Skip to main content

Search

Home    /    Insights & Resources

Insights & Resources

Start exploring insights from across the industries we serve, featuring the latest industry trends, compliance alerts, tax and accounting news and much more.

Our on-demand session discusses how your government agency can best prepare for cyber incidents. We'll look at ways to harness strategic initiatives currently in play and neutralize the published incidents of impacted organizations.
Navigating the federal grants process can be complex. Our Center of Excellence – Not-for-Profit Consulting team dives into the ever-changing and multifaceted world of federal grants from how to determine which grants best fit your mission to ensuring compliance with federal requirements and reporting.
Creating a framework for regular review of intellectual property assets can help companies capitalize on their investment and inform strategic & tactical decisions.
Weaver's series sheds light on the intricacies of HIPAA compliance for non-medical entities and offers crucial insights that could impact your company’s operations.
Weaver’s downloadable risk monitoring checklist can help companies that outsource their IT function to a third party assess the vendor’s potential areas of risk.
During this webinar, we discuss considerations for your organization that will help you be prepared in the event you are faced with responding to a fraud allegation.
Join us as we discuss an overview as you evaluate for relevancy and action within your technology environment.
In this session a Qualified Security Assessor will discuss PCI DSS, 4.0 timelines, definition updates, new concepts, and key requirement changes.
In this session, we will discuss present-day incidents and breaches, the life cycle of an incident and how to effectively prepare your organization for battle.
During this session, we’ll look at how cybersecurity critical components can be organized visually to increase visibility and enhance the security posture.
In this session, we will discuss how we got to Kubernetes, some terminology, and why it’s so revolutionary (and why it’s not). Learn more.
Join us as we articulate the security risks created by ephemeral assets and provide an overview of tools available. Learn more
1 2 3 4 5