Categories
Career Can D0

The Power of Women in Leadership with Rachel Bellow

In this episode of Career Can Do, host Mary Ann Faremouth interviews Rachel Bellow, the co-founder of Bonfire, a leadership development program for women. Rachel discusses her journey in creating the program and the importance of providing women with the tools and skills necessary to become effective leaders. She also shares her insights on how leadership has evolved over time, emphasizing the need for emotional intelligence and influence rather than just inspiration.

It’s often difficult to persuade companies and leaders to adopt a fresh approach to leadership, Rachel tells Mary Ann. Many people in management positions are set in their ways and are resistant to change. This mindset can have negative consequences on the company’s bottom line, as high turnover and low employee morale can hurt productivity and performance. Branding and marketing are the keys to convince these leaders to adopt a new approach to leadership, Rachel believes. Developing a distinctive brand that catches their attention is often all it takes to help them acknowledge the necessity for change. 

 

Bonfire’s unique branding and community-focused program has helped catch the attention of HR leaders, many of whom are women themselves. They understand the importance of creating an inclusive workplace culture that values diversity and fosters community. Rachel believes that women are natural architects of change and can influence the workplace to work for everyone.

The results of her program show that women who participate are energized and empowered to create positive change in their workplaces, contributing their unique skills and perspectives to make their companies more profitable, fun, and fulfilling places to work.

 

Rachel shares valuable advice for individuals who may be at a crossroads in their career paths. She stresses the significance of following your own curiosity when it comes to your career development. Rather than trying to map out your career trajectory in your head, she suggests that you ask yourself what you want to learn more about, who you want to learn from, and what kind of physical environment you want to learn in. These three questions, according to Rachel, are the most reliable compass you have when trying to determine your career path. By following your curiosity and being mindful of your interests, you can find a career that is not only fulfilling but also aligns with your passions and aspirations.

 

Resources

Rachel Bellow on LinkedIn | Instagram | Facebook 

Bonfire | The Big Payoff

Faremouth.com

Categories
From the Editor's Desk

March and April 2023 in Compliance Week

Welcome to From the Editor’s Desk, a podcast where co-hosts Tom Fox and Kyle Brasseur, EIC at Compliance Week, unpack some of the top stories which have appeared in Compliance Week over the past month, look at top compliance stories upcoming for the next month, talk some sports and generally try to solve the world’s problems.

 From the Editor’s Desk, hosted by Tom Fox and Kyle Brasseur, is the perfect podcast to stay informed on the dynamic events of March 2023. They discuss the Department of Justice’s changes in the ECCP and the CCO compliance officer as well as look into the SEC and banking regulator’s roles during the SVP Bank failure. Kyle previews the upcoming long-form Compliance Week case study, which will take a deep dive into ESG in one company and conclude with a look into sports by reviewing the madness of 2023 March Madness, the issues surrounding Ja Morant, and Kyle’s deep appreciation for the World Baseball Classic, noting its ability to add diversity to the game and its positive impact on the baseball community as a whole.

 Highlights Include:

·      The Role of the Chief Compliance Officer in 2021: Navigating Changing Regulations and Increased Pressure.

·      Financial Regulatory Oversight In the Wake of the Dodd-Frank Act

·      The Role of the Chief Risk Officer in Risk Management

·      The Practical Uses of ESG Disclosures in Real Life

·      The Ups and Downs of March Madness: Unprecedented Success for Small Schools.

·      Reporting on Personal Hardships in Sports: The Case of Ja Morant and Josh Hamilton

·      The Power of Unity in Baseball: A Discussion on the Global Impact of the World Baseball Classic

·      The Appeal of the World Baseball Classic

 Kyle relates some of the upcoming Compliance Week 2023 Conference highlights from May 15-17 in Washington, DC. Listeners of this podcast will receive a discount of $200 by using code TF200 on the link below.

Resources

Compliance Week 2023 information and registration here

Kyle Brasseur on LinkedIn

Compliance Week

Categories
Blog

Coming Conflict with China-Business Challenges and Responses: Good Compliance is Good Business

In the short span of the 21st Century, the world’s two top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent non-kinetic warfare. What does this mean for US business doing business in and with China? For this special 5-part blog post series, I visited with Brandon Daniels, CEO of Exiger, to explore issues diverse as a real danger, supply chain, exports, cyber-attacks, and IP theft from the business perspective and give the compliance and business executive their viewpoints on what you can do to not only prepare your company but protect it as well. In concluding Part V, we lay out the business response to the coming conflict with China-good compliance.

In the face of rising tensions with China, it’s essential for businesses to take proactive steps to protect themselves. In the fifth and final episode of our five-part series on the coming conflict with China, we outline the integral roles of government, public companies, businesses, think tanks, consultants, product providers, and service providers in addressing the challenge. The  importance of compliance as good business practice cannot be overstated. We also discuss the strategies of risk assessment and risk management necessary to weather the coming storm.

Here are the steps you need to follow to create good compliance in your organization to help you meet the China challenge.:

  1. Identify risks
  2. Assess risks
  3. Implement a risk management strategy
  1. Identify risks

 The first step in addressing the upcoming conflict with China is to identify risks. This can be done by looking at the transcript and thinking about what risks are present in the context of the conversation. For example, the transcript mentions potential conflict with China, cyber intrusions, human rights abuses, national security threats, and IP theft. All of these topics should be considered potential risks that need to be assessed.

One of the main risks is the economic and national security threat that comes from insider threats. This includes cyber intrusions, credential theft, and other malicious activities. Additionally, public companies need to be aware of the potential for IP theft, human rights abuses, and other forms of economic sabotage. It is also important to understand the need for investment in cyber hardening, diversification away from China, and incentives for public markets. Finally, businesses must be aware of the need for risk assessment and risk management strategies, as well as the need to monitor and upgrade those strategies as necessary. All of these risks must be identified in order to effectively address the coming conflict with China.

  1. Assess risks

Once the potential risks have been identified, the next step is to assess the likelihood of the risks and their potential impacts. This can be done by looking at past experiences and current trends. It is also important to consider the potential of the risks, as well as the severity of the impacts. For example, if a risk involves cyber intrusions, it is important to consider the potential for data theft, as well as the impact of a data breach on the company’s reputation.

Finally, it is important to look at the potential solutions for the identified risks. This can be done by looking at the solutions that have been suggested in the transcript, such as regulation, funding, and raising awareness. It is also important to consider the potential costs and benefits of each solution, as well as the potential for implementation. By assessing the risks, the solutions, and their potential impacts, businesses can develop an effective risk management strategy.

 3. Implement a risk management strategy

A risk management strategy is essential for preparing for a potential conflict with China. This strategy should involve identifying risks, assessing the potential impact of each risk, creating a plan to manage each risk, and monitoring the implementation of the risk management plan. Government regulators can lead this effort by raising awareness of the interconnected issues and prioritizing the expenditure of resources to mitigate risk. Additionally, incentives can be provided to public companies to invest in risk mitigation strategies. Businesses should also take the initiative to assess their own risks and create plans to reduce them. This can be done through utilizing existing technology to make processes more efficient and cost effective. Finally, raising awareness is essential to ensure that everyone is aware of the potential risks posed by the conflict with China. This can be done through education and providing resources to help people understand the risks and how to mitigate them.

The coming conflict with China presents numerous risks to businesses, governments, and the public at large. It is essential to assess the risks, create a risk management strategy, and implement it. By taking the initiative to identify, assess, and manage risks, businesses can protect themselves and stay competitive in this ever-changing landscape. The bottom line is good compliance is good business because good compliance is good business process. With the right knowledge, tools, and strategies, you too can be prepared for the coming conflict with China and protect your company from potential risks.

For a deeper dive into these issues, check out the 5-part podcast series with Tom Fox and Brandon Daniels, here.

Categories
31 Days to More Effective Compliance Programs

One Month to a More Effective Compliance Program for Business Ventures-Why Business Ventures are Different than 3rd Parties

Business ventures, whether JVs, partnerships, franchises, team agreements, strategic alliances or one of the myriad types of business relationships a U.S. company can form outside the U.S., are different than the usual risk presented by third-parties under compliance requirements such as those mandated by the FCPA. The problems for companies is that they tend to treat business venture risk the same as third-party risk. They are different and must be managed differently.

The bottom line is that may compliance practitioners have not thought through the specific risks of business ventures such as JVs, franchises, strategic alliances, teaming partner or others as opposed to sales agents or representatives on the sales side of the business. I hope that this will help facilitate a discussion that maybe people will begin to think about more of the issues, more of the risk parameters and perhaps put a better risk management strategy in place.
Three key takeaways:

  1. Business ventures bring different FCPA risks from third-parties.
  2. JVs have both external compliance risks and corporate governance risks.
  3. Use your full compliance tool kit for business ventures in managing the FCPA risk for franchises.
Categories
Coming Conflict with China

Coming Conflict with China: Part 4 – Cyber Spying and IP Theft

In the short span of the 21st Century, the world’s two top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent non-kinetic warfare. What does this mean for US business doing business in and with China? In this special 5-part Series, Tom Fox and Brandon Daniels, CEO of Exiger, a leading global third-party and supply chain management software company, explore issues diverse as a real danger, supply chain, exports, cyber-attacks, and IP theft from the business perspective and give the compliance and business executive their viewpoints on what you can do to not only prepare your company but protect it as well. In Part IV, China’s aggressive tactics to steal intellectual property, we consider the responses to protect the US’s IP and how to take aggressive action against the Chinese government to seek remuneration for stolen assets.

What are China’s aggressive tactics in stealing intellectual property from countries all over the world? Through intelligence gathering, academic partnerships, and supply chain buyouts, China has managed to copy and counterfeit American business products and other technologies. Companies must harden their defenses and refuse to stand for IP theft by using the Rule of Law to take a stand against the theft of US intellectual property. Through a concerted effort, companies can fight back and reclaim their assets.

Key Highlights:

1. How is China aggressively stealing intellectual property and technology?

  1. How is counterfeiting built into the Chinese economic model?
  2. Why is the Rule of Law a critical recourse for companies whose intellectual property is stolen by China?

Notable Quote

“We foment innovation everywhere; anyone, anywhere, can be an innovator, can invent, and can end up getting the rewards from that.”

Resources

Exiger

Tom Fox

Connect with me on the following sites:

Instagram

Facebook

YouTube

Twitter

LinkedIn

Other episodes in this Series:
Episode 1-From Potential Conflict to Real Danger

Episode 2-Supply Chain Issues

Episode 3-Exports and Rebalancing the Global Economy

Categories
Hidden Traffic Podcast

Updates, News and Resources

In this episode of Hidden Traffic, Gwen Hassan updates listeners on news and resources related to human trafficking. Here are some of the topics she covers:

  • Congratulations to Source Map for being named to Fast Company’s Most Innovative Companies list for their work in clean supply chain and mapping. 
  • Mekong Club’s recent publication of ‘Eight Tips for Brands to Prepare for Germany’s New Due Diligence Act’. Gwen encourages companies doing business in Germany to read the tips, which provide practical steps for compliance. 
  • Recent changes to the Global Fund to End Modern Slavery (GFEMS), including their new toolkit, which was developed in partnership with the National Survivor Network. The toolkit “provides practical tools for organizations to become more inclusive of human trafficking and modern slavery survivors in their approaches,” Gwen remarks.
  • A recent New York Times article entitled ‘Alone and Exploited’ highlights the prevalence of child labor in the US. The article discusses cases of child workers as young as 12 years old working in subcontractors of major companies such as Walmart and Target. 
  • Gwen discusses a new law in Arkansas that makes it easier for employers to employ children. She expresses concern about the potential for this law to exacerbate the problem of child labor and human trafficking in the US. She urges listeners to be aware of the issue and to support efforts to combat it.
  • “Bottom line,” Gwen points out, “is the prevalence of modern slavery and human trafficking within the United States continues to be even more serious and large than we believed originally…”

 

Resources:

Source Map

Fast Company – Most Innovative Companies

Mekong Club – Eight Tips for Brands to Prepare for Germany’s New Due Diligence Act

Global Fund to End Modern Slavery

National Survivor Network 

Meaningful Engagement of People With Lived Experience toolkit

New York Times – Alone and Exploited

Categories
Presidential Leadership Lessons for the Business Executive

Leadership Lessons from Presidents of the Republic of Texas – Sam Houston, Second Term

Presidential Leadership Lessons is a podcast hosted by Tom Fox. This continues a four-part series on leadership lessons not from US Presidents but from Presidents from the Republic of Texas, from 1836 to 1845. In this series, Tom is joined by Don Frazier, head of the Texas Center at Schreiner University in Kerrville TX to discuss the four Presidents who led Texas when it was a country. In this fourth episode, Tom and Don discuss the second term of Sam Houston.

In the second term of President Sam Houston, he was leading the Republic of Texas through a critical period of financial challenges. Don references the Texas Rangers, a defensive group established in 1823 which later became a paramilitary force during Houston’s tenure, and highlights the major impact the presence of the plantation south had on the US wanting to annex Texas. Ultimately, it was President Houston who was able to put things back on a level ground, allowing Texas to be annexed to the US and fly the U.S. flag. Don shares how he was able to ‘pull it off’ with the help of President Tyler and finally, President Polk who ‘poked the fish’ and finalized the annexation. Hear more interesting tidbits about Houston’s Presidency and related leadership lessons on the ‘Presidential Leadership Lessons’ podcast.

Key Highlights

The Challenges Faced by Sam Houston in His Second Term of Office in the Republic of Texas [00:35]

The History of the Texas Rangers [4:22]

The Annexation of Texas and the Mexican-American War [8:41]

The Benefits of Texas Annexation to the United States [12:45]

A Successful Fishing Trip and the Annexation of Texas 16:50]

Notable Quotes

1.         “Texas did not retain the right to succeed. They had they retain the right to divide into multiple states at some future date.”

2.         “The Republic of Texas is in dire straits.  It is going to go into complete default and economic collapse. You can’t get any financial backing to speak of. There’s lots of attempts, but there’s not a lot of people buying into the Texas dream. Most Texans are still wanting to be Americans and not Texans.”

3.         “What we’ll do is we’ll have officers that are on the payroll and then what they will do is they will fill out their ranks with volunteers that are providing their own weapons and stuff, and we’ll figure out how to settle up with them later. That’s where you start seeing people like Samuel Walker. People like Jack Hayes. These guys start showing up and they begin the regularization, the professionalization of the Rangers as a quasi-military force to essentially skirmish with the Comanches.”

4.         “So Indianola is the really, the big port in the Republic of Texas period. Galveston is shallow and they haven’t done a whole lot of improvements. He gives you the gateway to Matagorda. Matagorda gives you the gateway to San Antonio, gives you gateway to the San Antonio River Valley, the Guadalupe River Valley.”

Resources:

Don Frazier, Director The Texas Center

The Texas Center at Schreiner University

Categories
Daily Compliance News

March 31, 2023 – The Binance CCO Edition

Welcome to the Daily Compliance News. Each day, Tom Fox, the Voice of Compliance, brings you compliance-related stories to start your day. Sit back, enjoy a cup of morning coffee, and listen to the Daily Compliance News. All from the Compliance Podcast Network. Each day we consider four stories from the business world, compliance, ethics, risk management, leadership, or general interest for the compliance professional.

Stories we are following in today’s edition of Daily Compliance News:

· Binance CCO at the center of SEC charges. (WSJ)

· Ecuador President to face corruption charges. (FT)

· Tokyo Olympic corruption scandal is still causing Japan headaches. (NYT)

· West can help Ukraine rein in corruption. (Reuters)

Categories
Daily Compliance News

March 30, 2023 – The Retaliation Edition

Welcome to the Daily Compliance News. Each day, Tom Fox, the Voice of Compliance, brings you compliance-related stories to start your day. Sit back, enjoy a cup of morning coffee, and listen to the Daily Compliance News. All from the Compliance Podcast Network. Each day we consider four stories from the business world, compliance, ethics, risk management, leadership, or general interest for the compliance professional.

Stories we are following in today’s edition of Daily Compliance News:

·       Exxon climate foes hacked.  (WSJ)

·       Only bad employees are fired.  (NPR)

·       TikTok tracks geo-locations. (TechTheLead)

·       Companies urged to take stock of their climate damage. (WSJ)

Categories
Blog

Coming Conflict with China-Business Challenges and Responses: Cyber Spying and IP Theft

In the short span of the 21st Century, the world’s two top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent non-kinetic warfare. What does this mean for US business doing business in and with China? For this special 5-part blog post series, I visited with Brandon Daniels, President of Exiger, to explore issues diverse as a real danger, supply chain, exports, cyber-attacks, and IP theft from the business perspective and give the compliance and business executive their viewpoints on what you can do to not only prepare your company but protect it as well. In Part III, we consider export issues of US companies and rebalancing the global economy.

As tensions between the US and China continue to grow, so too does the threat of cyber espionage and intellectual property theft. According to the Pentagon, China-linked economic espionage cases have jumped 1300% over the past decade, and nearly half of all counterintelligence cases now involve China. Daniels sheds light on how China is stealing American Intellectual Property (IP) through intelligence services, nontraditional developers, academic partnerships, and hidden ownership of companies in the supply chain.

We not only consider the extent of China’s IP theft but provide some concrete steps for American companies to protect their crown jewels and seek recourse if they become the victim of cyber espionage. With trillions of dollars at stake, the US companies can no longer afford to be unprepared.

Here are some steps you can take for protection.:

  1. Protecting crown jewels by having stricter, more active and proactive containment of technologies that are subject to export control laws.
  2. Monitoring and identifying where there could be IP leakage through better due diligence of vendor and customer ecosystems.
  3. Taking aggressive action to show China that any IP theft will be discouraged and the company will be remunerated for it.
  1. More active and proactive containment of technologies

The first step to protecting your organization’s crown jewels from China’s non-kinetic warfare is to have stricter, more active, and proactive containment of technologies subject to export control laws. This means that public companies need to understand what are their “crown jewels” and how to protect them. They should be more aware of who their suppliers and customers are, and where those technologies are going. Your organization needs to be willing to call out and enforce international trade violations. This requires better due diligence when it comes to their vendor ecosystems, customer ecosystems, and where your organization is buying their technology from. Companies also need to ensure that they have contractual clauses around confidentiality and exposing information so that they can have legal recourse if their intellectual property is stolen. Finally, they should be willing to get serious and aggressive to show China that they will be remunerated for taking their IP.

  1. Monitoring and identifying IP leakage

Monitoring and identifying where there could be IP leakage through better due diligence of vendor and customer ecosystems is a critical step in protecting intellectual property (IP) from theft. To begin this process, companies must understand their supply chain and customer ecosystem(s) to identify any potential areas of vulnerability. Companies should consider conducting background checks on their vendors, as well as tracking and monitoring the movements of their customer data and products. Additionally, companies should be aware of any suspicious activity in their customer and vendor ecosystems and take steps to protect against any potential IP theft.

Companies should be aware of any trade regulations or laws that could be applicable to their products, and take the necessary steps to ensure they are compliant. Additionally, they should consider utilizing insurance or other risk mitigation methods to reduce the potential of IP leakage or theft. Finally, companies should be prepared to take legal action to enforce their IP rights if necessary. This could involve filing lawsuits or engaging in international trade court proceedings to seek remedies for any IP violations. By monitoring and identifying areas of potential IP leakage, companies can better protect their IP and ensure that it is not stolen or misused.

  1. Take aggressive action

Taking aggressive action to show China that any IP theft will be discouraged and the company will be remunerated for it. In other words, use the Rule of Law to not only protect your IP but also aggressively go after any IP theft through civil litigation. This all starts with protecting your crown jewels, which means having stricter containment of technologies that are subject to export control laws, and specifically doing this with regard to China. Companies should also monitor and identify potential areas of IP leakage, such as suppliers, customers and vendors, and perform better due diligence to ensure that the technology is not falling into the wrong hands. Finally, companies should not be afraid to take their cases to court. For example, Tang Energy Group successfully sued Aviation Industry Corp. of China, or AVIC for stealing their wind turbine technology and won a settlement in the tens of millions of dollars. By taking legal action, companies can demonstrate to China that any IP theft will not be tolerated and that they will be held accountable for their actions.

The threat of cyber espionage and intellectual property theft from China is real, and companies need to be aware of the implications and take action to protect their crown jewels. Companies should consider a three-step plan for protecting their IP and seeking recourse if it is stolen, including stricter containment of technologies that are subject to export control laws, monitoring and identifying potential areas of IP leakage, and taking aggressive action to show China that any IP theft will not be tolerated and will be remunerated. With the right steps in place, companies can protect their IP and ensure it is not stolen or misused. Take control of your IP today!

For a deeper dive into these issues, check out the 5-part podcast series with Tom Fox and Brandon Daniels, here.