All CPE articles – Page 6
-
Training
On-demand training: Protect your company from cyber risks
Take this self-directed, interactive course to deepen your understanding of cybersecurity risks and learn about the latest regulations to keep your organization compliant and prepared for today’s dangerous cyber environment.
-
Webcast
CPE Webcast: Best practices for corporate investigations in the digital age
In their recent 2021 survey, Compliance Week and OpenText reveal the growing challenges of managing investigations, driven by an increasingly complex litigation and regulatory landscape.
-
Webcast
CPE Webcast: Why compliance & audit should support modern accounting
Traditional, manual accounting is not sustainable, and it can have negative downstream effects for compliance and audit teams. To modernize the way companies work, organizations must automate the manual, mundane processes that are holding them back.
-
Webcast
CPE Webcast: Business spend monitoring: Do trends speak louder than machine learning and AI?
As parts of the world economy open up and overall business spend is on track to go back to pre-COVID-19 levels, organizations are more vulnerable to fraud, corruption, and regulatory violations.
-
Webcast
On-demand: Your roadmap to a sustainable future
Today, businesses find themselves navigating many ESG disclosure obligations and options. Whether you are in the early stages of ESG reporting or looking for ways to make your program more impactful, how do you navigate the ESG reporting landscape?
-
Webcast
CPE Webcast: Emerging trends from Deloitte’s global TPRM survey 2021
Join ProcessUnity and Deloitte’s leading third-party risk practitioners as they explore key findings from Deloitte’s 2021 Global TPRM Survey. You will hear what organizations are doing in the wake of last year’s pandemic to make advancements in their approach to third-party risk.
-
Webcast
CPE Webcast: Defending yourself from ransomware third-party risks
Ransomware continues to dominate headlines with no sign of slowing down. What started more than 30 years ago has become one of the most prevalent and lucrative cyberattacks that does not discriminate by company size, industry, or geography.
-
Webcast
CPE Webcast: Automation in compliance training: How to start and where it can take you
Technology is changing every aspect of life and automation is reducing the effort required for even the most complex of business processes.
-
Webcast
CPE Webcast: Data privacy isn’t a compliance checkbox but a competitive advantage
In the post-GDPR era, data privacy has taken center stage yet again due to digital transformation across the globe. Governments everywhere are enforcing more robust data protection guidelines to address new digital interactions between enterprises and consumers.
-
Webcast
Webcast: Mitigate risk and improve litigation readiness
With the sheer volume of communications happening on more platforms than ever, a modern approach to compliance and archiving has become critical.
-
Webcast
CPE Webcast: Incident and breach management 101
Today’s breach landscape is unprecedented and complex. Every organization is facing potential enforcement of many interconnected and overlapping laws in multiple jurisdictions, each with restrictive timelines. In this complex environment, it is not enough to have a response plan. Your organization needs a response system.
-
Webcast
CPE Webcast: Identifying risky vendors: 7 warning signs
For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with? Answering that question is not so straightforward.
-
Webcast
CPE Webcast: The rise of ESG in third-party risk management
ESG and its role in third-party risk management have gained prominence this past year as the awareness for environmental and social issues continue to grow.
-
Webcast
CPE Webcast: Cost-effective business license, permit, and registration compliance
Compliance is a necessity for every business, but the best long-term strategies for any company depend on factors like portfolio size, internal expertise, available budget, and risk tolerance.
-
Webcast
CPE Webcast: Long-term data retention and archiving strategies for regulatory compliance
As the volumes and types of electronic data generated by organizations continues to grow, it becomes increasingly complex to correctly identify, capture, store, protect and make searchable hundreds of terabytes (or petabytes) of disparate data.
-
Webcast
CPE Webcast: How Motorola is transforming evidence collection for data protection compliance
A popular saying among security, privacy and corporate compliance circles is “trust, but verify”. It’s a popular saying because it neatly captures so much of what compliance professionals have to do: collecting evidence to verify compliance.
-
Webcast
CPE Webcast: Streamlining HIPAA & HITRUST compliance with an alternative reporting approach
Your organization might be using HITRUST to manage multiple compliance initiatives, including HIPAA, NIST and the ISOs. The framework sets up a good set of practices that lend well to various privacy regulations and standards, yet connecting all that data for fast reporting is where most organization’s hit a wall. ...
-
Webcast
CPE Webcast: Sustainable lease accounting: Maintaining compliance through Day 2 and beyond
When FASB and IASB first announced the lease accounting standards ASC 842 and IFRS 16, respectively, companies scrambled to pull together their lease data and implement procedures and tools to generate the required disclosures.
-
Webcast
CPE Webcast: Managing policy updates in a sea of regulatory change
Updating corporate policies to correspond with an ever-changing, ever-growing list of regulations is putting pressure on already stretched corporate compliance functions. And the flood of new regulations will likely only increase going forward. Will you be able to keep up?
-
Webcast
CPE Webcast: Riding the waves of regulatory change
With a constant influx of new and changing regulatory requirements with increased scrutiny and enforcement, organizations can quickly fall behind and be drawn into a churn of reactive activities that distract from business objectives and use up valuable resources.