Fraud is happening at your organization; you just don’t know it. Then again, maybe you do, but you are not sure how pervasive the problem is, where to begin your anti-fraud journey, or how to enhance your current fraud risk management practices. This playbook—which includes templates, checklists, and tools—draws from best practices and leading guid...
We have the answers
Search Results
In a world where conflict is inevitable, how can families with complex family dynamics and complicated structures foster healthy conflict that actually makes them stronger and more resilient. Join Matt Wesley and Cathy Carroll to find the Goldilocks of constructive conflict. They will discuss the mindsets and skills any family can develop, such as ...
Safety risk assessments are becoming a preferred regulatory tool around the world. Online safety laws in Australia, Ireland, the United Kingdom, and the United States will require a range of providers to evaluate the safety and user-generated content risks associated with their online services. While the specific assessment requirements vary across...
The internet and specifically e-commerce has grown exponentially over the last 30 years, incorporating nearly every aspect of trade. As a result, industries and governmental agencies have blossomed to ensure cybersecurity, expending over $150 billion annually to combat this persistent threat. As this market segment continues to expand, crippling cy...
As companies and service organizations increasingly use third-party service for outsourced services, there is more demand for a detailed understanding of the processes and controls of these third-party service providers. To show they have the right processes and internal controls in place, it’s crucial to provide a System and Organization Controls ...
No one is immune from cybersecurity threats. And responsibility for protecting your data doesn’t rest with one person or provider. So it’s essential every organization follows at least some basic cybersecurity best practices. A great step toward ensuring your data is safe is to maintain good cyber hygiene. We recommend hiring a third party to co...
Get ready to comply with the five new data privacy laws that will come into effect in January 2025 in Delaware, Nebraska, Iowa, New Hampshire, and New Jersey. With the active enforcement by several states’ Attorneys General and a trend toward broader applicability, data privacy compliance is becoming increasingly important and complex. Companies sh...
This annual cybersecurity update covers the leading threats you need to be aware of to keep your clients and your firm protected. 2021 cybersecurity trends and best practices will be shared.
Cyber threats and fraud schemes are designed to infiltrate and compromise your business. By using this cybersecurity resource guide and taking proactive actions to prevent cyber threats, you can strengthen your defensive strategy. This guide includes: Cyber Fraud Overview Recommendations and Resources Quick Reference Guide f...
With cyberattacks increasing every year, it’s critical to be cyber ready. While implementing individual security tools is one element of building a ‘cyber dam,’ it is not enough to stop sophisticated attackers from breaking through it. Much like a dam, a single crack in your security plan can have devastating consequences. In this webinar, learn ho...
After a turbulent 2022, the technology industry is facing another busy year ahead amid a shifting M&A environment, widespread layoffs, and an increased focus on corporate governance. We analyze the trends that shaped the past year and look at the top seven bold predictions that will impact the technology industry. Be prepared for new prior...
The new cyber risk paradigm requires organizations to become more comfortable with the reality that the connective tissue of modern business is digital. Given this landscape and the increasing cyber threat, organizations are recommended to implement twelve cyber hygiene controls that are key to achieving cyber resilience and insurability. ...