Provided by
Adra2019-11-13T14:21:00
Many finance teams are plagued with having to leverage multiple data sources and manual processes for their month-end close. Can you really trust the data? Probably not. Consequently this leads to: More Time. More Errors. More Frustration. By removing some of the manual processes, you reduce errors, save time, and gain more control. Are you ready to take some easy steps to own your month-end close?
Our white papers are prepared by our sponsors and are free to view.
You need to register for this site and agree to the sponsor’s conditions to be granted access.
2025-11-26T19:21:00Z By Tom Fox
AI decisions are only defensible when the reasoning behind them is visible, traceable, and auditable. Explainable AI delivers that visibility, turning black-box outputs into documented logic that compliance officers can stand behind when regulators, auditors, or stakeholders demand answers.
2025-11-12T19:38:00Z By Ruth Prickett
Regulators in Europe are focused on punishing energy firms that make deceptive claims on net zero targets, as TotalEnergies recently discovered.
2025-11-11T19:24:00Z Provided by Sayari
This report quantifies, analyzes, and visualizes the impact of typological regulations on compliance so that teams can more efficiently and effectively protect against non-obvious sources of regulatory risk.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
2024-05-05T17:30:00Z Provided by ServiceNow and KPMG
To help investors gain a better understanding of cyber risk, the US Securities and Exchange Commission (SEC) has created sweeping new rules—forcing companies to take a more proactive approach to cybersecurity.
Site powered by Webvision Cloud