All CPE articles – Page 5
-
Webcast
CPE Webcast: It’s 10 p.m. Do you know where your data is?
This webinar will provide practical guidelines for compliance professionals to address the pervasive issue of unmanaged data.
-
Webcast
CPE Webcast: Mobile compliance made easy: Best practices for small firms
In today’s fast-paced business world, firms must adapt to the ever-changing mobile compliance and technology landscape to stay competitive.
-
Webcast
CPE Webcast: NIST, ISO, SIG: Which TPRM framework should you choose?
As more third-party events become known and more prominent, it’s essential to use the correct baselines and metrics. Applying a framework can help dissect and define the level of risk and segment that sufficiently to react and respond in a meaningful and proportionate way.
-
Webcast
CPE Webcast: Compliance can be an advantage
Explore the people and business opportunities that lie at the intersection of evolving human capital management technology and employers’ complex compliance obligations.
-
Webcast
CPE Webcast: How well do you know your third-party risks?
The speed of Silicon Valley Bank’s collapse was scary. But what is even scarier was the number of businesses affected by the collapse—not because they did business directly with SVB but because their vendor(s) did business with the bank.
-
Webcast
CPE Webcast: Lessons learned from privacy enforcement actions and emerging trends
In 2023, more American organizations than ever need to comply with stricter and wider-reaching requirements for collecting and processing personal data.
-
Article
Introducing: Cybersecurity training customized for compliance
The professor who created CW’s first-ever self-directed learning module explains what compliance practitioners can expect to get out of the course—and why it’s an essential tool in an evolving cyber-risk landscape.
-
Training
On-demand training: Protect your company from cyber risks
Take this self-directed, interactive course to deepen your understanding of cybersecurity risks and learn about the latest regulations to keep your organization compliant and prepared for today’s dangerous cyber environment.
- Previous Page
- Page1
- Page2
- Page3
- Page4
- Page5
- Next Page