podcast
All Things Investigation: Due Diligence and Drama: A Deep Dive into Art World with Daniel Weiner
Daily Compliance News: July 14, 2025, The Secret Business Sauce-Reading Edition
Adventures in Compliance: The Novels – The Hound of the Baskervilles: Uncovering Compliance – Lessons from The Hound of the Baskervilles
Compliance Tip of the Day: Lessons from Internal Control Failures
Adventures in Compliance: The Novels – The Hound of the Baskervilles, Introduction and Compliance Lessons Learned
Compliance Tip of the Day: Assessing Internal Controls
False Claims Act Insights - Bitter Pills: DOJ Targets Pharmacies for FCA Enforcement
The Dark Patterns Behind Corporate Scandals
Great Women in Compliance: GWIC X EC Q2 2025 - Exploring Compliance Innovations
Upping Your Game: Crowd - Sourcing Risk Management Intelligence with AI
FCPA Compliance Report: Fraud Risk Management - Insights and Experiences with Peter Schablik
10 For 10: Top Compliance Stories For the Week Ending June 21, 2025
Daily Compliance News: June 20, 2025, The Death of the Business Card Edition
This odyssey began when an old laptop was discovered by a curious 14-year-old boy in Kansas. The boy, known only as “QR,” used it to sneak onto a handful of adult websites over two months last year, racking up 118 virtual...more
For multinational corporations looking to establish a presence in Asia, the creation of regional offices in locations such as Hong Kong or mainland China can be a strategic move. Setting up these so-called ‘satellite offices’...more
The FBI is warning employers about increasing security risks from fraudulent job applications, resulting in hackers infiltrating companies and gaining access to sensitive data. To protect against these risks, employers should...more
While companies increase focus on external risks by enhancing regulatory compliance, anti-corruption policies, and cybersecurity, they must not lose sight of internal risks, including internal fraud and embezzlement....more
There is nothing so central to wage-hour laws than the sacred domain of “hours worked.” The concept is simple: employees record the time they spend working, and from this data employers generate labor budgets and employee pay...more