Open/Close Menu CGOC is a forum of over 3400 legal, IT, records and information management professionals from corporations and government agencies. For over a decade, CGOC has been advancing governance practices and driving thought leadership across the industry.
Publication: Law360
Written by Caroline Sweeney

Cyberattacks aren’t the only significant threats facing enterprises today. Companies often find themselves needing to conduct extensive and costly investigations into employee behavior. For example, I was recently involved in an internal investigation that was estimated to cost a global Fortune 500 company more than $1 million just for the investigation itself. Of course, costs can run much higher when settlements and other legal fees are included. According to the Mintz Group, Foreign Corrupt Practices Act penalty amounts totaled $1.8 billion for the period from implementation of the FCPA in 1977 to May 2016. The financial impact to companies, as well as the damage to their reputations and business disruption, can be staggering, and possible litigation following an investigation can cause further financial and reputational harm.

Read the article

Publication: Info Security Magazine
Written by Eckhard Herych

Less than a year away from the implementation of the European Commission’s General Data Protection Regulation (GDPR) and stakes for companies are high. This article outlines important steps companies can take right now to make significant progress toward creating a data infrastructure that dramatically reduces the likelihood of non-compliance.

Read the article

Publication: Dark Reading
Written by Ed McAndrew

Although, eliminating all cyber incidents is impossible, a "unified governance" approach that combines security with data management and information governance (IG) can help create a business culture that promotes a strong defense. CGOC Faculty Member Ed McAndrew offers 10 steps you can follow to create a culture of cybersecurity.

Read the article

Publication: Legaltech News
Written by Ryan Bergsieker and Allison Chapin

Like any significant cyber incident, a successful ransomware attack can give rise to an increasingly broad array of legal, regulatory and financial impacts. Planning ahead is essential, and legal teams should consider these nine tips when assessing their companies' readiness.

Read the article

Publication: Corporate Compliance Insights
Written by Heidi Maher

The risk and cost benefit analysis of 22 key processes allows organizations to practically deal with the torrid growth of digital data, a complex regulatory environment, and increasing adoption of cloud computing and machine learning.

Read the article

Publication: CFO Magazine
Written by Jake Frazier and Anthony Diana

If you think IG is tough at a typical enterprise, wait until you go through a corporate restructuring in today’s environment, when the risks are magnified, the challenges are stark, and IG failures frequently blow up both the budget and timeline set for the restructure, undercutting business goals.

Read the article

Publication: Inside Counsel
Written by Heidi Maher

Organizations understand that they must establish and maintain a comprehensive, enterprise-wide data privacy program built on a solid business case that defines its specific requirements. To begin the journey, explore these 10 foundational requirements for operationalizing a data privacy program.

Read the article

Publication: CFO
Written by Heidi Maher

To increase business value of data while reducing cost and risk, finance departments must become stakeholders in the development and implementation of data privacy programs.

Read the article

Publication: PR Web
Written by M.Bradley

Helps mature key processes related to global privacy compliance, data quality assurance, data leakage and theft, and more. “The hardest part of an IG program is getting started, and the CGOC Maturity Model provides the structure on which to build an effective IG program.” - Anthony Diana, Partner at Reed Smith.

Read the article

Publication: Corporate Counsel
Written by Heidi Maher

Organizations understand that they must establish and maintain a comprehensive, enterprise-wide data privacy program built on a solid business case that defines its specific requirements. To begin the journey, explore these 10 foundational requirements for operationalizing a data privacy program.

Read the article

© 2017 BY CGOC FORUM. ALL RIGHTS RESERVED.

logo-footer

STAY CONNECTED WITH US: