For many prospective acquirers, the due diligence process involves laborious, costly tech and policy audits that often extend beyond the deal close, rather than looking for the target’s digital risk and exposure. GroupSense CEO Kurtis Minder discusses this much easier...
Read moreDetailsAs the response to the spread of the coronavirus escalates, companies are becoming increasingly dependent on a work-from-home workforce. Experts at Manatt discuss what security concerns companies must take into account with this increase in remote work. Businesses’ responses to...
Read moreDetailsRansomware is a devastating, costly and persistent tactic. NIST’s new reference architectures go a long way to guiding organizations toward a stronger ransomware defense, but user training is required as well. Crypsis Group’s Stephen Boyce discusses the role of end-user...
Read moreDetailsA cybersecurity risk management program (CRMP), or formal cybersecurity strategy document, is key in an organization’s ability to weather a cybersecurity incident. Kral Ussery’s Ron Kral discusses what to take into account when drafting one. No topic has likely garnered...
Read moreDetailsSponsored MediaPRO recently released its "State of Privacy and Security Awareness Report," revealing evolving progress and challenges in employees' security awareness and workplace privacy knowledge in the wake of tougher laws like GDPR and the new California Consumer Privacy Act...
Read moreDetailsThe New York SHIELD Act will go into effect in just a few weeks, so if your organization serves residents of New York, the time is now to make sure your company is in compliance with the law. Guidepost Solutions’...
Read moreDetailsNew privacy laws are popping up state by state, regulation around data privacy continues to expand in the EU and attention on cybercrime is at an all-time high. Coalfire’s Adam Shnider explores what the coming decade may bring. The trend...
Read moreDetailsWhistleblower cases may be the next trend in cybersecurity litigation. Morrison & Foerster’s Kristen J. Mathews, Mark David McPherson and Janie Schulman discuss various measures and best practices for companies in guarding against potential liability. While there has (understandably) been...
Read moreDetailsWhat does the next major terrorist attack look like? 9/11 spurred an overhaul in security against physical harm, but many organizations are still woefully underprepared for terror’s latest iteration: cyberattacks. Kroll’s Alan Brill and Eric Thompson discuss how organizations can...
Read moreDetailsMark Sangster, a cybersecurity expert from eSentire, considers recent data breaches and how the response to them is formulated largely by some key, innate human biases. Mark provides insights on how to reshape security and compliance policies to instead address...
Read moreDetailsWith the average cost of a data breach in 2019 as high as $3.9 million, it’s imperative for companies to understand the increasing risks, rising costs and expanding customer turnover rates associated with breaches – and to plan accordingly. Nelson...
Read moreDetailsNearly half of companies remain noncompliant as we near the 13th anniversary of the PCI DSS, and these organizations are at serious risk of data breaches and regulatory fines. Ground Labs’ Steven Cavey provides an overview of the standard and...
Read moreDetailsFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2025 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |