Category: Risk

Worker swiping credit card reader digital tablet shop
Retailers: Understanding GDPR’s Effect

It’s no secret that the role of data in the retail industry has grown considerably…

Read More
Navigating the Risks of Post Acquisition Add On Integration
Navigating the Risks of Post-Acquisition Add-On Integration

As thousands of private equity firms chase a decreasing number of quality middle market targets…

Read More
Final Countdown to GDPR Compliance
Final Countdown to GDPR Compliance

The deadline for GDPR compliance is fast approaching, and once the regulation goes into effect…

Read More
person checking email on cell phone
Phishing Scam Targets SEC Investors

The Securities and Exchange Commission’s (SEC) Office of Investor Education and Advocacy (OIEA) issued a…

Read More
Sox Are You Ready for an IPO
Preparing to Go Public? Address SOX Compliance Early

The Sarbanes-Oxley Act of 2002, commonly referred to as SOX, requires public companies to report…

Read More
GDPR Consent
What GDPR Means for Consent

Addressing critical guidance related to how companies obtain consent from individuals as well as how…

Read More
Data Controllers vs Processors Understanding How GDPR Impacts Organizations and Their Third Parties
Data Controllers vs. Processors: Understanding How GDPR Impacts Organizations and Their Third Parties

Explore the specific responsibilities of who GDPR considers “data controllers” and “data processors” and consider…

Read More
Nonprofits & Cybersecurity: Countering Weaknesses with Sound Controls
Nonprofits & Cybersecurity: Countering Weaknesses with Sound Controls

In January 2017, Indiana-based nonprofit, Little Red Door – which provides cancer services to local…

Read More
GDPR 101: What You Should Know About the European Union’s Impending Data Privacy Directive
GDPR 101: What You Should Know About the European Union’s Impending Data Privacy Directive

If you are under the impression that the European Union’s (EU) General Data Protection Regulation…

Read More
Critical Shortfalls Present Within Cybersecurity Risk Management Programs
Critical Shortfalls Present Within Cybersecurity Risk Management Programs

For companies developing or reinvigorating their cybersecurity risk management programs, it’s vital to remember that…

Read More