$200.00
A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?

 Recorded Webinar
 90 Minutes
 Refer a Friend
A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?

Harvey Weinstein, Matt Lauer, Charlie Rose, Al Franken, Garrison Keillor, members of Congress, and various State lawmakers have been accused of sexual harassment and/or sexual assault. But there is a difference between pulling one’s pants down in front of a female colleague at work and touching a woman on her buttocks during a photo op—isn’t there? What is that difference? Are both examples considered sexua..

$149.00
Creating a Personally Identifiable Information (PII) Program According to ISO/IEC 27701:2019

 January 17 2020
 01 : 00 PM EST    
 60 Minutes
Creating a Personally Identifiable Information (PII) Program According to ISO/IEC 27701:2019

Privacy Management PII is a must today. Clients, employees and other stakeholders expect their information to be held private when given to an organization. This is even in the face of breach.  ISO/IEC covers establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002. Personally identifi..

$149.00
Creating a Robust IT Governance Program

 February 05 2020
 01 : 00 PM EST    
 60 Minutes
Creating a Robust IT Governance Program

IT governance (ITG) is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals. Organizations today are subject to many regulations governing the protection of confidential information, financial accountability, data retention, and disaster recovery, among others. They're also under pressure from shareholders, stakeholders, and customers.To..

$149.00
Information Security Risk Management in 2020

 March 3 2020
 01 : 00 PM EST    
 60 Minutes
Information Security Risk Management in 2020

Protecting your organization's information is critical for the successful management and smooth operation of your organization. Utilizing information security management systems aid your organization in managing and protecting your valuable data and information assets. They not only help to keep your confidential information secure but also provide customers and stakeholders with confidence in your risk man..

$200.00
Beware Employee Embezzlement & Internal Fraud

 Recorded Webinar
 60 Minutes
 Refer a Friend
Beware Employee Embezzlement & Internal Fraud

This webinar examines the scope and nature of employee dishonesty and explains the risks to employers and organizations of all types. It goes on to deal with the practical aspects of prevention and response to victimization, as well as balancing the need to assure that corrective and deterrent programs and policies do not unduly interfere with normal operations and opportunities and do not generate other ma..

$200.00
Antidumping and Countervailing Duties: The Nuts and Bolts

 Recorded Webinar
 90 Minutes
 Refer a Friend
Antidumping and Countervailing Duties: The Nuts and Bolts

Antidumping (AD) occurs when foreign manufacturers sell goods in the United States less than fair value, causing injury to the U.S. industry. AD cases are company specific; the duty is calculated to bridge the gap back to fair market value.Countervailing duties (CVD) cases are established when a foreign government provides assistance and subsidies, such as tax breaks to manufacturers that export goods to th..

Showing 1 to 6 of 6 (1 Pages)