$200.00
A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?

 Recorded Webinar
 90 Minutes
 Refer a Friend
A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?

Harvey Weinstein, Matt Lauer, Charlie Rose, Al Franken, Garrison Keillor, members of Congress, and various State lawmakers have been accused of sexual harassment and/or sexual assault. But there is a difference between pulling one’s pants down in front of a female colleague at work and touching a woman on her buttocks during a photo op—isn’t there? What is that difference? Are both examples considered sexua..

$200.00
Beware Employee Embezzlement & Internal Fraud

 Recorded Webinar
 60 Minutes
 Refer a Friend
Beware Employee Embezzlement & Internal Fraud

This webinar examines the scope and nature of employee dishonesty and explains the risks to employers and organizations of all types. It goes on to deal with the practical aspects of prevention and response to victimization, as well as balancing the need to assure that corrective and deterrent programs and policies do not unduly interfere with normal operations and opportunities and do not generate other ma..

$200.00
Creating a Robust IT Governance Program

 Recorded Webinar
 60 Minutes
 Refer a Friend
Creating a Robust IT Governance Program

IT governance (ITG) is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals. Organizations today are subject to many regulations governing the protection of confidential information, financial accountability, data retention, and disaster recovery, among others. They're also under pressure from shareholders, stakeholders, and customers.To..

$149.00
Understanding the California Consumer Privacy Act of 2018

 June 24 2020
 01 : 00 PM EST    
 60 Minutes
Understanding the California Consumer Privacy Act of 2018

The California Consumer Privacy Act of 2018 (the “Act”) was signed into law by California Governor Jerry Brown on June 28, 2018. The Act gives consumers” (defined as natural persons who are California residents) specified basic rights in relation to their personal information. The Act requires that companies make certain disclosures to consumers via their privacy policies, or otherwise at the time the perso..

$149.00
Applying ISO 27001 to ERM Risk

 July 21 2020
 01 : 00 PM EST    
 60 Minutes
Applying ISO 27001 to ERM Risk

ISO 27001 describes how to manage information security in a company. According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 27001 standards effectively in your organization you can ensure robust security for your organization's vital inf..

$149.00
Auditing Business Continuity Plans According to ISO 22301

 August 20 2020
 01 : 00 PM EST    
 60 Minutes
Auditing Business Continuity Plans According to ISO 22301

Successful business continuity planningInvolves the entire organization Requires clear and consistent communication Encompasses how employees will communicate, where they will go and how they will keep doing their jobsPrepares the organization for disruptive eventsWhy is BCP Important? 61% of companies surveyed had to invoke their BCP 43% had to invoke it more than onceKey Causes: Natural Disaster, Power Ou..

$149.00
A robust Information Security Management System ISMS

 September 23 2020
 01 : 00 PM EST    
 60 Minutes
A robust Information Security Management System ISMS

A robust Information Security Management System manages and securities information security in a company. Governance, Risk, and Compliance are three areas needed to enhance confidentiality, the integrity of data and availability of data. Protecting your organization's information is critical for the successful management and smooth operation of your organization. A robust Information Security Management Sys..

$200.00
Antidumping and Countervailing Duties: The Nuts and Bolts

 Recorded Webinar
 90 Minutes
 Refer a Friend
Antidumping and Countervailing Duties: The Nuts and Bolts

Antidumping (AD) occurs when foreign manufacturers sell goods in the United States less than fair value, causing injury to the U.S. industry. AD cases are company specific; the duty is calculated to bridge the gap back to fair market value.Countervailing duties (CVD) cases are established when a foreign government provides assistance and subsidies, such as tax breaks to manufacturers that export goods to th..

Showing 1 to 8 of 8 (1 Pages)