Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • How to stay safe from cyber security breaches?
    How to stay safe from cyber security breaches? Paul Jackson, Asia-Pacific Leader, Cyber Security and Investigations | Kroll Recorded: Oct 27 2017 54 mins
    Asia Pacific has recently seen numerous changes to legislation and regulations as governments attempt to come to grips with the risks posed by cyber security breaches. In particular, the strengthening of data privacy laws which are increasingly requiring organizations to disclose, within a short time-frame, when they become aware that personally identifiable information belonging to customers or employees has been exposed. The associated heavy penalties are driving more and more companies to take proactive measures. Then there are the regulators (notably in the financial world) who are driving requirements for self-testing of cyber security with a focus on the ability to quickly recover from and remediate a cyber incident. Join Paul Jackson as he discusses the latest development of the privacy and cyber security field in Asia, and the best approach to mitigate these risks.
  • Email: Your Organization’s Best Friend or Worst Enemy?
    Email: Your Organization’s Best Friend or Worst Enemy? Email Recorded: Oct 4 2017 66 mins
    In this 60-minute webinar, Pillsbury’s Cathie Meyer and Kroll’s Erik Rasmussen will detail how and why your organization’s best friend in email can quickly turn into your worst enemy. They will discuss ways you can build better security into your email processes and detail the legal and technical best practices of “email hygiene.”

    You will learn:
    • Why and how criminals try to compromise business and organizational emails
    • How they profile targets for maximum impact
    • What technical tools and scams they use to gain access into systems
    • What legal issues exist and how you can address a changing legal landscape
    • How you can improve your protection and response capabilities

    Email security presents unique and sometimes complex challenges, and no system can be 100% failsafe, but you can vastly improve your organization’s ability to defend itself through specific processes and approaches. In this webinar, you will learn strategies and processes you can implement, so your organization can enjoy the full benefits of email while reducing risks.

    Presented by
    • Cathie Meyer, Senior Counsel, Pillsbury
    • Erik Rasmussen, North American Practice Leader, Cyber Security and Investigations, Kroll
  • Blockchain and The Future of Data Breaches
    Blockchain and The Future of Data Breaches Alan Brill is a Senior Managing Director with Kroll’s Cyber Security and Investigations practice Recorded: Sep 19 2017 32 mins
    Can blockchain deliver on its promise?

    The promise of blockchain’s distributed open ledger format is an “unhackable” network able to record and verify data transactions without typical third party validation. The potential is clear. Blockchain technology could constantly check and validate data communication flow with no single point of failure and offload authentication to a decentralized layer of security.
  • ASEAN connections: Cross-border M&A
    ASEAN connections: Cross-border M&A Richard Dailly, Managing Director and Head of Southeast Asia, Kroll Recorded: Sep 12 2017 63 mins
    Rich with investment opportunities and positive demographics — a young and dynamic population with growing disposable income and upward mobility — the Association of Southeast Asian Nations (ASEAN) continues to attract international acquirers.

    In 2016, the region recorded 534 M&A transactions valued at US$57.9bn, and Q1 2017 sustained the momentum with 118 deals worth US$14.7bn. This was a year-on-year increase of 8% in value and 7% in volume over the same period in 2016. For foreign inbound M&A, the ASEAN saw 223 deals worth US$23.7bn in 2016, a 10% rise in volume but a 16% drop in value from US$28.1bn (202 deals) in 2015. In 2017, volumes have remained relatively steady while values have shot up, with the first quarter registering as much as 45% of 2016’s annual total.

    Join Kroll's Managing Director and Head of Southeast Asia Richard Dailly as he shares insights on the ways to spot and mitigate risks before entering into cross-border M&A transactions in the ASEAN.
  • Como estruturar investigações internas antifraude
    Como estruturar investigações internas antifraude Kroll's Fernanda Barroso, Fernando Carbone, and Ian Cook Recorded: Aug 17 2017 59 mins
    Os dados do último Relatório Global de Fraude & Risco da Kroll demonstram que as empresas brasileiras ainda apresentam deficiências na detecção de fraudes, o que contribui para que boa parte delas passe despercebida.
    Junte-se aos especialistas da Kroll para uma discussão sobre as maneiras mais eficientes de estruturar uma investigação interna, com exemplos reais do trabalho desenvolvido pela principal consultoria global de gestão de riscos corporativos e investigações.
  • Defining a risk-based, scalable, & sustainable approach to 3rd party monitoring
    Defining a risk-based, scalable, & sustainable approach to 3rd party monitoring Robert Huff, Managing Director, North America Recorded: Jun 15 2017 60 mins
    Regulators have been unequivocal in their expectation that companies know who they are doing business with. While pre-onboarding due diligence on third parties has become the cornerstone of most compliance programs, many companies are still feeling their way toward integrating effective post-onboarding monitoring strategies. Join Kroll's experts for an interactive discussion of steps you can take and resources you can leverage to define and execute a sustainable approach to third party monitoring.
  • Strategies for Staying Ahead of Bribery and Corruption Challenges
    Strategies for Staying Ahead of Bribery and Corruption Challenges Kevin Braine and John Arvanitis from Kroll, and Erica Salmon Byrne from Ethisphere Recorded: Apr 19 2017 74 mins
    In this interactive webinar, you will have the opportunity to learn about proven strategies and best practices for solving compliance challenges from our world-leading experts in FCPA, UK Bribery Act, and the growing number of international compliance laws.

    Join in the conversation with Kevin Braine, Joe Spinelli and John Arvanitis from Kroll, and Erica Salmon Byrne from Ethisphere, as they share their insights on the practical implications of the most significant findings in the ABC Report, including the growing concern over third party and reputation risk.

    All participants will receive a digital copy of the ABC Report with statistics helpful for benchmarking their compliance programs.
  • Operate with Confidence: Responding to the Changing Risk Environment in LATAM
    Operate with Confidence: Responding to the Changing Risk Environment in LATAM Brian Weihs and Ian Cook with Kroll Investigations and Disputes and John Fanning with Kroll Compliance Recorded: Dec 13 2016 62 mins
    Whether operating in the region or conducting business through third parties, the shifting risk and regulatory landscape in Latin America poses many challenges. With local nuances, a one-size-fits-all approach to compliance and due diligence might do little more than provide a false sense of security.

    Join Kroll's experts as they discuss the changing risk environment in Latin America and the potential implications on your risk mitigation and due diligence programs in the region.


    - Corruption risks and trends in Latin America

    - Understanding local nuances: What you need to know when conducting business with third parties in the region

    - Best practices for risk mitigation and due diligence

    - Q&A
  • Next Generation Data Breach Response: Preparing Your C-Suite and Board
    Next Generation Data Breach Response: Preparing Your C-Suite and Board King & Spalding, Rite Aid, and Kroll Recorded: Dec 8 2016 58 mins
    In today’s complex and ever-changing security landscape, every C-Suite and Board knows of cyber risk, but what does it really mean to be prepared to respond to a data breach incident? Top executives do not have to become cyber security experts, but they must make sure their organization’s breach response plans and strategies are defined and set. While they will not directly lead technical, legal and notification efforts to address data breaches, they do need to act as internal champions of proper planning and prevention.

    Identifying and closing security gaps, directing communication channels, and developing and regularly testing incident response plans are as important now as managing any other business risk or concern. Therefore, company leadership must take charge and direct their organizations to conduct extensive preparation efforts to mitigate those risks and make certain everyone stands ready to execute against the established procedures and policies when a breach occurs.
    In this webinar, you will hear from experts who have been on the inside and outside of data breach response efforts. You will learn:

    •Why the C-Suite and Board need to champion planning and prevention efforts.
    •How to get Executive buy-in.
    •Ways to build stronger response structures from the top.
    •How to construct response architectures. Who needs to be responsible for what?
    •Cyber Risk – What are the latest threats and what does the C-Suite and Board need to understand?
    •Developing and directing an Incident Response Plan: Where do the C-Suite and Board fit in?
    •Examples our experts have seen – the good and the bad

Embed in website or blog