eDiscovery and Compliance Programs
ERGs: Valuable or Vulnerable?
Managing Whistlelbowers
Data Driven Compliance: The Failure to Prevent Fraud Offense: Insights for US General Counsels with Mike DeBernardis
Compliance Tip of the Day: Using AI to Embed Your Compliance Program
Compliance Tip of the Day: Trust and Verify
Great Woman in Compliance: Building Strategic and Effective Risk Assessments
Compliance into the Weeds: The Dark Side of AI in Employee Training
Compliance Tip of the Day: AI Assistant for Compliance
Innovation in Compliance: Gaurav Kapoor on Risk Management and the Role of AI in GRC
How to Balance Diverse Views in the Office
Compliance Tip of the Day: Costs and Benefits of AI
Adventure in Compliance: The Novels - The Valley of Fear, Whistleblowers and Corporate Compliance
Sunday Book Review: August 17, 2025, The More Books from the Ethicsverse Library Edition
Compliance Tip of the Day: How a CFO Views Compliance and Risk
Data Driven Compliance – James Tillen on the Importance of Cross-Functional Collaboration in Complying with the FTPF Offense
We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One
Great Women in Compliance: The Mind at Work with Lynette Buebird
Compliance Tip of the Day: Finance Models for Compliance
Compliance Tip of the Day - Extending Compliance Value Across Your Organization
On August 22, FINRA accepted a Letter of Acceptance, Waiver, and Consent (AWC) from a broker-dealer member firm regarding its alleged failure to establish and implement policies and procedures designed to detect suspicious...more
On December 18, the U.S. District Court for the Southern District of New York granted a bank’s motion to dismiss the complaint in a case involving wire transfers of an elderly customer who was the victim of an internet scam....more
The facts are frequently the same. A company that has retained the services of a vendor receives an authentic-looking email from the vendor’s CFO which advises that the vendor has changed its bank account or method of...more
Hackers commit financial fraud by creating a fake email address mimicking the vendor’s name and emailing accounts payable saying that the vendor’s account information has been changed. Funds are then sent directly to the...more
The Nigerian prince seems almost quaint. Gone are the days when the Nigerian prince was the only nefarious figure menacing our inboxes. A simple yet elegant scheme – our supposed prince unexpectedly fell upon a large sum...more
Known by many names, including business email compromise fraud, CEO or CFO fraud, impersonation attacks, or “Man-in-the-Email” scams, cyber-related frauds involving spoofed or otherwise compromised business electronic...more
On October 16, 2018, the SEC issued a 21(a) report announcing that it had investigated whether certain public companies that were victims of oftentimes unsophisticated, cyber-related frauds had violated federal securities...more
On October 16, 2018, the SEC released an Investigative Report detailing recent email spoofing schemes that caused nine public companies to lose a total of nearly $100 million. Building on its February 2018 guidance about the...more
• The SEC issued guidance in the form of a rare “21(a) report” this week after investigating a series of email frauds impacting 9 unnamed companies. • These email-based frauds, referred to as “CEO scams” or “vendor scams,”...more