We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One
Creativity and Compliance: Reinventing Compliance with Creativity: The Acteon I-Care Code
Data Driven Compliance: Understanding the ECCTA and Its Impact with Jonathan Armstrong
AI and the False Claims Act
Compliance Tip of the Day: AI and 3rd Party Risk Management
FCPA Compliance Report: 10 Core Principles for Effective Internal Investigations with Michelle Peirce
Compliance Tip of the Day: Strategies for Embedding Compliance into your Organization
Compliance into the Weeds: Sanctions Compliance Failures: Lessons from Harman International and Interactive Brokers
Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Compliance Tip of the Day: COSO Governance Framework: Part 4, Culture
Compliance Tip of the Day: COSO Governance Framework: Part 3, Strategy
Compliance Tip of the Day: COSO Governance Framework: Part 1, Introduction
Compliance Tip of the Day: Internal Control Improvement
Compliance Tip of the Day: Internal Control Deficiencies
FCPA Compliance Report: Stay the Course: Ellen Lafferty on Navigating Anti-Corruption Compliance in 2025
Adventures in Compliance: The Novels – The Hound of the Baskervilles, Introduction and Compliance Lessons Learned
Compliance Tip of the Day: Assessing Internal Controls
Key Discovery Points: BYOD Case Law Covering Subpoenas and Employee Handbooks
Compliance Tip of the Day: COSO Objective 5 – Monitoring Activities
Compliance Tip of the Day: COSO Objective 4 - Control Information and Communication
In celebration of the release of the 6th Edition of the Government Contracts Compliance Handbook, we are sharing six critical tips to help government contractors identify and avoid conflicts of interest. For contractors...more
On Oct. 30, the Biden administration took a decisive step into the future by issuing the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence....more
Two significant changes are underway by the Defense Counterintelligence and Security Agency (DCSA) – both of which require the immediate attention of businesses that hold a U.S. security clearance or are in the process of...more
In 2019, cybersecurity has become top-of-mind for most federal government contractors and agencies that share sensitive information. In addition to updated Department of Defense guidance and procedures for evaluating...more