Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Learning from Fraud Detection: Segmenting AML to Fight Financial Crime
    Learning from Fraud Detection: Segmenting AML to Fight Financial Crime
    Brendan Brothers Recorded: Jan 17 2020 60 mins
    Why do we think about AML as a single idea, when fraud is segmented specifically by customer, channel or loss type? In this insightful session, Jim Richards and Brendan Brothers discuss the limitations of the current one-size-fits-all approach to compliance and anti-money laundering. Learn why segmentation is effective at fighting fraud, and how these lessons can be applied to transform the AML industry.

    Learning Objectives
    - Review of the limitations of current AML approaches and technologies to -effectively fight financial crime
    - Understand how segmentation improves fraud detection and how these lessons can be applied to strengthen anti-money laundering efforts
    - Learn how innovative technologies and customer segmentation will transform the AML industry
  • SkyStem: Perfecting the Close Checklist
    SkyStem: Perfecting the Close Checklist
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 16 2020 55 mins
    [Live Recording] It's time to spruce up the close checklist! Join us in this webinar where we will revisit best practices as well as practical tips to help improve the financial close process. Whether you have a close checklist, a close calendar, or even if you are still forming a close process, these practices will surely help your period-end close.

    Please note: CPE credit not available for this playback
  • Best practices when selecting a Colocation Provider
    Best practices when selecting a Colocation Provider
    Nlyte Recorded: Jan 15 2020 58 mins
    In this fast-moving market, what should businesses think about when selecting a provider? The shift to hybrid models of operation is here to stay.

    Enzo Greco, Chief Strategy Officer at Nlyte Software, Adam Levine Chief Commercial Officer at Data4 and George Rockett, CEO at DCD uncover key considerations for successful Colocation Provider and Tenant relationships:

    - Driving real-time visibility on resource-usage and performance to make data-based decisions
    - Reduce risk of downtime
    - Optimize consumption and reduce operational costs
    - Automating tasks and understanding facility performance
    - Great content for colocation providers and data center managers that use colocations
  • Build or Buy a Customer Identity Platform?
    Build or Buy a Customer Identity Platform?
    Andre Priebe, CTO, iC Consult Group & Mathias Conradt, Enterprise Solutions Engineer, Auth0 Recorded: Jan 15 2020 62 mins
    In this webinar, Andre Priebe, CTO of iC Consult Group, will give you an overview of the options available on the market when it comes to implementing a customer identity platform, along with their advantages and disadvantages.
    Mathias Conradt, Enterprise Solutions Engineer at Auth0, will then discuss the journey from building multiple individual login forms for each app, to buying an identity platform to support all your needs, complemented by an Auth0 live demo.

    In this joint webinar you will learn about:

    Why Identity Management is a key factor in business
    The pros & cons of building vs. buying a customer identity platform
    The total cost of ownership of both possible solutions
    Examples of what a customer identity platform should be able to support
    What the Auth0 Solution looks like and how it supports these requirements

    Webinars / Webcasts
    With your registration you agree that we submit your data to the Sponsor of this webinar to enable them to contact you and to do follow-up marketing. The legal basis for processing your personal data this way is our legitimate interest according to Art. 6 (1) (f) GDPR, which would be the participation of our sponsors, which contribute large portions of the costs of the Webinars / Webcasts.
  • Best practices when selecting a Colocation Provider
    Best practices when selecting a Colocation Provider
    Nlyte Recorded: Jan 15 2020 58 mins
    In this fast-moving market, what should businesses think about when selecting a provider? The shift to hybrid models of operation is here to stay.

    Enzo Greco, Chief Strategy Officer at Nlyte Software, Adam Levine Chief Commercial Officer at Data4 and George Rockett, CEO at DCD uncover key considerations for successful Colocation Provider and Tenant relationships:

    - Driving real-time visibility on resource-usage and performance to make data-based decisions
    - Reduce risk of downtime
    - Optimize consumption and reduce operational costs
    - Automating tasks and understanding facility performance
    - Great content for colocation providers and data center managers that use colocations
  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 14 2020 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • Kunden-Identitätsplattform selbst entwickeln oder kaufen?
    Kunden-Identitätsplattform selbst entwickeln oder kaufen?
    Andre Priebe, CTO, iC Consult Group & Mathias Conradt, Enterprise Solutions Engineer, Auth0 Recorded: Jan 14 2020 62 mins
    In diesem Webinar gibt Ihnen Andre Priebe einen Überblick über die Möglichkeiten, die es bei der Implementierung einer Customer Identity Plattform derzeit auf dem Markt gibt und welche Vor- und Nachteile diese mit sich bringen. Mathias Conradt wird dann den Weg vom Aufbau mehrerer individueller Anmeldeformulare für jede App bis zum Kauf einer Identity Platform für all Ihre Bedürfnisse anhand einer Auth0-Live-Demo erläutern.

    In diesem Webinar erfahren Sie mehr über:
    - Die Relevanz von Identitätsmanagement im Unternehmen
    - Die Vor- und Nachteile von selbst entwickeln vs. dem Kauf einer Customer Identity Plattform
    - Die Total Cost of Ownership der beiden möglichen Lösungen
    - Beispiele dafür, was eine Customer Identity Plattform unterstützen sollte
    - Die Auth0-Lösung und wie sie diese Anforderungen unterstützt.

    Webinare / Webcasts
    Mit Ihrer Registrierung erklären Sie sich damit einverstanden, dass wir Ihre Daten an den Sponsor dieses Webinars weitergeben, damit dieser Sie kontaktieren und Follow-up-Marketing betreiben kann. Die Rechtsgrundlage für die Verarbeitung Ihrer personenbezogenen Daten auf diese Weise ist unser berechtigtes Interesse gemäß Art. 6 (1) (f) DSGVO, das wäre die Teilnahme unserer Sponsoren, die einen großen Teil der Kosten für die Webinare / Webcasts übernehmen.
  • How Do You Find Your High-Risk Customers?
    How Do You Find Your High-Risk Customers?
    Corey Lynch, Verafin Recorded: Jan 10 2020 59 mins
    Presented by Verafin

    Financial institutions invest significant time and resources into identifying customers in high-risk categories, such as Private ATM Owners, Money Service Businesses (MSBs), Marijuana-Related Businesses (MRBs), Non-Governmental Organizations or Charities (NGOs), Cash Intensive Businesses (CIBs), and more.
     
    Unfortunately, for most compliance professionals these processes are primarily manual today. Continuously updating and reviewing reports and spreadsheets can hinder your ability to meet examiners expectations, fulfill compliance requirements, and follow your institution’s policies for uncovering high-risk customers.  
     
    Join us to learn how to alleviate manual processes for identifying higher-risk customers, automate due diligence processes, and strengthen your overall compliance program.

    Highlights of this webinar:
    - Review of CDD/EDD requirements and expectations for higher-risk categories of customers as outlined in the FFIEC BSA/AML Examination Manual.
    - Discussion on the challenges and potential risks of conventional processes for manually identifying and managing high-risk customers.
    - Overview of new technology approaches with targeted monitoring for risk factors, alerting you to unidentified higher-risk categories, including:
    > Private ATM Owners
    > Money Service Businesses (MSBs)
    > Marijuana-Related Businesses (MRBs)
    > Non-Governmental Organizations (NGOs) or Charities
    > Cash Intensive Businesses (CIBs)
  • SkyStem: Back to Basics with Reconciliations
    SkyStem: Back to Basics with Reconciliations
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 9 2020 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • Eliminate errors and waste in AP spend with AI
    Eliminate errors and waste in AP spend with AI
    Pippa Spencer Recorded: Jan 8 2020 28 mins
    Even if you have a tight accounts payable process with a best-in-class invoice automation system, it’s impossible to catch all of the errors, waste, and fraud in your business spend.

    Join Pippa Spencer, Lead Implementation Success Manager at AppZen, as she explains how AI-powered AP audit helps you to
    - Reduce spend
    - Streamline process
    - Stay compliant
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 7 2020 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • Artificial Intelligence and Machine Learning to Fight Financial Crime
    Artificial Intelligence and Machine Learning to Fight Financial Crime
    Brendan Brothers, Verafin Recorded: Dec 27 2019 54 mins
    Panel Discussion

    An engaging panel of industry leaders will provide their insights into the role of new technologies to fight financial crime. The experts will highlight the need to separate reality from the hype by discussing the benefits of artificial intelligence and machine learning through the lens of real-life cases.

    Learning objectives of this CAMS-accredited webinar:

    - Understand the challenges and limitations of conventional technology in an increasingly complex financial crime landscape.
    - Review of real-life cases where technology played a critical role to enhance detection, strengthen investigations, and improve reporting to law enforcement.
    - Gain insights from industry leaders on the future of crime-fighting technology including artificial intelligence and machine learning.

    Join us for this engaging panel with industry experts, as they highlight the need to separate reality from the hype by discussing the benefits of artificial intelligence and machine learning through the lens of real-life cases.
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Dec 26 2019 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • Crime Rings: The Intersection of Fraud and Money Laundering
    Crime Rings: The Intersection of Fraud and Money Laundering
    Verafin Recorded: Dec 20 2019 55 mins
    Presented by Verafin

    Banks and credit unions are facing significant challenges to prevent financial crimes, such as money laundering and terrorist financing, as criminals become more sophisticated in their efforts to evade detection.
     
    From criminal groups amassing millions in illicit profits by orchestrating online fraud schemes, to Human Trafficking, Human Smuggling, and Drug trafficking organizations using mule networks to facilitate the movement of criminal proceeds across borders — crime rings operating across multiple institutions are a real and growing threat.
     
    Join us for this educational webinar, as we provide insights into the trends and typologies of crime ring activity. We will discuss the intersection of fraud and money laundering activity in the context of organized criminal networks and provide real-life examples
     
    In this educational webinar, you will learn:
    - The role of fraud schemes in funding criminal organizations
    - Tactics used by criminal groups to move illicit funds through the US financial system
    - Walk through of real-life examples of crime rings that span multiple institutions
    - How technology and collaboration can overcome the challenges of a single institution’s limited view of activity.
  • Getting Automation Right with Professional Services
    Getting Automation Right with Professional Services
    Dor Haim, Professional Services Manager, Kryon Recorded: Dec 20 2019 22 mins
    The Robotic Process Automation (RPA) journey is all about technology taking the strain when it comes to repetitive tasks, allowing employees to focus on more profitable activities instead. Although we at Kryon take great pride in how easy it is for anyone to use our RPA solutions, we recognize that sometimes a little help might be needed to really get the maximum benefit from automation.

    This is exactly where Professional Services comes in.

    Join us for top tips on:
    ● Why you should consider using Professional Services
    ● The key areas where expert help can make a massive difference
    ● How to achieve trouble-free, tailored deployments for your company’s unique challenges
  • Scaling Your Automation Project the Right Way
    Scaling Your Automation Project the Right Way
    Salo Ben-Avi, Chief of RPA & Strategic Projects, Kryon Recorded: Dec 20 2019 19 mins
    Starting your Robotic Process Automation (RPA) journey is a big – but exciting – step. But once your RPA project is underway, how can you scale it up by finding even more processes that are ripe for automation? And just as importantly, how can you make sure that your project is optimized for the best possible results? Kryon’s unique Process Discovery™ tool answers both of these questions.

    Join us for pro tips and on:
    ● The #1 reason that most companies struggle to scale their automation projects
    ● How Process Discovery™ can save you precious time and money right from the start
    ● What you need to do to ensure that your RPA project keeps delivering the goods
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Dec 19 2019 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • Overworked? Your Digital Twin Is Coming to the Rescue!
    Overworked? Your Digital Twin Is Coming to the Rescue!
    Salo Ben-Avi, Chief RPA & Strategic Projects, Kryon Recorded: Dec 19 2019 21 mins
    There’s no denying that exciting changes are on the horizon when it comes to the workplace of the future – and they’ll be felt particularly keenly by employees engaged in boring and repetitive work. In such cases, attended automation offers the promise of a personal assistant to simplify and speed up complex manual processes.

    Join us to get the inside track on:
    ● Why digital twins for every worker will change the game for good
    ● How attended automation is the secret to boosting staff productivity
    ● What you need to know to make your automation journey a success from start to finish
  • How Continuous Security Testing Better Supports Rapid Software Development
    How Continuous Security Testing Better Supports Rapid Software Development
    Mohamed Abotaleb, Cyber Defence Center & IR Manager, Telefonica and Ron Peeters, Managing Director EMEA, Synack Recorded: Dec 19 2019 49 mins
    How Continuous Security Testing Better Supports Rapid Software Development and Increasingly Agile Systems

    Penetration testing is the traditional method used for uncovering exploitable vulnerabilities but falls progressively short in protecting the business due to its inability to emulate adversarial hacker behavior and today’s sophisticated cyber-attacks. Furthermore, periodic pen tests typically need to be scheduled at least several months in advance and thereby do not align with the short term urgency and nature of the continuous deployment required by DevOps SDLC. Hence, applications and updates go live without being thoroughly tested, resulting in the risk that at any moment in time serious vulnerabilities may be introduced into live systems and are not detected in a timely manner.

    Join speakers Mohamed Abotaleb and Ron Peeters and learn about:

    - The security issues and challenges of a rapid software development and deployment environment with agile systems

    - A new continuous security testing model that better supports DevOps SDLC and Cloud environment

    - How this testing model combines automation technology with continuous or on-demand manual security testing

    - A recent case study from Telefonica that demonstrates the benefits and capabilities of such continuous testing security model
  • Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Enzo Greco, Chief Strategy Officer, Nlyte, Kollengode Anand, Segment Leader - DC Solutions, United Technologies Recorded: Dec 19 2019 43 mins
    In this webinar, Infrastructure experts at UTC and Nlyte Software discuss how you can:

    - Leverage sophisticated data center ecosystems, such as precision cooling
    - Provide insight into your ITSM solution
    - Improve resilience and reduce risk to your critical infrastructure
    - Create tighter integration between facilities and IT
  • Center of Excellence – Your Key to Automation Success
    Center of Excellence – Your Key to Automation Success
    Ohad Barnoy, VP Customer Success, Kryon Recorded: Dec 19 2019 17 mins
    A Center of Excellence (CoE) can make all the difference between a great automation project and an outstanding one. An effective CoE determines and supervises strategy around governance, management, security, developers’ roles, templates and working with different business units.

    As such, we at Kryon highly recommend that any business embarking on an automation project should establish one as a matter of course.
    Join us for expert advice on:

    ● What you need to consider before you start building your CoE
    ● How to build a CoE that matches your automation goals
    ● Developing a roadmap for achieving RPA success
  • Six ”little frauds” that could get you in trouble  with the SEC
    Six ”little frauds” that could get you in trouble with the SEC
    Andy Chiang Recorded: Dec 18 2019 19 mins
    According to the Association of Certified Fraud Examiners’ 2018 Report to the Nations, expense reimbursement fraud accounts for 21 percent of fraud in small businesses (those with less than 100 employees), and 11 percent in large businesses (those with 100 or more employees).

    Join Andy Chiang, Head of Product at AppZen, as he discusses why expense reimbursement fraud indicates a much larger problem. If someone is willing to perpetrate one scheme, they are often willing to perpetrate others.
  • The Freelance Trustfall:Guidelines for Effectively Working w/Finance Freelancers
    The Freelance Trustfall:Guidelines for Effectively Working w/Finance Freelancers
    Meghan Zasada, Account Manager at Paro Recorded: Dec 18 2019 23 mins
    Businesses think of freelancers as a quick way to alleviate issues and tasks that their team doesn’t have the bandwidth for. More often than not, when working with a financial freelancer, decision-makers can often encounter feelings of hesitancy, fear, and distrust creeping in before the work even gets started. This webinar identifies the areas that are often the hardest for businesses to navigate when working with financial freelancers to ensure you are making the most of your newly contracted relationship.

    • Clarity in communication is the key when it comes to building trust with a third-party.
    • Giving access to sensitive materials and platforms can be scary, but it doesn’t have to be.
    • Fractional work doesn’t mean inconsistent work.
  • Understanding Crowdsourced Security Models for Government
    Understanding Crowdsourced Security Models for Government
    Paul Mote, Chief Solutions Architect Recorded: Dec 18 2019 34 mins
    Join Synack on a journey as we provide an overview of different crowdsourced security testing models such as Crowdsourced Penetration Testing, Bug Bounty, and Vulnerability Disclosure Policies. We will cover insights discussed in our recently published white paper, Crowdsourced Security White Paper: Adoption and Market Trends in the U.S. Government, and highlight the key differentiators in crowdsourced security models including vetting, technology, practical applications, and pricing. Come away with an understanding of what model(s) are right for your agency!
  • Day in the Life of an Ethical Hacker: A Discussion w/ Callum Carney, SRT Member
    Day in the Life of an Ethical Hacker: A Discussion w/ Callum Carney, SRT Member
    Callum Carney, Synack Red Team Member, Justin Shaw-Gray, Sales Director, Synack Recorded: Dec 17 2019 43 mins
    The Synack Red Team (SRT) gives the most talented security researchers across the globe a platform to do what they love and get paid for it. A private network of highly-curated and vetted security researchers, the SRT is challenged every day to deliver exploitation discovery and management for some of the biggest brands in the world. On the Synack platform, researchers have access to the industry’s first ever hacker toolkit built at enterprise scale, to make them more efficient and effective at uncovering critical vulnerabilities that matter.

    These ethical hackers are increasingly being recognised as an important way for businesses to unearth security weaknesses before they can be exploited by online criminals.

    In this Webinar, Synack Red Team member, Callum Carney joins Synack’s Justin Shaw Gray for an open conversation on what a day in the life of an ethical hacker is all about. He’ll discuss:

    - How he started his ethical hacker journey
    - Why he chose Synack
    - How it’s changed in the 2 years he’s been working with us
    - What information is critical to successful testing
    - Why you should be using ethical hackers
    - Processes used when a new target comes online.
    - And much much more


    Callum started his ethical hacking journey by supporting organisations such as Google, Spotify and Local UK Businesses to secure their systems. In January 2017, after noticing all of the great comments regarding the Synack platform (fast payouts, fast response times, etc), he applied for the Synack Red Team and was accepted. During his time with Synack he has worked to secure a multitude of systems including government and Fortune 500 enterprise systems. In addition to his work with Synack Callum is studying for an Undergraduate Masters Degree in Computer Science and working as a Software Tester/Developer for the UKs largest supplier of Functional Skills and GCSE assessments.
  • Digitale Identität und Connected Cars - Die Power von IAM richtig eingesetzt
    Digitale Identität und Connected Cars - Die Power von IAM richtig eingesetzt
    Dr. Heiko Klarl, CMO, iC Consult Group and Gerhard Zehethofer, Vice President IOT, ForgeRock Jan 21 2020 3:00 pm UTC 39 mins
    Fahrzeuge werden zunehmend intelligenter und vernetzter. Um das Kundenerlebnis bestmöglich zu personalisieren und zu sichern, baut ihre Technologie auf digitale Identität. Für den Fuhrpark-Manager, den Versicherer, den Verbraucher und alle anderen Akteure im Connected Car Ökosystem ist es wichtig zu wissen, "wer" auf "was" zugreifen kann.

    In dem gemeinsamen Webinar von iC Consult und ForgeRock erfahren Sie, wie Sie:
    - Ihre Connected Identity-Strategie aufbauen können.
    - Synergien mit anderen Geschäftsbereichen schaffen können.
    - Beim Rollout von vernetzten Diensten als auch bei der Erforschung neuer Geschäftsmodelle die Geschwindigkeit erhöhen und die Time-to-Market verkürzen können.

    Webinare / Webcasts
    Mit Ihrer Registrierung erklären Sie sich damit einverstanden, dass wir Ihre Daten an den Sponsor dieses Webinars weitergeben, damit dieser Sie kontaktieren und Follow-up-Marketing betreiben kann. Die Rechtsgrundlage für die Verarbeitung Ihrer personenbezogenen Daten auf diese Weise ist unser berechtigtes Interesse gemäß Art. 6 (1) (f) DSGVO, das wäre die Teilnahme unserer Sponsoren, die einen großen Teil der Kosten für die Webinare / Webcasts übernehmen.
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Jan 21 2020 8:00 pm UTC 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • Identity Verification for CCPA Compliance: Trial & Error
    Identity Verification for CCPA Compliance: Trial & Error
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident Jan 21 2020 9:00 pm UTC 45 mins
    The California Consumer Privacy Act (CCPA), which went into effect on January 1, 2020, gives consumers the right to access, delete, or opt out their personal data. Under CCPA, companies are not only obligated to furnish, delete, or opt consumers out of the sale of their data, they’re also required to verify every requestor’s identity to avoid inadvertently sharing sensitive data with fraudsters.

    After a giant GDPR loophole was exposed, it quickly became understood how easily cybercriminals were fraudulently submitting data subject requests in order to gain access to personal data that isn’t theirs. While this is certainly one reason to incorporate adequate identity verification into the consumer rights request workflow, cybercriminals aren’t the only threats that businesses need to worry about.

    Opportunistic data protection and privacy lawyers will be proactively scrutinizing processes to see if companies will make mistakes and accidentally furnish data to the wrong person so they can sue on behalf of their consumers. Additionally, CCPA consumer rights requests will likely shine a light on companies’ data protection practices, as the 2019 Carlton Fields Class Action Survey indicated that the next wave of class action suits will result from data breaches.

    In this webinar, we’ll discuss potential DSR threats from three different groups: cybercriminals, privacy lawyers, and data subjects, and how to avoid attacks with proper identity verification that offers an appropriate level of assurance that’s compatible with business’ specific needs.

    Key Takeaways:
    The importance of getting an automated DSR fulfillment workflow in place to handle a high volume of requests securely, consistently, and compliantly
    The role identity verification plays in avoiding DSR denial of service attacks
    Discuss how to implement “reasonable” verification that is frictionless for consumers and lawyers, but that keeps the bad guys out
  • Digital Identity and Connected Cars - Leveraging the Power of IAM
    Digital Identity and Connected Cars - Leveraging the Power of IAM
    Dr. Heiko Klarl, CMO, iC Consult Group and Gerhard Zehethofer, Vice President IOT, ForgeRock Jan 22 2020 3:00 pm UTC 40 mins
    As vehicles become smarter and more connected, their technology relies on digital identity to personalise and secure the customer experience. For the fleet manager, insurance provider, consumer, and anyone else in the modern connected vehicle environment, knowing “who” can access “what” is essential.

    In this joint webinar with iC Consult and ForgeRock you learn how to build up your connected identity strategy. Not only will you create synergies with other business areas, you also gain speed and a shorter time to market when rolling out connected services and explore new business models.

    Webinars / Webcasts
    With your registration you agree that we submit your data to the Sponsor of this webinar to enable them to contact you and to do follow-up marketing. The legal basis for processing your personal data this way is our legitimate interest according to Art. 6 (1) (f) GDPR, which would be the participation of our sponsors, which contribute large portions of the costs of the Webinars / Webcasts.
  • 4 limitations of the three-way match you need to consider
    4 limitations of the three-way match you need to consider
    Ryan Birdsall Jan 22 2020 7:00 pm UTC 60 mins
    The three-way match, which cross-references invoices, purchase orders, and receiving documents before issuing payments, has been considered the industry-standard procedure in accounts payable departments for years—until now.

    As businesses become more sophisticated, there are far more data points to confirm the validity of an invoice. Does it include all early payment discounts? Are the payment terms (net 30, net 60) enforced?

    Unfortunately, many accounts payable departments don’t have the time or resources to manually check these items and are unknowingly being overcharged for services that they didn’t receive, or products that aren’t for the negotiated rates or terms.

    Join Ryan Birdsall, Customer Success Manager, AppZen, as he discusses why Star Match brings far greater precision to the spend approval process than you’ve had in the past.
  • The 2019 Open Source Year in Review
    The 2019 Open Source Year in Review
    Mark Radcliffe, Partner at DLA Piper & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, Synopsys Jan 23 2020 5:00 pm UTC 60 mins
    Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, partner at DLA Piper and general counsel for the Open Source Initiative, and Tony Decicco, shareholder at GTC Law Group & Affiliates.

    This annual review will highlight the most significant legal developments related to open source software in 2019, including:

    •Evolution of open source: control, sustainability, and politics
    •Litigation update: Cambium and Artifex cases
    •Patents and the open source community
    •Impacts of government sanctions
    •The shift left for compliance and rise of bug bounty programs
    •And much, much more

    Live attendees will earn CLE credit for this webinar. Don’t miss out—register today.
  • Podcast: Musings with Marc & Mary
    Podcast: Musings with Marc & Mary
    Mary Mack & Marc Zamsky Jan 23 2020 7:00 pm UTC 17 mins
    Marc Zamsky, COO at Compliance Discovery Solutions and Mary Mack, CEO and Chief Legal Technologist at EDRM muse about Legalweek upcoming, what to do and see, BIG news Compliance is sharing and industry trends.
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem Jan 23 2020 8:00 pm UTC 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • Fraud Scams: Red Flags & Best Practices to Prevent Loss
    Fraud Scams: Red Flags & Best Practices to Prevent Loss
    Josh McCarthy, Verafin Jan 24 2020 5:30 pm UTC 59 mins
    Presented by Verafin

    From mass marketing fraud, to romance and work-from-home scams, and Business Email Compromise, savvy fraudsters are targeting your customers with a variety of illicit tactics — and inflicting millions of dollars in losses.

    Join Josh McCarthy as he discusses the potential reputational and financial risks to your institution and outlines best practices to protect your customers from the devastating emotional and financial effects of fraud scams.

    Highlights of this educational webinar include:

    - Evolution of fraud schemes & scams perpetrated through digital channels.
    - Red flags for common scams scenarios targeting customers.
    - Best practices for loss prevention, early detection, and investigation strategies.
    - Role of technology in fraud mitigation, including cloud data and multi-channel analysis.
  • Why Your Source-to-Pay-Process Loses Money
    Why Your Source-to-Pay-Process Loses Money
    Josh Morrison, Solutions Specialist, Business Development, PRGX Jan 28 2020 6:30 pm UTC 56 mins
    Many challenges exist throughout the Source-to-Pay (S2P) cycle. Companies are constantly challenged to find new efficiencies, identify leakage points to capture savings, and strategize around new profit-driving and growth opportunities.

    In this webinar, you will hear about the real keys to successfully managing your S2P processes, and the strategies and techniques that can be used by any organization to increase efficiency and effectiveness.

    In this webinar, our Global Director of Solution Consulting, Josh Morrison and Former CPO of UPS, Gary Kallenbach speak on how the best companies in the world optimize their S2P process.
  • SkyStem: Back to Basics with Reconciliations
    SkyStem: Back to Basics with Reconciliations
    Nancy Wu, Sales and Customer Support, SkyStem Jan 28 2020 8:00 pm UTC 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • Important eDiscovery Case Law Decisions of 2019 and Their Impact on 2020
    Important eDiscovery Case Law Decisions of 2019 and Their Impact on 2020
    Doug Austin and Tom O'Connor Jan 29 2020 6:00 pm UTC 75 mins
    2019 was another notable year for eDiscovery case law with several significant rulings that stand to impact eDiscovery practices, the admissibility of evidence and the potential of sanctions for discovery violations. How can these key case law decisions affect discovery within your organization? This CLE-approved* webcast session will cover key 2019 case law decisions covered by the eDiscovery Daily blog and what the legal profession can learn from those rulings. Topics include:

    + Biometric Fingerprint Scanning and Privacy
    + Non-party ESI Requests in Litigation
    + Social Media Trends and Judge "Friending"
    + Password Provision and Fifth Amendment Protection
    + Staying Discovery while a Motion to Dismiss is Considered
    + Case Law Trends in Ephemeral Messaging App Discovery
    + Case Law Trends in Mobile Device Discovery
    + Sanctions Trends under Rule 37(e)
    + Sanctions and Case Strategy
    + Inadvertent Disclosures and Sanctions

    Presentation Leaders:
    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience in legal technology and is the editor of the CloudNine sponsored eDiscovery Daily blog, a trusted resource for eDiscovery news and analysis.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • SkyStem: Perfecting the Close Checklist
    SkyStem: Perfecting the Close Checklist
    Nancy Wu, Sales and Customer Support, SkyStem Jan 29 2020 7:00 pm UTC 55 mins
    [Live Recording] It's time to spruce up the close checklist! Join us in this webinar where we will revisit best practices as well as practical tips to help improve the financial close process. Whether you have a close checklist, a close calendar, or even if you are still forming a close process, these practices will surely help your period-end close.

    Please note: CPE credit not available for this playback
  • How to Communicate Risk & Security Program Value to Executives
    How to Communicate Risk & Security Program Value to Executives
    Sam Abadir, CISM, Lockpath Jan 30 2020 5:00 pm UTC 60 mins
    Many departments struggle with building a business case to create an effective, ethics-based risk management program. Plenty of executives today still think of risk management as a defensive, overhead activity or activities that are performed to satisfy legislative or regulatory requirements and deserve minimal attention.

    In this webinar, Lockpath’s Sam Abadir will help attendees understand the different value propositions business executives need to know to understand and support risk management projects across the organization.

    Attendees will learn how to:
    •Articulate their current and future risk management goals
    •Understand their risk management value proposition
    •Define business case benefits and communicate value to business executives
    •Define tools and resources needed to achieve goals
    •Understand an approach for their GRC or IRM program
  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Jan 30 2020 8:00 pm UTC 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • Elder Financial Abuse
    Elder Financial Abuse
    John Hawkin, Verafin Jan 31 2020 5:30 pm UTC 42 mins
    Presented by Verafin


    Elder Financial Abuse is a significant and growing problem issue that has devastating effects on individuals and families. Believed to be largely underreported — financial institutions are facing increased responsibility to help combat the exploitation of vulnerable customers.

    Early detection of red flags and timely reporting to law enforcement are critical to protecting elderly customers from financial loss. This was emphasized in the 2011 Advisory from FinCEN, as well as the 2018 Joint Memorandum encouraging coordination among law enforcement, and adult protective service agencies (APS) to protect issued by CFPB, the Department of the Treasury, and FinCEN.

    Join us for this webinar, as we discuss the scale of Elder Financial Exploitation and outline key considerations from industry publications and guidance, including red flag indicators and best practices for reporting.
     
    In this webinar, you will learn:
    - The scale of Elder Financial Exploitation and the challenges of preventing fraud targeting senior customers.
    - Potential Red Flag Indicators of Elder Financial Exploitation from the FinCEN Advisory
    - Best practices for reporting Elder Financial Exploitation, including Suspicious Activity Reporting, and contacting appropriate local and state-level agencies.
  • Live demo: Audit every dollar of AP spend with AI
    Live demo: Audit every dollar of AP spend with AI
    Angie Rodriguez Feb 5 2020 7:00 pm UTC 60 mins
    Angie Rodriguez, Solution Consultant, AppZen, gives a high-level overview of how AppZen audits every dollar of AP spend and showcases the capabilities and key features of the AP Audit Platform.

    Attend this webinar to learn how to
    -Prevent duplicate charges
    -Enforce payment terms
    -Identify missing discounts
  • Leveraging Big Data and Collaborative Investigations for Fraud Prevention
    Leveraging Big Data and Collaborative Investigations for Fraud Prevention
    Brendan Brothers, Verafin Feb 7 2020 5:30 pm UTC 56 mins
    (ACAMS Webinar Rebroadcast)

    In this insightful session, Brendan Brothers, Co-Founder of Verafin and Anti-Financial Crime Specialist, will discuss the evolution of financial crime and how financial institutions can embrace innovative approaches to proactively prevent fraud and combat crime ring activity.

    Brendan will outline how financial institutions can leverage big data, machine learning technology and 314(b) information sharing for effective fraud prevention, including proactive trend identification, reduction in false positive results, and collaborative investigations of multi-institutional crime ring activity.

    Learning Objectives
    - Understand the limitations and challenges of conventional fraud prevention approaches
    - Leveraging big data, machine learning technology, and 314(b) information sharing to mitigate losses and prevent fraud
    - Enhancing detection, strengthening investigations, and improving reporting to law enforcement
  • MISAC Ransomware Prevention
    MISAC Ransomware Prevention
    Donald E Hester Feb 12 2020 6:00 pm UTC 120 mins
    MISAC MuniTech Academy presentation. Local governments are at high risk for ransomware attack, and the Federal Government and government associations recommend immediate action. A recent report from the Cybersecurity and Infrastructure Security Agency (CISA) states that the cost for recovery tops $5 billion in 2019 year to date. The department of Homeland Security, CISA, MS-ISAC, NGA & NASCIO recommend immediate action to safeguard against ransomware attacks. In order to help clients effectively combat the current growing cyber-threats, we have created a ransomware readiness checklist from the recent US Federal Government Interagency technical guideline, Cybersecurity and Infrastructure Security Agency (CISA) guidelines, National Cyber Security Centre (NCSC), UK and NIST guidelines. In this session we will cover the items in our checklist and the recommendations on preparation.
  • Turning Good Security into Good HIPAA Compliance
    Turning Good Security into Good HIPAA Compliance
    SureCloud Feb 18 2020 5:00 pm UTC 45 mins
    It may seem odd, but your organization may have a robust, mature information security program but still have terrible compliance. In fact, recent HIPAA audits revealed this happens often within organizations which are focused heavily on information security. This webinar will bridge the gap between good information security and good HIPAA compliance, addressing what the regulators are looking for, and how their expectations differ from typical information security practices.

    The 45-minute webinar will provide practical takeaways regarding:
    1) How to ensure that you are conducting a risk assessment and implementing a risk management plan that will pass muster with regulators.
    2) How you can ensure that you get credit for the good information security work you are doing.
    3) The regulators' expectations for policies and procedures.
    4) Risk assessment scope best practices checklist

    In this webinar, Adam Greene, veteran health attorney and former key regulator at the U.S. Department of Health and Human Services, will walk through what key elements of the risk analysis will help you in the event of an OCR audit.
  • Why All Open Source Scans Aren’t Created Equal
    Why All Open Source Scans Aren’t Created Equal
    Phil Odence & Emmanuel Tournier at Synopsys Feb 20 2020 5:00 pm UTC 58 mins
    Understanding the risks associated with open source software has become the norm in tech due diligence but not all approaches are created equal. Are you approaching open source diligence in the most efficient and effective way possible? Do you understand the difference between a point in time open source analysis for M&A and ongoing open source management?

    Join us for this live webinar and learn how a purpose-built M&A open source audit differs from open source management tools and why it matters in tech due diligence. We’ll cover:

    •The types of risk around open source software
    •Why depth of analysis matters, and what it results in during M&A diligence
    •Why accuracy, reporting and expert human analysis are keys to thorough diligence

    Don’t miss this informative webinar. Register today.
  • Using Big Data to Improve Retail Margins
    Using Big Data to Improve Retail Margins
    Willl Auchincloss, VP Advisory & Analytics, PRGX | Jennifer Cyra, Former SVP Merchandising & Private Brands Office Depot Feb 25 2020 6:30 pm UTC 31 mins
    Continuous channel shifts create competitive pressure for retailers to invest more in pricing and customer strategy, but greater complexity of data in today’s changing world and a lack of tools to tackle these new issues means that both managing margins and buying better are becoming more challenging than ever.

    In the next installment of PRGX’s Retail Webinar Series, learn how PRGX’s Merchandise Margin Improvement (MMI) solution attacks this margin leakage problem by using modern technologies and a big-data approach.

    Listeners will come away with information on how their companies could reduce COGS, increase working capital, and gain insights into the following value-enriching opportunities:

    - Item-Level Quick Wins
    - Compliance Programs
    - Data-led Negotiations
    - Margin Management Enhancements
    - Mergers & Acquisitions
  • Contract Compliance: An Untapped Opportunity
    Contract Compliance: An Untapped Opportunity
    Shveta Agarwal, Contract Compliance Senior Audit Manager, US | Rob Brown, Director Supplier Services, The Coca-Cola Company Mar 12 2020 6:30 pm UTC 38 mins
    Procuring materials and indirect services involves ever-greater complexities in the global supply chain and risks that can impact profits. Organizations devote significant time and effort to negotiating complex supplier contracts, however; once contracts are in place, often customers assume they’re getting the value that they were promised. A disciplined approach to contract compliance testing extracts the greatest business insights and helps recover lost profits.

    In the next installment of PRGX’s Retail Webinar Series, learn how PRGX’s Contract Compliance program applies unmatched data mining technologies and specialized global resources to conduct supplier audits and maximize the return on your hard-fought supplier contracts.

    Listeners will come away with the understanding of how a comprehensive Contract Compliance audit program can:

    - Be considered a best practice in supplier governance among best-in-class organizations
    - Identify and recover negotiated savings in strategic supplier contracts
    - Provide actionable opportunities for business insights and future cost avoidance
  • The Top 5 Ways to Prevent Overpayments
    The Top 5 Ways to Prevent Overpayments
    Lisa Marley, Audit Manager, PRGX Apr 7 2020 5:30 pm UTC 43 mins
    In this webinar, Recovery Audit expert Lisa Marley reveals five common occurrences when it comes to overpayments and solutions to combat them.
  • MISAC MuniTech Academy ICS SCADA Cybersecurity
    MISAC MuniTech Academy ICS SCADA Cybersecurity
    Donald E Hester Apr 21 2020 5:00 pm UTC 120 mins
    Many organizations struggle to protect their Industrial Control Systems (ICS) and SCADA systems. Other organizations struggle with knowing how much cyber risk their organization has. ICSs are often critical systems with low tolerance for interruption, making them very tempting targets for threat-actors especially nation-states. Thus far, incidents have been low but the emergence of proof-of-concept attack software suggests that this trend may not hold for long. Local Governments need to get ready now before they find themselves a victim. Unlike personal computers, which can be reformatted and restored from backup if required, PLCs and other components can be “bricked.” This means that malware could render them completely inoperable and requiring physical replacement. In this session we will cover some of the difficulties with cybersecurity and ICS, including Supply Chain, Vendor Management, Shared Responsibility and going beyond the standards.
    ICS-CERT
    Coverage
    NIST CSF, NIST SP 800-53, COBIT, ISO 27001, ISA 62443, COSO, AWWA G430-14
    IT, OT, IoT, Cloud, AI