All Articles By Date

man holding book with funnel icon

Data In, Insights Out

Posted by - February 15, 2019 0
Why AI Needs Superior Data to be Successful Artificial intelligence could contribute multiple trillions to the global economy in the…
traffic seen through car's side mirror

Look Behind You – Now!

Posted by - February 13, 2019 0
The CCPA “Look Back” Requirement A provision in the upcoming California Consumer Privacy Act (CCPA) will make the regulation retroactive…
red phones hanging by their cords

Whistle While You Work, Part 2

Posted by - February 6, 2019 0
Bells & Whistles: Whistleblowing Portal or Corporate Hotline? In this second installment in a series on whistleblowing solutions VinciWorks’ Sandra…
businessman pushing virtual GRC button

The State of GRC

Posted by - February 4, 2019 0
3 Predictions for 2019 From Google’s GDPR violation to data breaches happening just hours after the new year, 2019 is…
walgreens storefront

The Walgreens Whistleblower

Posted by - January 25, 2019 0
A Landmark Settlement with Lessons Learned for Compliance Officers Walgreens reached a settlement on Tuesday, concluding a six-year investigation into…
hard brexit roulette - concept of gambling

TRACE: Brexit!

Posted by - January 23, 2019 0
Michelle de Kluyver of Addleshaw Goddard provides an overview of Brexit and then drills down on its potential impact on…
lottery banner with tickets and power balls

TRACE: Lottery Fraud

Posted by - December 19, 2018 0
Tax evasion, money-laundering and fraud: Jeff Kelly Lowenstein describes his research – and that of colleagues – into the surprising…
woman mentally sorting information and forming an idea

Incorporating the OODA Loop

Posted by - November 29, 2018 0
Stopping Problems Before They Start As third-party IT security/cyber risks become more prevalent, IT security professionals continue to look for more…
Load More