$200.00
A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?

 Recorded Webinar
 90 Minutes
 Refer a Friend
A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?

Harvey Weinstein, Matt Lauer, Charlie Rose, Al Franken, Garrison Keillor, members of Congress, and various State lawmakers have been accused of sexual harassment and/or sexual assault. But there is a difference between pulling one’s pants down in front of a female colleague at work and touching a woman on her buttocks during a photo op—isn’t there? What is that difference? Are both examples considered sexua..

$200.00
Beware Employee Embezzlement & Internal Fraud

 Recorded Webinar
 60 Minutes
 Refer a Friend
Beware Employee Embezzlement & Internal Fraud

This webinar examines the scope and nature of employee dishonesty and explains the risks to employers and organizations of all types. It goes on to deal with the practical aspects of prevention and response to victimization, as well as balancing the need to assure that corrective and deterrent programs and policies do not unduly interfere with normal operations and opportunities and do not generate other ma..

$200.00
Creating a Robust IT Governance Program

 Recorded Webinar
 60 Minutes
 Refer a Friend
Creating a Robust IT Governance Program

IT governance (ITG) is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals. Organizations today are subject to many regulations governing the protection of confidential information, financial accountability, data retention, and disaster recovery, among others. They're also under pressure from shareholders, stakeholders, and customers.To..

$149.00
Applying ISO 27001 to ERM Risk

 July 21 2020
 01 : 00 PM EST    
 60 Minutes
Applying ISO 27001 to ERM Risk

ISO 27001 describes how to manage information security in a company. According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 27001 standards effectively in your organization you can ensure robust security for your organization's vital inf..

$149.00
Understanding the California Consumer Privacy Act of 2018

 June 24 2020
 01 : 00 PM EST    
 60 Minutes
Understanding the California Consumer Privacy Act of 2018

The California Consumer Privacy Act of 2018 (the “Act”) was signed into law by California Governor Jerry Brown on June 28, 2018. The Act gives consumers” (defined as natural persons who are California residents) specified basic rights in relation to their personal information. The Act requires that companies make certain disclosures to consumers via their privacy policies, or otherwise at the time the perso..

$200.00
Antidumping and Countervailing Duties: The Nuts and Bolts

 Recorded Webinar
 90 Minutes
 Refer a Friend
Antidumping and Countervailing Duties: The Nuts and Bolts

Antidumping (AD) occurs when foreign manufacturers sell goods in the United States less than fair value, causing injury to the U.S. industry. AD cases are company specific; the duty is calculated to bridge the gap back to fair market value.Countervailing duties (CVD) cases are established when a foreign government provides assistance and subsidies, such as tax breaks to manufacturers that export goods to th..

Showing 1 to 6 of 6 (1 Pages)