Featured Insights
Most Recent
Bridging the Compliance to Operations Gap: Lessons from DHCS Audits 2024-2025
The California Department of Health Care Services (DHCS) has embarked on a robust transformation of the Medi-Cal program aimed at improving healthcare quality, access, and equity for members. These priorities have been reinforced through revised Medi-Cal Managed Care Plan (MCP) contracts and updated sub-regulatory guidance such as All Plan Letters (APLs) and policy guides. Recently, DHCS has used these same avenues to clarify its policies regarding the imposition of enforcement actions, including corrective action plans and administrative and monetary sanctions, for non-compliance with program requirements.
Sophisticated TSR-Based PSU Valuation in Executive Compensation
In today's governance landscape, 95% of S&P 500 companies now utilize Performance Share Units (PSUs) in their executive compensation frameworks—a substantial increase from 76% in 2012. This shift reflects the market's demand for stronger pay-for-performance alignment, with PSUs now constituting approximately 60% of the average CEO's long-term incentive mix. Particularly notable is the widespread adoption of Total Shareholder Return (TSR) metrics, with 72% of S&P 500 companies incorporating relative TSR in their long-term incentive plans.
De-Mystifying Statistical Sampling: Extrapolation and Interpretation
We take the 380 shifts and analyze them. We determine that out of 380 shifts, 190 shifts have a missed meal violation, or 50%. With an MOE of 5.0%, this means that we can infer that 50% of the shifts have a meal violation +/-5.0%. In other words, we estimate that the number of shifts with a meal violation in the population is 15,000 +/- 750, which would imply an estimate of meal violations that ranges from 14,250 to 15,750.
Ankura AI Security Roundtable Takeaways
Last month, the Ankura artificial intelligence (AI) team hosted a roundtable forum with some of the most forward-thinking leaders in the AI landscape. This meeting featured experts with titles such as head of AI, AI director, chief information officer (CIO), chief technology officer (CTO), and the d...
Post-Breach Case Study: Akira Behavioral Insights
Discovering an AnomalyAnkura Cyber Threat Intelligence & Expert Services (CTIX) team researchers observed the Akira Ransomware-as-a-Service (RaaS) group exhibiting unusual behavior in their post-ransomware procedures. Typically, when victims decide not to pay a ransom demand, their company name ...
Goodbye Non-PCD Double Count: What ASU 2025-08 Means for Your Institution
IntroductionOn Nov. 12, 2025, the Financial Accounting Standards Board (FASB) issued Accounting Standards Update (ASU) 2025-08, which amends the previous guidance in Accounting Standards Codification (ASC) 326 on accounting for purchased loans. Specifically, the update expands the use of the gross-u...
Navigating China's Health Transformation: Opportunities and Challenges for Multinationals
The intensity of China's transformation over the past decades has unleashed unparalleled momentum while also presenting profound challenges to its socioeconomic ambitions, impacting how multinationals navigate this new environment. Nowhere is this tension more critical than in its health system, whe...
Who Can Afford a Billion Dollar Replacement Hospital?
Strategic Approaches to Aging Infrastructure in Low-Growth, High Construction Cost MarketsThe cost of new hospital construction is becoming increasingly prohibitive. In many markets, a 300-bed replacement facility can now exceed $1 billion in total project costs, driven by escalating labor expenses ...
The Impact Exchange: On Leadership with Dr. Jessica Kriegel
Think control drives success? Think again.Most leaders believe control equals results—but what if that belief is holding you back?In the latest episode of The Impact Exchange, John Frehse sits down with Dr. Jessica Kriegel, Chief Strategy Officer at Culture Partners, to explore why the most ...
Ankura CTIX FLASH Update - December 10, 2025
Malware Activity Spyware Innovations and AI Browser VulnerabilitiesRecent reports reveal alarming advancements in cybersecurity threats. The spyware company Intellexa has created a highly covert infection method called “Aladdin.” The spyware infects devices when a user simply views a malici...









