Section 2

Building Your Foundation

MoreHide Arrow Down Icon Icon of solid caret pointing downwards.

Implement What You Know with Confidence

Discover action-based tools that provide simple steps for program improvement or robust plans for new ways of doing business. 

MoreHide Arrow Down Icon Icon of solid caret pointing downwards.

Your ethics and compliance program is an ecosystem of moving parts. New laws and regulations, new lines of business, new geographies, mergers and acquisitions become part of a growing enterprise that your compliance ecosystem must support. 

Effective compliance programs are able to deftly navigate these complexities because they have built strong foundations that were developed with the nature of the compliance industry in mind.

This section will give you the expert advice and programmatic best practices to ensure the first steps you take to develop your program are in the right direction. Or if your program is more mature, these resources and insights will give you the necessary guidance to course correct and improve your program’s foundation at whichever stage it is in. 

 

Best Practice for Cyber Security: The Ethics & Compliance Effect Lock Icon Icon of the outline of a padlock.

Companies know that having a cyber security program in place is critical to decreasing the risk of a data breach and responding to one if and when it happens. But some companies continue to put themselves at risk by failing to put in the time, money and effort to develop and implement a cyber security program.

Bloomberg 02/15/2017
Lock Icon Icon of the outline of a padlock. Download

Companies know that having a cyber security program in place is critical to decreasing the risk of a data breach and responding to one if and when it happens. But some companies continue to put themselves at risk by failing to put in the time, money and effort to develop and implement a cyber security program.

Ethics and compliance plays a key role in all components of a cyber security program, and companies should not wait until a cyber security incident has already happened to bring in the CCO. With the unique perspective of understanding individuals’ online behavior, the CCO can focus on human behavior and privacy expectations and help tailor the company’s policy, training, and incident reporting and tracking. Companies that spend the time, money and effort to include these components in their cyber security program can expect to see a better understanding from employees on the role they play in the program’s success and a decrease in cyber security incidents.