Bar Exam Toolbox Podcast Episode 318: Quick Tips -- The Final Two-Week Bar Exam Countdown
Compliance Tip of the Day: COSO Objective 5 – Monitoring Activities
Adventures in Compliance: The Sign of Four – Holmes Revealed: Communication and Training Insights
Creativity and Compliance - Overcoming Conservatism in Compliance Education with Creativity
Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
Compliance Tip of the Day: Design Objectives for Compliance Training
Podcast - What Healthcare Providers Should Be Telling Students and Interns About HIPAA and Snooping
Managing Sanctions Compliance
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Creativity and Compliance: From Compliance Enforcers to Trusted Advisors: The Path Forward
FCPA Compliance Report: Ethical Decision - Making in Times of Change
Innovation in Compliance: Training Synergy: Insights from Compliance and HR Integration with Lori Stahl
Innovation in Compliance: Design-Centric Compliance Training with Karen Oddo
Auditing Your Hotline and Case Management System
Innovation in Compliance: Nikki Rausch on Harnessing Relationships for Sales and Effective Compliance
Law Firm ILN-telligence Podcast | Episode 70: Andreas Bauer, BRAUNEIS
Compliance Training & Adult Learning Theory
One Month to a More Effective Compliance Program in Training and Communications - Day 20 - Compliance Training From the Movies
One Month to a More Effective Compliance Program in Training and Communications - Day 19 - Measuring Compliance Training Effectiveness
On July 23, 2025, the White House released America’s AI Action Plan, a comprehensive national strategy designed to strengthen the United States’ position in artificial intelligence through investment in innovation,...more
The New York Department of Financial Services recently amended its Cybersecurity Regulation. The revisions aim to strengthen cybersecurity and technology controls to address evolving threats to consumer data and ensure the...more
On October 30, 2023, recognizing that Artificial Intelligence (AI) holds both extraordinary promise for its commercial applications and advancements and treachery and harm caused by its misuse, the White House issued an...more
Editor’s Note: This article covers valuable insights on artificial intelligence’s (AI) evolving role in cybersecurity and incident response shared during an expert panel discussion. As cybersecurity, information governance,...more
Many HIPAA covered entities and business associates struggle with developing and implementing a sanctions policy. What should it say, is zero-tolerance required, do we have to impose discipline in every case, etc. These are...more
Artificial intelligence (AI) is fast becoming an integral element in the operation of virtually every business and organization. As with most modern technologies, the use of AI-powered apps and tools comes with its own set...more
Learning Objectives - The fundamental foundation of establishing a solid HIPAA compliance, privacy and cyber security awareness program - The importance of end user HIPAA compliance, privacy and cyber security training for...more
What are the new rules? Earlier this year, the Securities and Exchange Commission (“SEC”) published a new set of proposed cybersecurity disclosure rules for public companies. The proposed rules would significantly increase...more
Takeaway: As cybersecurity risk increases, large enterprises and government agencies are, increasingly, forcing smaller vendor companies to obtain cyber insurance to help manage the risk of a data breach. To prepare for an...more
Companies continue to see headlines about cyberattacks, but manufacturing companies, specifically, have become more targeted in the last few years. In the most recent issue of The Illinois Manufacturer, Molly Arranz and Sofia...more
Where We Stand - This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more
Over the past several years, if your organization experienced a cyberattack, such as ransomware or a diversion of funds due to a business email compromise (BEC), and you had cyber insurance, you likely were very thankful....more
Guidance Demonstrates OFAC’s Expectations for Sanctions Compliance by Cryptocurrency Industry - On October 15, 2021, the Office of Foreign Assets Control (“OFAC”) of the U.S. Department of the Treasury published Sanctions...more
Speaking of security education and training, the National Cybersecurity Center this week launched a new initiative to offer cyber-hygiene and IT security sessions to elected state government officials and their staff for...more
Most of us have never heard of SANS, a prominent and well-respected cybersecurity training company. As its website states, “SANS is the most trusted and by far the largest source for information security training in the...more
On October 23, 2019, the U.S. Department of Defense announced a plan to pilot 5G technologies on four military installations in partnership with private industry and the U.S. Federal Communications Commission. Lisa Porter,...more
In 2016, Florida became the first state to mandate technology training for lawyers, when it adopted a rule requiring lawyers to complete three hours of CLE every three years “in approved technology programs.” The requirement...more
Connected medical devices deliver numerous benefits not available before, including improved monitoring of patient welfare and a wealth of vital data. But for all the advantages available through these devices, their...more
Unless you have been living under a rock, you are probably aware that companies are suffering cyber attacks that jeopardize sensitive company or customer data more and more frequently. What you may not know is that even more...more
On August 7, 2017, the Securities and Exchange Commission (SEC) released its latest cybersecurity risk alert, detailing findings from the examination of 75 broker-dealers, investment advisers and investment companies carried...more
A recently introduced bipartisan bill seeks to provide state and local authorities with additional resources to assist in the fight against cybersecurity threats. Last month, Senators John Cornyn (R-Tex.), Patrick Leahy...more
For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more
In an environment where even the largest and most powerful corporations have fallen victim to data breaches, it can be challenging to fathom how to protect against the sophisticated and ever-evolving threat of cyber attacks....more
On September 15, 2015, the Office of Compliance Inspections and Examinations (OCIE) of the Securities and Exchange Commission (SEC) issued a Risk Alert announcing its second round of examinations of registered investment...more
One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more