How to Manage Risk and Compliance Initiatives
Published Dec 13 2023 01:33 PM 2,639 Views
Microsoft

This month's episode of Uncovering Hidden Risks discusses how organizations today are faced with high volumes of information and increasing compliance requirements. How can we successfully execute policies and meet regulatory requirements without burdening employees?

 

Joining our host Erica Toelle is our guest, Patrick Chavez. Patrick is the Chief Privacy Officer at Edward Jones. He leads the firm’s privacy efforts and develops and implements policies and processes related to preparing for and responding to cyber and privacy incidents. He also oversees the firm’s Records and Information Management Program within the Legal Division and provides legal guidance and advice to the firm’s business areas on matters related to eDiscovery, privacy, information and data security and protection, and information governance.   

Mark Diamond joins us as our guest host. Mark is the CEO of Contoural, the largest independent provider of strategic Information Governance consulting services, including records management, privacy, litigation readiness and employee collaboration.  Contoural, an independent provider that sells no products, serves as a trusted advisor to more than 30% of the Fortune 500 plus many mid-size and public sector organizations.

Together, we'll explore how to start and manage risk and compliance programs.

 

In this episode, we'll cover the following:   

 

  • How Edward Jones aligns legal support for privacy, records management, and provides legal advice for the data governance, eDiscovery, and information security spaces.
  • How to manage conflicts between records management, privacy, eDiscovery and Information Security.
  • What we see as the biggest barrier for organizations to get started on taking a bigger picture view of these areas.
  • When to take a strategy view and when to take a technical execution view on compliance and risk management programs.
  • How an organization should think about policy creation to ensure the policies can actually be executed.

 

Listen to this episode on your favorite podcast platform: 

To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the latest news and updates on cybersecurity. 

Co-Authors
Version history
Last update:
‎Dec 13 2023 01:28 PM
Updated by: