College years can be an exciting time for young adults, as they get their first taste of independence and being self-sufficient. However, the responsibilities of coming-of-age also comes with significant risks. Parents can help their college-bound children by following essential tips on reducing risky driving habits, managing cyber threats, and building a healthy financial lifestyle.
Resource Search
According to the 2018 Global Risks Report, cybercrime is the top risk for business leaders in advanced economies, as well as the risk most likely to intensify. In fact, with the rising frequency of data breaches, cyber risk is now a common exposure for individuals, families, family offices, and their related enterprises.
The past couple of years have proven to be banner years for private equity and merger and acquisition activity, with no signs of slow down in 2019. With cash on hand to invest and the increase in Representation and Warranty Insurance policies, forecasters expect these trends to continue. Podcast host Michael Cohen is joined by Luca Salvi to discuss the current state of the M&A and private equity trends in the United States.
Widespread political volatility and rapid technological advances are spurring companies to question not just their resilience, but also their fitness for purpose in the new world order. In this report, we show how firms can move from generalized concerns to analysis, discussions, and actions in response to specific threats that may most disrupt their ambitions and operations. It concludes by reflecting on the opportunities for Risk leaders to reframe the function to meet the needs of the new era.
No matter your industry, your company is a data company and for that reason, we are in a post-data world. Gen Z—your future customers and future employees—are already digital and they control over $100 billion in consumer spending today. In this video series, learn how to adopt a strategy that treats your data as the pre-tangible asset that it is and maximize your mission and goals, as well as achieve protection for your brand through privacy and data security compliance:
Privacy and data security are issues that every company needs to pay attention to. But how do companies comply with all the various laws between Europe with the GDPR and in California with the California Consumer Privacy Act? In this video series on data management best practices and privacy strategy, you can:
The California Consumer Privacy Act (CCPA) is one of the most significant regulations overseeing the data-collection practices of companies in the United States. Other states are expected to follow California’s lead. So how can companies keep up with the changes in privacy law and compliance requirements that vary widely across borders and nations?
Businesses have arguably never faced such a breadth of challenges as they do today. Drawing on data and insight from Fitch Solutions, a leading source of independent political, macroeconomic, financial, and industry risk analysis, our Political Risk Map 2019 presents a global view of the issues facing multinational organizations and investors. This map rates countries on the basis of political and economic stability, giving insight into where risks may be most likely to emerge and issues to be aware of in each country.
Does your company handle data analytics to target California consumers? If so, it is imperative that you pay close attention to the California Consumer Privacy Act (CCPA) that goes into effect on January 1, 2020. The CPA goes well beyond the General Data Protection Regulation, giving California consumers new privacy rights along with imposing independent obligations on businesses processing California consumers’ personal information.
This report outlines the key data breach notification laws in every state, as well as Guam, Puerto Rico, and the Virgin Islands. As part of your risk management strategy, use this guide as a map to review state laws, understand key issues and trends, and compare laws among states. For each state, the guide includes personal information definition, persons covered, encryption/notification trigger, specific content requirements, timing, penalty/private right of action, and other provisions.