Moving Beyond the Usual Helpline Data
Compliance Tip of the Day: Why Engage in Pre-acquisition Due Diligence
Innovation in Compliance: Operationalizing Trust at Scale: A Conversation with Amanda Carty on Compliance and AI
AI Today in 5: August 7, 2025. The US v. China Episode
Hill Country Authors – Exploring the Challenges of a Green Transition with Tom Ortiz
Taxing Intelligence: AI's Role in Modern Tax Administration
LathamTECH in Focus: Move Fast, Stay Compliant
AI Today in 5: August 6, 2025, The Rethinking Compliance Episode
Daily Compliance News: August 6, 2025, The Spanking Banks Edition
AI Today in 5: August 5, 2025, The AI at the SEC Episode
Compliance Tip of the Day: M&A – International Issues
From Forest to Fortune: Navigating Workplace Ethics With Robin Hood — Hiring to Firing Podcast
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
Adventures in Compliance: The Novels - The Valley of Fear, Introduction and Compliance Lessons Learned
Episode 381 -- NAVEX's 2025 Annual Hotline Report
12 O’Clock High, a podcast on business leadership: Building Trust and Relationships: The Power of Compliance and Ethics with Jacqui Pruet
Data Driven Compliance: Understanding the ECCTA and Its Impact on Fraud Prevention with Vince Walden
Daily Compliance News: August 1, 2025, The All AI Edition
AI and the False Claims Act
Compliance Tip of the Day: AI, Continuous Monitoring and Compliance
As generative artificial intelligence and machine learning continue their rapid rise in popularity and uses in business operations, manufacturers are faced with how to implement AI in a manner that allows them to take...more
The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more
Tariffs may seem like a headline reserved for economists and politicians, but at last week’s International Franchise Association (IFA) Legal Symposium in Washington D.C., they were front and center in nearly every room. From...more
What Is Vendor Onboarding? Vendor onboarding is the process of establishing a company as an approved provider of technology, goods, or services to your organization. It’s also an essential early step in the vendor risk...more
Introduction to DORA and its Implications - As of Jan.17, 2025, the European Union’s Digital Operational Resilience Act (DORA) became enforceable. This new regulatory framework significantly impacts financial institutions and...more
Uncover hidden vulnerabilities and protect your business. In today’s interconnected world, supply chain disruptions can severely impact your business. Are you confident in your supply chain’s resilience? Do you fully...more
Stay on top of ever-evolving ESG requirements and emerging trends - With the SEC’s newly issued rules surrounding ESG disclosures and the continued growth of regulations rolling out in the EU, Canada, Asia and elsewhere...more
As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more
Elevate your resilience in the new year by understanding top GRC trends, patterns, and best practices across AI, TPRM, cyber risk, and more. As we step into 2024, technological advancements and an increasingly connected —...more
Vendor risk has the power to impact an organization’s reputation, ESG (environmental, social, governance) initiatives, and information security. Similarly, vendors can affect a project’s performance due to their financial and...more
Effective Third-Party Risk Management (TPRM) is all about understanding that working with any third-party vendor or supplier carries an inherent risk. Across all industries, organizations are faced with a two-fold...more
Supply chain considerations for firearms industry members break down into two key relationships: your customers and your vendors. Ensuring that you have the components and other supplies you need and ensuring that you can...more
Managing your vendor network and supply chain used to be easier. You knew who all your suppliers were, you could visit their sites, and you knew them as individuals you’d worked with for many years....more
Organizations around the globe began 2021 grappling with two significant supply-chain attacks. First, the SVR, Russia’s foreign intelligence service, planted malicious code in Orion, SolarWinds’ flagship network management...more
[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more
With more than 153,000 cases reported globally (as of March 15, 2020), including more than 1,600 in the United States (as of March 13, 2020)–and both totals increasing by the hour–the COVID-19 pandemic is already wreaking...more
Over the past nine months in Hong Kong, luxury retailers have encountered a challenging market. Hong Kong has traditionally been a popular destination for Mainland Chinese seeking to purchase luxury goods, but recent...more
Supply chains are emerging as an increasingly complex risk area for compliance. The risk includes trade compliance, vendor management issues associated with cyber/privacy, product compliance, REACH, ROHS and California...more
On December 26, Marty and Dave McFly were playing video games when, downstairs in the living room, the hoverboard that Marty had received for Christmas ignited. The fire quickly engulfed the Christmas tree and spread...more
The United Kingdom has a number of interesting ideas and policy initiatives. The UK Bribery Act was a strong statement against corruption, but remains unenforced. The United Kingdom has enacted the Modern Slavery Act,...more