Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • What Your Vulnerability Scanner is Not Telling You
    What Your Vulnerability Scanner is Not Telling You Anand Paturi and Barry Cogan Recorded: Dec 14 2017 41 mins
    A recent, significant data breach in 2017 has caused people to take a deeper look into Apache Struts vulnerabilities. This weakness emphasized the impending risks for Apache Struts-based applications. Even today, scanners do not detect all known vulnerabilities. As of November 2017, the leading scanners still missed 14 total unique Common Vulnerabilities and Exposures (CVEs).

    In this webinar, we will analyze Apache Struts-related vulnerability weaponization patterns spanning the last decade. We will also provide insight into exploit patterns through a live exploit demonstration and explain how these patterns can define an organization’s risk management strategy.

    Hear from RiskSense’s Anand Paturi (VP of Research and Development) and Barry Cogan (Senior Security Analyst) as they guide us through the live demonstration and provide insights into exploit patterns
    and how attacks can be avoided.
  • DriveLock: Secure Your Critical Infrastructure!
    DriveLock: Secure Your Critical Infrastructure! Alfred Ortiz (Director, Americas) and Jason Rose (Senior Security Consultant) Recorded: Dec 14 2017 53 mins
    The DriveLock Endpoint Protection Platform is helping you to secure, control, and protect your critical infrastructure from internal and external threats. DriveLock achieves this through a comprehensive, layered security approach that includes application control, device control, and drive encryption. DriveLock combines this with advanced AI and a security awareness system that, as a whole, provides the highest level of security for your critical data and users.

    Takeaways:

    * DriveLock provides a layered approach to system security that is both comprehensive and flexible.
    * Device and Drive Protection prevent malicious applications from being brought into your infrastructure and prevent sensitive data from getting out.
    * Application Control with AI allows more flexible, intelligent control over the applications allowed on your infrastructure without weakening your security posture.
    * Disk Encryption lets you ensure the security of the confidential data after it has left your infrastructure.
    * Web Security prevents known threats from infecting your network.
    * Security Awareness lets you seamlessly train users on information security best practices without interrupting their work.
  • Getting Your Message Across:  Best Practice for Private and Public Companies
    Getting Your Message Across: Best Practice for Private and Public Companies Scott Lesmes and Anna Pinedo, Morrison & Foerster; Jeff Grossman, Solebury Communications Group Recorded: Dec 14 2017 91 mins
    With companies remaining private longer, their stockholder base often becomes more widely dispersed. More and more privately held companies are facing interesting challenges in communicating effectively with various stakeholders, without violating securities laws. Companies contemplating or undertaking an initial public offering face particularly acute issues as they try to establish effective communications approaches. Finally, public companies face Regulation FD and other regulatory requirements that may require that they map out a careful communications approach. During this session, we will address the following:

    Trends and developments in capital markets communications;
    New modes of communication and engagement (e.g., social, digital);
    Non-GAAP financial measures;
    Navigating disclosure risks and requirements, including Regulation FD;
    Assessing materiality and whether there is an obligation to disclose (and when);
    Forward-looking statements, financial guidance and communicating with investment professionals, including analysts and rating agencies;
    Competitive benchmarking and key metrics;
    Optimizing value in an exit strategy, whether it is an IPO or an M&A exit; and
    Best practices in public debt communications (as a private company).
  • 2018 GRC Predictions
    2018 GRC Predictions Tom Garrubba, Santa Fe Group; David Grazer, Tevora; Peter Tessin, Discover Financial Services; Christina Whiting, Tevora Recorded: Dec 14 2017 60 mins
    “It was the best of times, it was the worst of times,” wrote Dickens. 2017 has been a tumultuous year for governance, risk management, and compliance (GRC). 2018 could be just as stormy with cybersecurity, GDPR, and new risks caused by the shift to digital business. In this webinar, our panel of industry experts will recap the year’s highlights and offer their thoughts on what to expect in 2018.

    Discussion topics include:

    • Ramifications of major data breaches in 2017
    • The continuing shift in risk perspective from department to enterprise
    • Navigating third-party risk management on the road ahead
    • The role and influence of the board in 2018
    • GDPR and the trend toward data privacy and security

    Plan now to attend this special webinar on 2017 trends and 2018 predictions for GRC.
  • Eligiendo la estrategia correcta de pagos móviles para su negocio minorista
    Eligiendo la estrategia correcta de pagos móviles para su negocio minorista Xavier Places, Director de Marketing, Openbravo Recorded: Dec 14 2017 48 mins
    La tecnología móvil ha cambiado la forma en que los clientes esperan pagar y las empresas minoristas que no aceptan pagos móviles pueden quedarse atrás a medida que la adopción de estas tecnologías se vuelve más generalizada. En China, por ejemplo, las transacciones en efectivo casi han desaparecido y los pagos móviles aumentaron más del doble hasta los $ 5 mil millones en 2016, un país donde la solución POS de Openbravo ya acepta pagos móviles con AliPay y WeChat. Los minoristas tradicionales tienen mucho que ganar al aceptar pagos móviles porque brindan comodidad a los consumidores, modernizan la experiencia de tienda, y animan a los compradores a gastar más.
    ¿Que aprenderá?
    Explicaremos los factores que explican el auge de los pagos móviles y describiremos algunas de las soluciones de monedero móvil más populares, como Apple Pay, Android Pay, Samsung Pay, junto con tecnologías que se centran en países específicos como Alipay, WeChatPay y Google. Tez. El panorama de los pagos móviles está fragmentado y en constante evolución, por lo que aconsejamos a los minoristas que consideren cuidadosamente las tecnologías disponibles. Hay muchas razones para aceptar pagos móviles, pero para hacerlo probablemente necesite actualizar su solución de punto de venta, por lo que le ayudaremos a valorar ventajas y desventajas, y cómo Openbravo puede ayudarle en su estrategia.
  • Microsoft Teams & Skype for Business - the road ahead for collaboration
    Microsoft Teams & Skype for Business - the road ahead for collaboration David Branscome, Microsoft | David Tupling, IR Recorded: Dec 14 2017 61 mins
    When Microsoft launched Teams in 2016 many wondered what this would mean for Skype for Business. Join us to hear from Microsoft's David Branscome on the road ahead for Intelligent Communications and collaboration.
  • Choosing the Right Mobile Payments Strategy for your Retail Business
    Choosing the Right Mobile Payments Strategy for your Retail Business Xavier Places, Director of Marketing, Openbravo Recorded: Dec 14 2017 40 mins
    Mobile technology has changed the way customers expect to pay and retail businesses that do not accept mobile payments may get left behind as the technology becomes more pervasive. In China, for example, cash transactions have almost disappeared and mobile payments more than doubled to $5 trillion in 2016 -- a country where the Openbravo POS solution already accepts mobile payments with AliPay and WeChat. Brick-and-mortar retailers have much to gain from embracing mobile payments because they provide convenience for consumers, modernize the in-store experience, and can encourage shoppers to spend more.
    What Will You Learn?
    We will explain the drivers behind the boom in mobile payments and describe some of the more popular “Pay” mobile wallet solutions such as Apple Pay, Android Pay, Samsung Pay, along with technologies that focus on specific countries such as Alipay, WeChat and Google Tez. The mobile payments landscape is fragmented and in constant evolution, so we will advise retailers to carefully consider the technologies available. There are plenty of reasons to accept mobile payments, but to do so you will probably need to upgrade your POS systems, so we will help you weigh up the advantages and disadvantages and outline how Openbravo can help you realize your strategy.
  • Osterman Research Report: Assessing the Total Cost of Veritas Enterprise Vault
    Osterman Research Report: Assessing the Total Cost of Veritas Enterprise Vault Michael Osterman, Osterman Research Recorded: Dec 13 2017 57 mins
    Many organizations are evaluating cloud-based archiving solutions by performing comparative cost analyses against legacy on-premises systems. However, constructing a true comparative analysis can be difficult because the software, hardware, storage, and infrastructure costs of on-premises systems are often distributed across multiple IT cost centers or are simply difficult to estimate.

    Join Actiance and Michael Osterman of Osterman Research as we discuss the results of an Osterman survey on the actual costs of maintaining and operating a Veritas Enterprise Vault environment versus a cloud-based archiving solution.

    During this webinar, you will learn about:

    – Real world cost experiences in managing on-premise archives

    – How the survey results have led to the development of a TCO model to help you determine your own cost comparison

    – How the Actiance Platform offers a significantly lower cost of ownership while providing an architecture to support your archiving needs
  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • OCC 2018 Part 1: Cybersecurity and Operational Resiliency
    OCC 2018 Part 1: Cybersecurity and Operational Resiliency Sam Abadir, Director of Product Management, LockPath Recorded: Dec 12 2017 39 mins
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. Coming in at #1: cybersecurity and operational resiliency. Whether you’re a banker or service provider to the financial industry, this should not come as a surprise. In this webinar, you’ll learn how to get out in front of OCC’s #1 priority and the role of cybersecurity in managing operational risk.

    Attendees will learn:

    • OCC’s approach to cybersecurity and operational resiliency for banks of all sizes
    • The cybersecurity framework that examiners will review
    • Managing the rising risk from changes to product, process, and providers
    • The impact of current and proposed cybersecurity regulation
    • How GRC technology supports integrated risk management programs


    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • 10 Must-Answer Questions For Your 2018 Data Center Strategy
    10 Must-Answer Questions For Your 2018 Data Center Strategy Matt Stansberry, Senior Director Content & Publications, Uptime Institute Recorded: Dec 12 2017 60 mins
    Are you adapting your infrastructure strategy to business, geopolitical and technology trends?

    Our panel of experts discuss the questions you must have the answers for along with trends that will impact your organization in the coming year.

    How will you adapt your strategic plan to climate change? What are the implications of new regulatory enforcement? How will your staff adapt to changing infrastructure deployment models? Will new workloads overwhelm your infrastructure plans? Change is here, so learn to adapt.
  • Best Practices for Migrating to Office 365
    Best Practices for Migrating to Office 365 Robert Cruz, Senior Director of Information Governance, Actiance & Justin Frech, Systems Engineer, VerQu Recorded: Dec 12 2017 40 mins
    Prior to 2010, email messaging and archiving technologies were primarily deployed behind the firewall, with accompanying investments in storage, hardware, infrastructure, and IT resources. Since then, employee communications volume and variety have continued to explode –along with the cost and management hassle. Unfortunately, this time period has also witnessed an explosion of users utilizing their own devices, unsanctioned communications channels, and personal storage locations to get their jobs done.

    Now, as messaging systems move to Office 365 many are asking: Is the move to Office 365 also the right time to gain control over other employee communications channels, and if yes, what’s the best way to do it successfully?

    To answer this and other questions, join Actiance and VerQu as we explore:

    •Best practices in moving employee communications to Office 365
    •Steps to consider before beginning the migration process
    •How to assess regulatory compliance and eDiscovery implications when migrating to Office 365

    We will conclude with a discussion of how Actiance can help organizations harness Office365, while gaining control over the latest communication channels to ensure that companies meet regulatory compliance and eDiscovery demands.
  • 2017 eDiscovery Case Law Review: Sanctions, Security and SCOTUS on Spoliation
    2017 eDiscovery Case Law Review: Sanctions, Security and SCOTUS on Spoliation Judge Frank Maas, Attorney Michael Simon and More Recorded: Dec 7 2017 63 mins
    In modern legal practice, the difference between success and failure often boils down to the ability to navigate and make sense of data. To that end, the legal profession in 2017 was largely shaped by major developments in data and legal technology, from the way in which discovery sanctions were adjudicated to news-making data breaches, such as the so-called “Paradise Papers,” where the hacking of a major law firm exposed illicit tax-sheltering practices of many of the firm’s clients. Over the course of a tumultuous year, legal professionals confronted the specter of cybercrime, a shifting of judicial views on how (and how hard) evidentiary penalties should be imposed, and the fact that the demise of a client’s case -- or a fruitful career -- can arise from a simple failure to understand how modern tech works. The Supreme Court, in the high-profile Goodyear decision, even got in on the action.

    Join a panel of experts, including federal judges, as we glean practical guidance from the most important cases and developments of 2017.

    Cases reviewed include:

    Goodyear Tire & Rubber Co. v. Haeger, No. 15-1406 (U.S. Apr. 18, 2017): When does a court’s inherent power to sanction cross the line?

    Ronnie Van Zant, Inc. v. Pyle, 2017 U.S. Dist. LEXIS 138039 (S.D.N.Y. Aug. 28, 2017): Non-party sanctioned under Rule 37(e) for loss of cell phone information.

    Harleysville Insurance Co. v. Holding Funeral Home, Inc., No. 1:15cv00057 (W.D. Va. Oct. 2, 2017): Should privilege be waived due to inappropriate use of a file-sharing site?

    N.M. Oncology & Hematology Consultants v. Presbyterian Healthcare Servs., 2017 U.S. Dist. LEXIS 130959 (D.N.M. Aug. 16, 2017): Should sanctions be levied for giving employees discretion to preserve emails?

    Bailey v. Brookdale University Hospital Medical Center, No. CV 16-2195(ADS)(AKT), 2017 WL 2616957 (E.D.N.Y. June 16, 2017): Expensive discovery persuades court to split costs, and penalize counsel, in light of lopsided ESI agreement.
  • Enterprise Risk Assessments for Immediate Value and Results
    Enterprise Risk Assessments for Immediate Value and Results Yvette Connor & Jannie Wentzel, Focal Point Data Risk; Sam Abadir, LockPath Recorded: Dec 7 2017 56 mins
    Enterprise-level risk assessments are a business necessity today in light of data breaches, global outsourcing, and regulatory compliance challenges like GDPR. In this webinar, LockPath and Focal-Point will discuss strategies and best practices for creating and leveraging enterprise risk assessments. Attendees will learn:

    • Common goals and objectives for enterprise risk assessments
    • How to define assessment metrics
    • When to determine if a risk assessment is needed
    • When to use an integrated assessment vs. an individual assessment

    This is a can’t miss webinar for anyone responsible for enterprise-level risk and concerned about threats to business operations.
  • From Supervision to Surveillance
    From Supervision to Surveillance Mitch Atkins, Founder and Principal at FirstMark Regulatory Solutions Recorded: Dec 7 2017 58 mins
    Is your day spent plowing through endless piles of messages, while policy violations may lie hidden in your data? How can you make daily review easier while – at the same time – ensure you are addressing topics that are of greatest interest to regulators?

    Today, compliance officers of financial services firms are challenged by information like never before. Data volume is doubling every 18 months and new forms of electronic communication emerge regularly, making supervisory review workloads untenable. At the same time, SEC/FINRA/IIROC regulatory scrutiny over supervisory compliance practices has never been higher, with stiff regulatory fines appearing in the news almost daily. Clearly, conducting review of today’s communications with tools designed 10+ years ago for email is not sustainable.

    Join us and our special guest, Mitch Atkins, founder and Principal at FirstMark Regulatory Solutions, for a discussion of the issues impacting supervisory review, and how firms can re-focus efforts on the identification and mitigation of complex compliance risk. In this webcast you’ll learn:

    •Common compliance risks faced by broker-dealers and their impact on FINRA priorities in 2016;
    •How the growth of non-email is impacting compliance review;
    •Emerging best practices in managing review volumes and conducting compliance surveillance
  • Hit F5: Does Your Risk Management Policy Need to be Refreshed?
    Hit F5: Does Your Risk Management Policy Need to be Refreshed? K.C. Conway, MAI, CRE, Economist, Counselor of Real Estate, Valuation Expert Recorded: Dec 6 2017 63 mins
    This expert panel will take a candid look at the importance of robust risk management at this stage of the market cycle. Looking back, there have been important milestones in the evolution of risk management from the early days of “Phase I or no Phase I?” decisions based solely on loan size. Other areas—like the alignment of the appraisal function and environmental risk management function—are still evolving. As the market enters a phases of moderating property values, lenders should be turning a close eye on their risk management practices. The impact an environmental issue may have on a property’s value is more significant as prices decline. Risk managers who are being challenged to make a case for tighter underwriting will learn valuable ammo for explaining why ERM is more important than ever. Attendees will also learn more about the future direction of regulatory guidance to better reflect budding industry best practices.

    Moderator:
    K.C. Conway, MAI, CRE, Economist, Counselor of Real Estate, Valuation Expert
    Speakers:
    Michael Pereira, CHMM, VP – Environmental Risk Officer, Umpqua Bank
    Michael Kulka, Founder and CEO, PM Environmental, Inc.
    Andy Amarone, Manager of Client Services, EDR Lender Solutions
  • Best Practices for Legacy Archive Migration
    Best Practices for Legacy Archive Migration Robert Desteno, CEO, Archive360 & Bill Tolson, Actiance Recorded: Dec 6 2017 59 mins
    Since the late 1990’s, corporate email archives have become a necessity for many organizations, especially for those in regulated industries or those faced with ongoing eDiscovery requirements.

    Email archives were seen as the only workable solution to capture, secure, manage and make searchable, those emails and attachments that government agencies requested or the courts demanded through eDiscovery requests.

    Prior to 2010, stand-alone, on-premise email archives were the go-to solution to ensure regulatory compliance and reduce eDiscovery risk. Cloud-based email archiving solutions were later introduced and have experienced phenomenal growth over the last several years. The adoption of cloud-based email archives has raised the question: Should you migrate your existing on-premise email archive data to the cloud, and if yes, what’s the best way to do it successfully?

    To answer this and other questions, Join Robert Desteno, CEO from Archive360 and Bill Tolson from Actiance as they explore this and other topics including:

    •The advantages of migrating to a cloud archive
    •Steps to consider before beginning the migration process
    •Best practices to ensure a successful migration
  • Realizing Opportunity with Third-Party Risk Management
    Realizing Opportunity with Third-Party Risk Management Tom Garrubba - Santa Fe Group; Sam Abadir - Lockpath Recorded: Dec 5 2017 62 mins
    The complexity of third-party risk management increases every day, as does its importance to organizations that rely on third parties. Regulators are increasing their focus on potential third-party risk. Risk assessments for business processes and third party management are being integrated, mapped to organizational risks, and mined for patterns and trends. Some organizations are even developing and executing strategies for managing their supplier’s suppliers.

    In this 60-minute webinar, Shared Assessment’s Tom Garrubba and LockPath’s Sam Abadir discuss:

    • The growing need for third party risk management programs.
    • How incorporating third party risk management into an overall governance, risk and compliance (GRC) program can create greater value for your organization.
    • And how the Shared Assessments Standard Information Gathering (SIG) questionnaire and the LockPath® Keylight® Platform work together to streamline, navigate and create value in this increasingly complex third-party landscape.
  • The Millennial Workforce
    The Millennial Workforce Timothy Lietz, Director of Risk Advisory Services, Experis Finance Recorded: Dec 5 2017 62 mins
    The Millennial Generation is one of the five generations in today's workforce and now, also the largest! Learn what motivates this powerful generation as they move into leadership roles and mold the future direction of organizations they work within.

    This informative webinar will provide an in-depth look at the Millennial workforce and cover the following aspects of this new generation:
    •A look at the five generations interacting in today's workforce
    •An overview of Millennial Generation characteristics
    •Management tips for all generations to consider
    •Current examples of leading and mentoring Millennials
    Whether you lead Millennials today, have them as teammates or colleagues, or you report to one, this session provides insight into what motivates this powerful generation and the ways they will change our workforce over the coming years.
  • Why automation is key in accelerating due diligence
    Why automation is key in accelerating due diligence Dun & Bradstreet Recorded: Dec 5 2017 2 mins
    Compliance as a practice is often seen as burden, and automation is one answer to reducing the burden. Organisations are at different levels of maturity in adopting automation in their compliance processes. However, most companies are trying to improve consistency, reduce subjectivity and use some level of tools (software, data and managed services). Best-in class organisations have automated their compliance programs to reduce the burden and cost of compliance and then re-invest those saving into further innovations.
  • Navigating regulatory challenges using Beneficial Ownership data
    Navigating regulatory challenges using Beneficial Ownership data Dun & Bradstreet Recorded: Dec 5 2017 2 mins
    Due diligence and knowing exactly who you are doing business with is crucial to conducting business in today’s interconnected landscape. Using Beneficial Ownership data is key to navigating the regulated business environment. Beneficial Ownership capabilities can identify the corporate hierarchy and verify the identification of customers, vendors and third parties, surfacing any connections that may expose risk to businesses.
  • Doing good goes beyond the bare minimum
    Doing good goes beyond the bare minimum Dun & Bradstreet Recorded: Dec 5 2017 2 mins
    Being a good corporate citizen is no longer just about complying with regulations; it’s also about conducting business responsibly. There are rising expectations on businesses to have full disclosure and oversight of their operations. They need to ensure ethical sourcing practices, take responsibility for risk, and promote shareholder value with good corporate citizenship.
  • What the convergence of supply and compliance means for your business
    What the convergence of supply and compliance means for your business Dun & Bradstreet Recorded: Dec 5 2017 2 mins
    Driven by today’s increasingly regulated business environment, supply and compliance functions are more interconnected than ever and utilise similar data. Organisations need a holistic and detailed picture of all their relationships to effectively manage risk and protect corporate reputation.
  • The changing challenges of the CCO
    The changing challenges of the CCO Dun & Bradstreet Recorded: Dec 5 2017 2 mins
    Compliance is integral to an organisation’s culture, and there has been a distinct shift in this role from “police to partner.” Compliance issues are a key topic in the boardroom, and employees across the business are also expected to take shared accountability for doing the right thing. CCO’s are experiencing the extra burden of trying to maintain an understanding of the evolving regulatory landscape, while also facing close scrutiny from customers and partners, the media, and the wider public.
  • Webcast: Best Practices for Deploying E-Signatures in the Retail Branch
    Webcast: Best Practices for Deploying E-Signatures in the Retail Branch Abe Karar, Founder – ALCHEMY Digital Solutions & Mary Ellen Power, VP Marketing – eSignLive Recorded: Dec 5 2017 59 mins
    Gain insight on:
    - How to answer two key questions: What are the minimum technical requirements for in-branch e-signatures? Why take an MVP approach and iterate?
    - The data-driven exercise for selecting the right product to start with.
    - How to gain buy-in and adoption among stakeholders AND front-line staff.
    - Best practices for the QA environment, pilot and roll-out.
    - Why dashboards, videos and surveys are critical to change management.
  • OCC 2018 Part 2: Bank Secrecy Act | Anti-Money Laundering
    OCC 2018 Part 2: Bank Secrecy Act | Anti-Money Laundering Sam Abadir, Director of Product Management, LockPath Jan 11 2018 5:00 pm UTC 60 mins
    Overview Description
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. One priority is familiar to most: Bank Secrecy Act (BSA) and Anti-Money Laundering (AML). Whether you’re a banker or service provider to the financial industry, compliance with BSA and AML is a day-to-day and ongoing challenge. In this webinar, you’ll learn what the OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.

    Attendees will learn:

    • Examiners’ review of programs for BSA/AML compliance and financial inclusion
    • The risk assessment process related to BSA and AML
    • Policies, procedures, and processes that effectively mitigate identified risks
    • The impact of non-compliance on a bank’s growth
    • How GRC technology supports compliance and integrated risk management programs

    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018
    Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 Doug Austin and Tom O'Connor Jan 11 2018 6:00 pm UTC 75 mins
    2017 was a very interesting year for eDiscovery case law and the impact of FRCP rules changes in 2015 became even more apparent. How can the key case law decisions affect discovery within your organization? This CLE-approved* webcast session will cover key 2017 case law decisions covered by the eDiscovery Daily blog and what the legal profession can learn from those rulings. Topics include:

    + Handling objections to production requests
    + Waiver of privilege and Rule 502(d)
    + Case law related to subpoenaed production of international data
    + Control of data stored by a third party
    + Dictation of search terms and production scope by courts
    + Form of production disputes and the issues involved
    + Performing keyword search before Technology Assisted Review
    + The state of sanctions with the new Rule 37(e)

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • 2018: Unified Communications and the Year Ahead
    2018: Unified Communications and the Year Ahead IR Jan 18 2018 4:00 pm UTC 60 mins
    2017 has been a big year in UC, the increased impacts of AI, Microsoft's announcement Teams, Avaya exiting Chapter 11 and Cisco's continued march toward the cloud, just to name a few.
    What will 2018 have in store? Join this webinar to get the lowdown on predictions for 2018 so you can stay ahead of the game.
  • 2018 - The Best Year for Cyber Criminals. Period
    2018 - The Best Year for Cyber Criminals. Period Amar Singh, Wieland Alge, NH Jan 19 2018 11:00 am UTC 75 mins
    Join in the debate, Share your opinions and hear a wide range of experts share their experience and insights.

    Cyber Management Alliance brings you our highly interactive and interactive webinar, inaugurating the new year with an interactive webinar on what tp expect, how and what the criminals are going to do (or not do) and what you can do to protect yourself.

    Yes, we know GDPR is around the corner, but we believe there is much more ahead than just privacy concerns.

    Current speakers include:

    - - Amar Singh - Practising CISO, founder Wisdom of Crowds and Cyber Management Alliance Ltd

    - - Wieland Alge - Senior Technical SME from Barracuda,

    - - NH - Our specialist hacker -

    More experts to be confirmed soon.
  • OCC 2018 Part 3: Change Management to Address New Regulations
    OCC 2018 Part 3: Change Management to Address New Regulations Sam Abadir, Director of Product Management, LockPath Jan 25 2018 5:00 pm UTC 60 mins
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. A top priority is change management to address new regulation requirements. Whether you’re a banker or service provider to the financial industry, you may be aware of updated or new regulations like the National Flood Insurance Reform Act of 1994, the Military Lending Act, and the Prepaid Card Rule. In this webinar, you’ll learn what OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.

    Attendees will learn:

    • What to consider when designing, operating or improving their change management process
    • The increased focus on fair lending from a quantity and quality perspective
    • Policies, procedures, and processes for credit offered under the Military Lending Act
    • What CCA examiners are looking for with banks relying on third-party relationships
    • How GRC technology supports compliance and integrated risk management programs

    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • Oracle Audits
    Oracle Audits Dave Welch, House of Brick Technologies; Pam Fulmer, Fulmer Ware Jan 25 2018 5:00 pm UTC 60 mins
    In this session, we will provide a summary of Oracle licensing by the contract, and explore Oracle audit practices referencing the Mars Incorporated lawsuit against Oracle.

    We will share recommendations to help you prepare for an Oracle audit, including VMware licensing information.
  • Changing the Game: Increasing Identity Assurance while Limiting Disclosure
    Changing the Game: Increasing Identity Assurance while Limiting Disclosure Jeremy Gottschalk (Founder, Marketplace Risk Management Conference) & David Thomas (Founder & CEO, Evident) Jan 31 2018 7:00 pm UTC 60 mins
    From travel to staffing to babysitting, businesses are creating marketplaces that can only thrive when users feel confident that the data they are providing will be protected and businesses can be confident that the individuals using the platform are who they say they are. And as businesses face more regulatory requirements and even reputational risks that come with the threat of a data breach, finding efficient ways to manage identity authenticity is even more critical. As information becomes increasingly digitized, how do companies create safe, authentic platforms for their users without increasing the friction that typically comes with that protection?

    Businesses need to change their playbook for managing online identity. This discussion will focus on how businesses can build secure ecosystems that are founded on authenticity but created to scale with less friction and risk, mitigating the need to hold and secure personal data as well as divert resources from their core business.

    Key Takeaways:
    Learn the key obstacles faced by many companies in assuring that individuals are who they say they are
    Walk away with a playbook to revolutionize the way you handle data and identity management
  • OCC Bulletin: Risk Management Principles
    OCC Bulletin: Risk Management Principles Sam Abadir - Lockpath Feb 8 2018 5:00 pm UTC 60 mins
    Introducing new products and services or modifying existing ones is the lifeblood of any bank. That said, a recent OCC Bulletin conveys a related urgency. Products and services should not just follow plans and strategies but also utilize sound risk management principles. In this webinar, we’ll dive into those principles and the implications of the bulletin.

    As an attendee, you’ll learn:
    • Overview and ramifications of OCC Bulletin 2017-43
    • Risk management principles applicable to bank products and services
    • Key themes and trends related to banking innovation and customer preferences
    • Challenges banks face in addressing key themes/trends
    • How GRC technology supports a bank’s integrated risk management program

    2018 will be a banner year for banks to introduce new or updated products and services. How well you manage risk, be it strategic, reputational, credit, liquidity, operational, or compliance, will greatly determine the degree of success. Learn to manage bank risk in this webinar.

    Register now.
  • GDPR: Compliance and Preperation
    GDPR: Compliance and Preperation Steve Durbin, Managing Director, ISF LTD May 24 2018 12:00 pm UTC 45 mins
    With the EU's GDPR deadline upon us, where should organisation start in order to be GDPR ready?

    In this webinar, Steve Durbin, Managing Director at the ISF will discuss how organisations need to create a structured method in order to achieve sufficient levels of compliance. Steve will share insights into how organisations can achieve this through:

    - Identify how much personal data your organisation holds
    - implement a compliance programme
    - Translate compliance actions into tangible business benefits


    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • GDPR: Deadline Day Special
    GDPR: Deadline Day Special Steve Durbin, Managing Director, ISF LTD May 25 2018 12:00 pm UTC 45 mins
    After month's of planning and mapping out GDPR compliance activities, IT and security leaders are now under pressure to start implementing such plans.

    In this webinar, Steve Durbin, Managing Director at the ISF, will share his insights into the next steps organisations should take when implementing a GDPR compliance programme, to ensure q culture of security awareness is established across the enterprise.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Security in the Golden Age of Cloud
    Security in the Golden Age of Cloud Steve Durbin, Managing Director, ISF LTD Oct 23 2018 12:00 pm UTC 45 mins
    Demand for cloud services continues to increase as the benefits of cloud services change the way organisation manage their data and use of IT.

    However, while these services can be implemented quickly and easily, with increased legislation and data privacy, the threat of cyber theft is on the increase and organisations must have a clear understanding of where their information is stored and how reliant these services are.

    In this webinar, Steve Durbin, Managing Director of the ISF will discuss the risks associated with cloud computing and how to manage them, as well as how to maximise the benefits.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.