<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://www.lexisnexis.com/blogs/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Risk &amp; Compliance</title><link>https://www.lexisnexis.com/blogs/za/b/risk-compliance</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>Webinar: From Compliance to Confidence: Updating your RMCP for 2025 and beyond</title><link>https://www.lexisnexis.com/blogs/za/b/risk-compliance/posts/from-compliance-to-confidence-updating-your-rmcp-for-2025-and-beyond</link><pubDate>Mon, 25 Aug 2025 10:29:53 GMT</pubDate><guid isPermaLink="false">70e9d49d-698d-4e02-a4a2-27e38d3f49b5:a38890c1-3e2e-46af-aa5e-191bc82c9b79</guid><dc:creator>Zander Kilian</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.lexisnexis.com/blogs/za/b/risk-compliance/rsscomments?WeblogPostID=3037</wfw:commentRss><comments>https://www.lexisnexis.com/blogs/za/b/risk-compliance/posts/from-compliance-to-confidence-updating-your-rmcp-for-2025-and-beyond#comments</comments><description>As the regulatory landscape continues to evolve, particularly under the Financial Intelligence Centre Act (FICA), it is imperative for institutions to ensure that their Risk Management and Compliance Programme (RMCP) is not only compliant, but also resilient and future-ready.(&lt;a href="https://www.lexisnexis.com/blogs/za/b/risk-compliance/posts/from-compliance-to-confidence-updating-your-rmcp-for-2025-and-beyond"&gt;read more&lt;/a&gt;)&lt;img src="https://www.lexisnexis.com/blogs/aggbug?PostID=3037&amp;AppID=195&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/RMCP">RMCP</category><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/webinar">webinar</category><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/Legal">Legal</category><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/FICA">FICA</category></item><item><title>Outpacing Cyber Threats</title><link>https://www.lexisnexis.com/blogs/za/b/risk-compliance/posts/outpacing-cyber-threats</link><pubDate>Thu, 09 Jan 2025 07:54:00 GMT</pubDate><guid isPermaLink="false">70e9d49d-698d-4e02-a4a2-27e38d3f49b5:69ac1645-4caa-4212-9dd3-97a9df934c62</guid><dc:creator>Kirshen Chetty</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.lexisnexis.com/blogs/za/b/risk-compliance/rsscomments?WeblogPostID=2506</wfw:commentRss><comments>https://www.lexisnexis.com/blogs/za/b/risk-compliance/posts/outpacing-cyber-threats#comments</comments><description>Cyber security threats are on the rise, and organisations are on the back foot. This emerged at our latest LexisNexis webinar, which unpacked cyber security management strategies(&lt;a href="https://www.lexisnexis.com/blogs/za/b/risk-compliance/posts/outpacing-cyber-threats"&gt;read more&lt;/a&gt;)&lt;img src="https://www.lexisnexis.com/blogs/aggbug?PostID=2506&amp;AppID=195&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/Legal">Legal</category><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/Cyber%2bThreats">Cyber Threats</category><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/Corporate">Corporate</category><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/Cyber%2bSecurity">Cyber Security</category><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/Outpacing%2bCyber%2bThreats">Outpacing Cyber Threats</category></item><item><title>The Significance of GRC in Africa: Navigating the Digital Age</title><link>https://www.lexisnexis.com/blogs/za/b/risk-compliance/posts/the-significance-of-grc-in-africa-navigating-the-digital-age</link><pubDate>Thu, 25 Jul 2024 07:34:15 GMT</pubDate><guid isPermaLink="false">70e9d49d-698d-4e02-a4a2-27e38d3f49b5:68a562b1-de59-4578-8fac-ed14356fd3f8</guid><dc:creator>Harsha Kantharaja</dc:creator><slash:comments>0</slash:comments><wfw:commentRss xmlns:wfw="http://wellformedweb.org/CommentAPI/">https://www.lexisnexis.com/blogs/za/b/risk-compliance/rsscomments?WeblogPostID=1658</wfw:commentRss><comments>https://www.lexisnexis.com/blogs/za/b/risk-compliance/posts/the-significance-of-grc-in-africa-navigating-the-digital-age#comments</comments><description>In a world rapidly transforming through technology, Governance, Risk, and Compliance (GRC) have emerged as pivotal concepts in Africa&amp;#39;s evolving business landscape.(&lt;a href="https://www.lexisnexis.com/blogs/za/b/risk-compliance/posts/the-significance-of-grc-in-africa-navigating-the-digital-age"&gt;read more&lt;/a&gt;)&lt;img src="https://www.lexisnexis.com/blogs/aggbug?PostID=1658&amp;AppID=195&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</description><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/Digital%2b%2bTransformation">Digital  Transformation</category><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/The%2bSignificance%2bof%2bGRC%2bin%2bAfrica">The Significance of GRC in Africa</category><category domain="https://www.lexisnexis.com/blogs/za/b/risk-compliance/archive/tags/digital%2bage">digital age</category></item></channel></rss>