Illness, Disability, and Workplace Performance: A Guide for Employers
Episode 384 -- Third-Party Risks and Sanctions
Building a Team of Trusted Advisors
ERGs: Valuable or Vulnerable?
Navigating U.S.-China Relations: Lessons From History for Today’s Global Economy
Work This Way: A Labor & Employment Law Podcast | How Employers Can Protect Intellectual Property with Bryan Baysinger of Maynard Nexsen
Regulatory Rollback: Impact of the CFPB's Withdrawal of Overdraft and Deposit Account Fee Guidance on Financial Institutions and Related Litigation Risks — The Consumer Finance Podcast
Protect Yourself and Your Business with Indemnification Understanding
False Claims Act Insights - An FCA Perspective on Artificial Intelligence in the Healthcare Industry
Data Driven Compliance: The Failure to Prevent Fraud Offense: Insights for US General Counsels with Mike DeBernardis
AI Today in 5: August 22, 2025, The Angst Episode
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
Demystifying Wage and Hour Audits: One-on-One with Courtney McFate
Compliance Tip of the Day: Using AI to Embed Your Compliance Program
Daily Compliance News: August 22, 2025, The WADA Returns Edition
Culture Crafters: Building a Culture of Accountability in the Face of Disasters
Hot Topics in International Trade - The Daunting Task of Export Compliance With Braumiller Law Group
New FLSA Notice Standard, DOL’s PAID Program, Axed Wage and Hour Penalties - #WorkforceWednesday® - Employment Law This Week®
Cuando la marca viaja en turista y sin registro
Compliance Tip of the Day: Trust and Verify
There are unprecedented risks and opportunities emerging for companies in the energy sector as the Trump administration’s priorities start to come into focus. Many of those are well-known to the industry. Here’s one that’s...more
On May 31, 2025, the Alberta Security Management for Critical Infrastructure Regulation (the Regulation) will come into force and is expected to alter existing security requirements for critical resource infrastructure in...more
Cutting over to a new Energy Trading and Risk Management (ETRM) system is a significant undertaking. The process involves transitioning data, configurations, and business processes from your legacy system to the new one,...more
In today's digital landscape, where data is often dubbed the "new oil," ensuring the smooth operation of databases is crucial for businesses. Regular oversight, including monitoring database metrics, is essential to optimize...more
Process inefficiency can create problems that quietly stifle productivity and potential growth. In an era of rapid digitalization, companies that lag in business process improvement risk falling behind competitors who embrace...more
Over the past few decades, the commodity and energy trading and risk management (C/ETRM) landscape for the natural gas industry has been stable, dominated by a select few big players in the market – namely, ION Endur or...more
The name denotes the systems are focused on improving operations in trading and risk, but what’s in it for other business stakeholders who support the transaction lifecycle? We will highlight the top advantages our team has...more
Business processes can get complicated over time in any organization. A fitting example of a core business process is the processing of payable invoices. The old-fashioned way of processing invoices is to receive the invoices...more
Getting the most out of your energy trading and risk management (ETRM) system means taking an ecosystem perspective to technology decisions that aim to extend and enhance the inherent capabilities of the platform. We’ve...more
Technology is at the forefront of minimizing the negative impacts of constant change. We seek out advancements to modernize business, sequence our day, and make our lives easier. Among these advancements in the business...more
Optimization tools are powerful additions to the arsenal of business systems for any company. The tools leverage the transactional advantages afforded by the discipline and interconnectedness of energy trading and risk...more
The recent Colonial Pipeline ransomware event provides a strong incentive for organizations to evaluate their resiliency to cyberattacks. With ransomware being the No. 1 concern for many Security Officers surveyed in a recent...more
Find out why risk control and IT need to be aligned to gain maximum value in real-time commodity position and exposure reporting....more
Applying effective communication tactics during an ETRM system implementation can mitigate risk for project teams and organizations while ensuring a smooth path to user adoption. ...more
A cyberattack on a single gas compression facility resulted in the shutdown of a natural gas pipeline for two days, according to a recent alert from the US Department of Homeland Security’s Cybersecurity and Infrastructure...more
Researchers at Sentinel One and Dragos have detected malicious code, called EKANS or Snake, that has been designed specifically to target industrial control systems (ICS), including those of oil refineries, manufacturing...more
Facebook wages a war on misinformation. On Monday, Facebook announced it will start removing videos altered by artificial intelligence that are likely to mislead people into thinking that a subject of the video made...more
Find out everything you need to know before starting an ETRM system implementation. Over the last two decades many energy companies that engaged in the purchase and sale of commodities as a matter of course in transacting...more
On Tuesday, July 31, 2018, the Department of Homeland Security (DHS) hosted a National Cybersecurity Summit, featuring the nation's top homeland, national security and law enforcement officials. The event featured Vice...more