Top 10 Takeaways of the New ISO 37001 Anti-Bribery Management Systems Standard
This eBook provides an overview of the ISO 37001 Anti-Bribery Management Systems standard. The eBook provides key takeaways of the Standard based on insights from CREATe’s Leslie Benton, a member of the U.S. Technical Advisory Group to the ISO committee developing ISO 37001. The eBook explores elements of ISO 37001, distinguishing characteristics, scope of the Standard, and certification.
Cyber Risk: Navigating the Rising Tide of Cybersecurity Regulation
The whitepaper provides an overview of the ongoing wave of legislation, government regulation, procurement requirements, and court-imposed developments across the globe, following the pervasive increase in hacking and cybersecurity incidents. The whitepaper also explores new voluntary approaches and best practices collaboratively developed by governments and the private sector, designed to achieve stronger cybersecurity protections and...
"Reasonable Steps" To Protect Trade Secrets: Leading Practices in an Evolving Legal Landscape
The loss of trade secrets – ranging from proprietary formulas to confidential information to production methodologies – can have a devastating impact on a company. When there is misappropriation, in a growing number of jurisdictions a company must prove that it has taken “reasonable steps” to prevent trade secret theft or misuse. This whitepaper: “Reasonable...
Addressing Corruption Risk Through Enterprise Risk Management
Increased enforcement activity and the proliferation of anti-corruption laws in countries around the globe highlight the need for companies to adopt and enforce effective anti-corruption programs to meet risks. The CREATe whitepaper–entitled Addressing Corruption Risk through Enterprise Risk Management–explains how companies can follow the approach of the major ERM standards and frameworks to: more effectively...
Safeguarding Trade Secrets and Mitigating Threats
An eBook to help companies understand how to protect trade secrets and critical business information from cyberattacks, insiders and other threats. Download this eBook to gain access to: • A five-step framework to help companies assess and safeguard trade secrets. • Guidance about the elements of an effective program to protect critical business information. •...