Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Insights with Cyber Leaders - Patrick Heuri
    Insights with Cyber Leaders - Patrick Heuri Amar Singh Cyber Management Alliance Recorded: Sep 22 2017 22 mins
    Insights with Cyber Leaders series brings you a fascinating Interview with Patrik Heuri former Global Head of Information Security Risk at HSBC Private Bank.

    Moving from an information security role into a cyber security role has been challenging. Patrik explains his thoughts in that when you think about information security, you think of it as a technical subject, and that’s correct. In fact, most project leads will, when they start as juniors, learn the necessary techniques and methodologies they will need to develop their expertise as an IT security officer. However, further down the line of their careers, Patrik believes that there is a requirement to better understand the legal aspects to cyber and information security, such as regulations and compliance, and the information production within the organisation. He adds that it will be of great benefit to anyone entering the information security/cyber security space to train and work with the legal teams on IT matters.
  • VRM Roadmap: Navigating to an Effective Vendor Risk Management Program
    VRM Roadmap: Navigating to an Effective Vendor Risk Management Program Sam Abadir, Director of Product Management, LockPath Recorded: Sep 22 2017 17 mins
    In this webinar, LockPath's Sam Abadir answers 5 questions on the road to reaching an effective vendor risk management program:

    • What encompasses Vendor Risk Management?

    • Who needs to know about Vendor Risk Management?

    • How does someone approach building a VRM program?

    • What does that approach look like today?

    • What will that approach look like in the future?
  • Win and Wow Customers – 6 Best Practices for Onboarding in Banking and Insurance
    Win and Wow Customers – 6 Best Practices for Onboarding in Banking and Insurance Sheryl Kingstone-451 Research, Jim Marous-Financial Brand, and Sarah Johnson-Kofax Recorded: Sep 21 2017 59 mins
    Banks, credit unions and insurance companies may have differing business models, but they all have a common goal: better conversion and retention rates.

    Fortunately, better customer onboarding usually translates to better conversion and retention. For this reason, organizations continue to invest in digital technologies to streamline operations and eliminate time-consuming online interactions in areas such as new account opening, loan origination and policy applications.

    Those first information-intensive interactions, of course, are the most critical: you usually only get once chance to win a new customer’s business. But winning is only part of the equation. What if you could win—and wow—customers from those first moments and keep them engaged throughout the onboarding process?

    Mark your calendars for this upcoming webinar, where industry experts will share six best practices to help your organization win and wow customers:

    • Easy—Enable instant image and data capture via web and mobile technology
    • Accurate—Extract data from pictures of physical documents without error-prone manual entry
    • Automated—Invest in workflow tools to automate and track completion of process steps
    • Visible—Empower staff and customers with process transparency and timely communication
    • Consistent—Ensure data is complete and integrated across internal systems
    • Efficient—Meet expectations for speed, while effectively managing regulatory risks

    Speakers will include:
    •Sheryl Kingstone, Director, 451 Research
    •Sarah Johnson, Industry Solutions Architect, Kofax
    •Jim Marous, Owner and Publisher, Digital Banking Report

    Don’t miss out! Register now >>
  • From Managing Risk to Creating Value – Compliance Week 2017
    From Managing Risk to Creating Value – Compliance Week 2017 Joe Filer, Senior Vice President, CISO & CPO, Harland Clarke; Sam Abadir, Dir. of Product Management, LockPath Recorded: Sep 21 2017 47 mins
    Join LockPath’s Sam Abadir and Harland Clarke’s Joe Filer in this session from Compliance Week 2017, as they discuss how to how to go from managing risk to creating value, including:

    • Ways to quantify the business value potential of compliance decisions.
    • The difference between metrics and risk-adjusted metrics.
    • How to transform a team or department from a necessary cost to a competitive advantage.
  • Cross-border e-discovery and data sharing: Asia, E.U. and U.S. perspectives
    Cross-border e-discovery and data sharing: Asia, E.U. and U.S. perspectives Sponsored by Dechert LLP; hosted by Jim Waldron, director of EDRM. Recorded: Sep 19 2017 60 mins
    Join us for a discussion of the E.U. General Data Protection Regulation and the new People’s Republic of China data privacy law and the potential impact on e-discovery in litigation. We'll also discuss how changing technologies in cloud computing might impact preservation and collection in e-discovery, including cross-border data sharing. Presenters include experienced attorneys from Dechert LLP based in the U.S., Asia and the E.U. The session will conclude with a Q&A.

    Moderator: Jim Waldron – Director, EDRM
    Speakers:
    Timothy C. Blank – Partner, Boston
    Hilary Bonaccorsi – Associate, Boston
    Dr. Olaf Fasshauer – National Partner, Munich
    Philip Kwok – Associate, Hong Kong
  • Policy Management Part 2: Employee Engagement
    Policy Management Part 2: Employee Engagement Michael Rasmussen, The GRC Pundit, GRC 20/20 Recorded: Sep 19 2017 34 mins
    Once a policy is written, how should you get employees engaged? GRC Pundit, Michael Rasmussen discusses best practices in policy awareness and communication. You’ll learn:

    • The role of training and ramification
    • The policy portal—building an interactive employee experience for policy management
    • Getting employee questions answered
    • Attestations, read and understood, certifications
    • How technology enables employee engagement on policy
  • Bringing Order to the Chaos of IT Risk Management
    Bringing Order to the Chaos of IT Risk Management Sam Abadir, Director of Product Management, LockPath Recorded: Sep 14 2017 46 mins
    As business becomes more digital, companies are finding that managing risk is becoming more and more chaotic and expensive. Adding to the complication, technology is often not solely managed by the IT department. Marketing, sales operations, department operations, support, and more are increasingly taking control of their own IT. Ensuring teams enterprise-wide are using best practices for IT, adhering to frameworks and regulations, and complying with their contractual obligations has escalated into a difficult battle – one with potentially large consequences if waged poorly.

    In this session you will learn:

    • How companies are bringing order to the chaos of IT risk management using integrated risk management tools like Keylight
    • Where your organization lives on an IT Risk maturity model
    • Tactical steps to take to make your IT risk management processes more efficient and effective
    • How your organization can manage and report IT risks to every role in the organization
  • RECORD KEEPING FOR MIFID II:  HOW READY ARE YOU?
    RECORD KEEPING FOR MIFID II: HOW READY ARE YOU? Andy Dunbar, Vicky Ryder Recorded: Sep 14 2017 33 mins
    With little over 100 days until MiFID II comes into force, investment firms, trading houses, banks and other affected businesses are deep into the research phase of their projects.

    Join our latest webinar for exclusive access to research carried out on behalf of TeleWare to understand how ready businesses really are. Where they see the key challenges and how best to overcome these barriers.

    TeleWare research initiative carried out by Censuswide asked 100 compliance and IT managers about the record keeping aspects of their projects. In this webinar, we will explore the responses and cover ways in which firms can be addressing some of the common challenges.
    We will be discussing:

    * How ready do firms believe they are now and will be by 3rd January 2018
    * What aspects of ‘record keeping, trade reconstruction and surveillance’ within MiFID II are causing most concern?
    * What benefits will MiFID II bring to firms?
    * The technology that is helping firms meet their new MiFID II regulatory requirements

    Hosted by SoftwareONE with guest speakers from compliant recording and analytics specialists TeleWare, this will provide practical insight to help unlock the potential benefits that MiFID II can bring.
    We will be discussing:

    * What impact getting ready for MiFID II is having on businesses
    * What technology is being employed to help with compliance
    * How businesses are planning to create growth despite greater regulation
    * Is everybody going to be ready in time and what happens if not?

    The session will be hosted by:
    Andy Dunbar from SoftwareONE

    We will also be joined by Vicky Ryder from TeleWare
  • It’s Time to Commit to Driving Efficient IT
    It’s Time to Commit to Driving Efficient IT Julian Kudritzki, Chief Operating Officer, Uptime Institute Recorded: Sep 13 2017 57 mins
    Join Julian Kudritzki, COO of Uptime Institute to explore the modern business challenges associated with delivering computing services in the new era of Cloud-driven IT. He will cover delivering these business services at the right cost, with a high level of efficiency and a keen eye on defending corporate sustainability. Uptime Institute’s Efficient IT assessment provides a management methodology that evaluates, scores, and benchmarks Leadership, IT Infrastructure, and the Data Center.

    Find out how this approach ensures close scrutiny, and eliminating waste, from data center power and cooling systems; the asset management of compute, storage, network; and—weighed most heavily—the leadership (i.e., energy management plan, technology adoption plan, cloud strategy, KPIs). Uptime Institute’s Efficient IT customers realize dramatic long-term savings in operational expenditures, significant increased asset utilization as well as directly support a strategic corporate responsibility profile. The Efficient IT Assessment is based on multiple decades of research and protocol development and for our Efficient IT customers, have identified cost savings between 3x-200x the cost of the assessment.
  • Risk Management Direction from the OCC
    Risk Management Direction from the OCC Sam Abadir, Director of Product Management, LockPath Recorded: Sep 13 2017 53 mins
    Semiannually, the Office of the Comptroller of the Currency (OCC) publishes its perspective on risk management in the financial services industry. This session will analyze the following key risk themes that the OCC’s National Risk Committee (NRC) has identified thus far in 2017:

    • Strategic risk and achieving strategic goals
    • Operational risk
    • Compliance risk
    • • Regulatory change
    • Consumer compliance risk

    In the webinar, we will share how these risks are being generally managed and compare that to how best-of-breed financial institutions are effectively and efficiently addressing these risks – often with great benefit to their institutions.

    Additionally, we will address how increased risk and compliance demands, as well as heightened public attention, are, in general, increasing compliance costs and putting pressure on earnings. Attendees will learn how best-of-breed financial institutions are effectively battling that cost pressure, while gaining a competitive advantage over other institutions.
  • Key eDiscovery Case Law Review for First Half of 2017
    Key eDiscovery Case Law Review for First Half of 2017 Doug Austin and Tom O'Connor Recorded: Sep 13 2017 66 mins
    The best predictor of future behavior is relevant past behavior. Nowhere is that truer than with legal precedents set by past case law decisions, especially when it relates to eDiscovery best practices. This free and CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2017.

    Presentation Highlights

    + How should objections to production requests be handled?
    + Are you required to produce subpoenaed data stored internationally?
    + Should there be a limit to fees assessed for discovery misconduct?
    + When is data stored by a third party considered to be within your control?
    + Should courts dictate search terms to parties?
    + How can you make an effective proportionality argument to address burdensome requests?
    + Can the requesting party dictate the form of production?
    + Does storing data on a file share site waive privilege?
    + If data is intentionally deleted, should Rule 37(e) apply?
    + Is circumstantial evidence of intentional spoliation good enough to warrant sanctions?
    + Should keyword search be performed before Technology-Assisted Review?

    Webinar Presenters

    Doug Austin: VP of Operations and Professional Services, CloudNine
    At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Tom O’Connor: eDiscovery Expert and Special Consultant to CloudNine
    Tom is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems.
  • Webcast: Tips on Driving E-Signature Adoption in Your Independent Agent Channel
    Webcast: Tips on Driving E-Signature Adoption in Your Independent Agent Channel Andy Jordan, SVP, Corporate Marketing @ GAINSCO Auto Insurance & Andrea Masterton, Director, Corporate Marketing @ eSignLive Recorded: Sep 12 2017 63 mins
    Watch this webcast to hear practical advice from GAINSCO on how to achieve maximum usage and ROI of an e-signature platform. Specifically, the webcast will detail:

    - Adoption benchmarks
    - What factors determine opt-in rates
    - Best practices for driving high adoption
    - Designing an optimal e-signature workflow
    - Change management considerations
  • Cyber Resiliency: Reducing Your Risk By Increasing Your Resiliency
    Cyber Resiliency: Reducing Your Risk By Increasing Your Resiliency Stephen Head, Mike Gerdes, and Jeff Butler of Experis Finance Recorded: Sep 12 2017 61 mins
    Managing operational resilience in today’s digital environment is extremely challenging, whether your organization is public, private or governmental. In response to the continued growth of cyber-attacks, many organizations have decided it’s time to focus more of their efforts on cyber resiliency. This approach to proactively dealing with the potential outcome of cyber-attacks increases the organization’s awareness of the potential impacts and costs, and enables them to take actions that reduce the overall risk to the organization, minimize the impact of cyber-attacks, and more predictably ensure the continuity of essential services.

    This webinar will provide a high-level overview of cyber resiliency and explore the following aspects of cyber resiliency:

    • Where cyber resiliency differs from traditional business continuity management
    • How to determine your organization's need for cyber resiliency
    • Practical ways to assess your current and future organizational exposure
    • Who should be involved in cyber resiliency
    • What are some practice steps to begin implementing a cyber resiliency program

    Whether or not you have embraced a formal cyber resiliency program, this session will provide some practical advice on what cyber resiliency is, how to incorporate it in your organization’s overall business continuity management efforts, and what cyber resiliency can mean to improving your organization’s ability to withstand a cyber attack.

    Presented by:
    Stephen Head, CPA, CISSP, CISM, CBCP
    Sr. Manager - Risk Advisory Services
    Experis Finance

    Mike Gerdes
    Director, Information Security Center of Expertise
    Experis US, Inc.

    Jeff Butler
    Director, Risk Advisory Services
    Experis Finance
  • Vendor Management: Elements of an Effective Operation
    Vendor Management: Elements of an Effective Operation Chris Gorsuch, Vendor Security Lead, Change Healthcare; Sam Abadir, Director of Product Management, LockPath Recorded: Sep 12 2017 56 mins
    Most organizations are adept at identifying risks. Where they fall short is in vendor identification, tracking, and follow-up.

    This webinar, “Vendor Management: Elements of an Effective Operation,” will bridge the gap by sharing the key elements of Change Healthcare’s successful vendor assessment program. Specifically, you’ll learn:

    • Eight factors for identifying vendors
    • An approach for categorizing vendors
    • Questions to ask for improved assessments
    • Response plans for risk recognition
    • How to eliminate third-party reports and unnecessary controls

    How effective is your operation in managing its vendors? Learn what you can improve on in this webinar led by Chris Gorsuch, Vendor Security Lead, Change Healthcare
  • The Second Coming of Ransomware - Insights into New Developments
    The Second Coming of Ransomware - Insights into New Developments Amar Singh Recorded: Sep 12 2017 54 mins
    We are excited to bring you an updated version of our hugely popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next". Traditional ransomware, for the want of a better word, is boring and truthfully a fairly opportunistic way to make money. Guess what, criminal gangs don't believe in opportunistic attacks that may make them money. They want a certain assurance of success and importantly, they want big bucks.

    Modern ransomware is going to be able to deliver this and more to anyone who can pay top dollar.

    Join global CISO and cybersecurity expert, Amar Singh, as he shares his insights and experience on the murky world of cyber crime and ransomware and how you can be better prepared to manage this growing threat.
  • Turning Risk Management Into a Competitive Advantage
    Turning Risk Management Into a Competitive Advantage Sam Abadir, Director of Product Management, LockPath Recorded: Sep 7 2017 37 mins
    If you’re in compliance, risk management or IT, you’ve perhaps grown used to functioning in a support role while others in your company get all the glory. It’s time for you to grab some of the spotlight. But to do that, you need to transform your team/department from a necessary cost to a competitive advantage for your organization.

    In this session we share the experiences of two companies that have used their GRC capabilities to create value within their organizations.
  • Preeminent PE: The new Masters of the Tech Universe
    Preeminent PE: The new Masters of the Tech Universe Brenon Daly, Research Director, Financials, 451 Research Recorded: Sep 7 2017 63 mins
    Forget Oracle, IBM or any of the other big-name, publicly traded acquirers that – until now --have always set the tone in the tech M&A market. If a tech deal printed in 2017, the buyer is more likely a private equity firm than any of the well-known serial acquirers on the US stock market. This is the first time in the history of the multibillion-dollar tech M&A market that financial acquirers have been busier than these strategic acquirers. To understand how the ever-growing influence of buyout shops is reshaping the tech industry, join 451 Research for an hour-long webinar on Thursday, Sept. 7 2017.
  • Don't wonder, Know when a breach occurs - Auto Breach ID & Investigation
    Don't wonder, Know when a breach occurs - Auto Breach ID & Investigation Willam Bent, VP Security Products and Douglas Hurd, Cisco Security Technical Alliances Recorded: Sep 7 2017 45 mins
    With increased volume and sophistication of intrusions and tightening data privacy compliance requirements such as GDPRs 72 hour notification, organizations must reduce their cyber–attack incident response times.

    During this webinar, join CSPi and Cisco as we demonstrate an integrated and automated solution for cyber-breach detection and investigation leveraging Cisco FirePower Next Gen firewalls and IPS/IDS products coupled with CSPi’s Myricom nVoy solution, enabling your security team to:
    - Receive Immediate notification when an intrusion directly impacts their most critical assets triggering the start of a focused investigation
    - Conduct focused forensic analysis
    - Easily validate and then determine the scope of the potential breach including what type of data was involved, and what data records were exposed
    - Reduce analysis from weeks to hours
  • Webcast: E-Signature FAQ: Details on Integration, Customization & Workflow
    Webcast: E-Signature FAQ: Details on Integration, Customization & Workflow Pat Albert, Business Architect & Aphrodite Koukoulas, Marketing Programs Manager @ eSignLive by VASCO Recorded: Sep 6 2017 63 mins
    Join our team of experts as they answer the most common questions asked by organizations evaluating and adopting e-signatures.

    Questions like:
    What is involved in adding e-signatures into our processes? What about expansion?
    How do e-signatures align with our mobile strategies?
    What are the most common challenges that arise when adopting e-signatures?
    What customization options are available?
    How are other organizations using e-signatures?
    Can you show me what this looks like? (Watch the live demo!)
  • Policy Management Part 1: When and how to write a policy
    Policy Management Part 1: When and how to write a policy Michael Rasmussen, The GRC Pundit, GRC 20/20 Recorded: Sep 5 2017 35 mins
    Anyone can write a document and call it a policy, but that puts liability and exposure on the organization. GRC Pundit, Michael Rasmussen discusses the act of responsible authoring. You’ll learn:

    • How to define who is authorized to write policy
    • How to determine when to write a policy
    • Mechanics and consistency of good policy writing
    • Supporting tools for policy writing and style guide
    • How technology enables consistent policy authoring
  • How Openbravo boosts retail competitiveness with an optimized supply chain
    How Openbravo boosts retail competitiveness with an optimized supply chain Maarten Tromp (Openbravo), Hari Madhavan (Promantia Global Consulting) Recorded: Sep 5 2017 61 mins
    The heightened expectations of today’s consumers are forcing retailers to revamp their supply chains to make them more efficient, deliver greater demand responsiveness and ensure the optimal placement of inventory in the supply chain. An optimized supply chain brings multiple benefits in terms of improved customer service and logistics cost, greater flexibility in matching demand and supply, and it enables retailers to improve the accuracy of their forecasts.

    In this webinar we explain how to optimize retail supply chains to better satisfy customer demands and boost business efficiency while reducing costs. We look in particular at the example of India, where the recent introduction of Goods and Sales Tax will bring major changes in the way procurement, warehousing and transportation are carried out. We describe and demonstrate some of the advanced supply chain management capabilities Openbravo has added to its product suite to help retailers revamp their supply chains and so improve competitiveness.
  • Tips and Tricks to Get the Most Out of Your Pentaho Trial
    Tips and Tricks to Get the Most Out of Your Pentaho Trial Jason Bachman, Sales Engineer, Pentaho Recorded: Aug 31 2017 22 mins
    Want to learn more about the Pentaho Trial? Then attend this recorded webcast that focuses on big data and data integration best practices as well as how to get the most out of your Pentaho 30-day trial.

    Other topics include:

    * A review the components that are part of your trial and best approach to get started
    *A discussion on the best way to connect to your data and manage your analytical pipeline
    * A showcase our library of videos, tutorials and documentation for a smooth trial
    * Highlights of proven best practices to make the most of your 30-day download
  • Big Data Integration & Analytics: Learn More About Pentaho's End-to-End Solution
    Big Data Integration & Analytics: Learn More About Pentaho's End-to-End Solution Jorge Villamariona, Sr. Technical Solutions Manager, Pentaho Recorded: Aug 31 2017 41 mins
    Watch this recorded webinar to learn more about how Pentaho can help you with big data integration and analytics. Other topics include:

    * Pentaho's flexible enterprise-grade platform for blending data across diverse sources, such as Hadoop, NoSQL, relational databases, and enterprise applications

    * Our flexible and interactive business analytics solutions for data exploration, visualization and consumption

    * Embedding Pentaho's full array of business analytics seamlessly into your existing applications to drive data monetization and a better customer experience

    * How customers like Caterpillar leverage Pentaho's end-to-end platform to drive transformational business results and ROI
  • On Premise or Off Premise? A Look at Security Approaches to eDiscovery
    On Premise or Off Premise? A Look at Security Approaches to eDiscovery Doug Austin and Tom O'Connor Recorded: Aug 30 2017 61 mins
    Today, when consumers are considering their eDiscovery technology choices, there are more factors to consider than ever. In addition to considering the functionality of the software application, you now also have to consider whether to buy or “rent” the application, how the software is delivered to you and whether it’s required to be within your firewall or can be an off-premises solution. This CLE-approved* webcast session will discuss different on-premise and off-premise eDiscovery solution options and considerations for each. Key topics include:

    + Drivers for eDiscovery Technology Solution Decisions Today
    + eDiscovery Industry Market Trends and Their Relation to General Industry Trends
    + What Law Firms are Saying about the Technology
    + What Industry Analysts are Saying about the Technology
    + The Cloud vs. No Cloud Debate
    + Why Not All Cloud Solutions Are the Same
    + A Comparative Approach to eDiscovery Technology
    + Putting a Face on Solutions and Risks
    + Key Components of an eDiscovery Technology Solution

    Panel Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters where he has worked on numerous major cases, most recently the BP litigation. He has also been appointed as a technical consultant by various federal and state courts on cases dealing with large amounts of electronic evidence and specializes in negotiating ESI exchange protocols.

    * MCLE Approved in Selected States
  • GDPR - How to embrace PCI’s big brother
    GDPR - How to embrace PCI’s big brother Chief Operations Officer, Nick Rafferty & Head of GRC, Oliver Vistisen Recorded: Aug 23 2017 44 mins
    If your organization stores, processes and transmits cardholder data, PCI’s big brother - the EU General Data Protection Regulation - could affect your ability to do business in the EU.

    Impacted PCI US companies may have EU residents as employees or customers.

    The GDPR has become a primary item on most organizations' agenda this past year, yet a disproportionate amount of focus has fallen on the fines that are set to come in force May 25, 2018.

    We want to take a more optimistic look at the regulation, why it came to be and how it can be a massive opportunity to strengthen your reputation and (re)gain customer confidence. We will also look at how the implementation and ongoing maintenance of compliance can be addressed through an analytical approach to the Articles themselves; the rules of the regulation.

    What attendees will learn:
    • How US ecommerce and other companies involved in payment card transactions can be impacted by the GDPR.
    • Why the world’s most valuable resource is no longer oil, but data.
    • Why the GDPR is far more than a simple check-box compliance exercise.
    •Why the GDPR is a massive opportunity in disguise for organizations who take it seriously.
    •How the GDPR aims to change company culture by turning risk assessments on their head.
    •An analytical breakdown of the GDPR Articles that uncovers those that are applicable to your organization, and how to tackle these through a risk based approach.
    •Key areas of focus for any GDPR program based on personal and client feedback.
    •How to effectively implement GDPR by expanding upon existing compliance programs and management systems (ISO 27001).
  • Latest developments in the global private placement market
    Latest developments in the global private placement market Scott Ashton and Brian Bates, Morrison & Foerster; Tarun Sakhrani, Barclays; Tom Young, IFLR Sep 25 2017 3:00 pm UTC 90 mins
    The cross-border private placement market has continued to grow, providing issuers with an opportunity to raise capital from US and European financial institutions. This market, which has seen incredibly robust activity this past year, has continued to attract issuers across a myriad of industries and from multiple worldwide jurisdictions. These issuers seek to, among other things, diversify their funding sources or supplement their bank lending, lengthen their existing debt profile, refinance acquisition debt or finance certain single-asset projects. In this webinar, speakers will discuss:

    •The global private placement market and recent trends;
    •Market participants;
    •Documentation requirements for traditional and structured transactions;
    •Financial covenants, MFLs and model form provisions;
    •New issuers using the market (social housing trusts, universities, investment trusts, etc);
    •Marketing process with Agented and direct Private Placements; and
    •Ratings and the NAIC.
  • 5 THINGS YOU SHOULD BE DOING RIGHT NOW TO BE MiFID II COMPLIANT
    5 THINGS YOU SHOULD BE DOING RIGHT NOW TO BE MiFID II COMPLIANT Andrew Fawcett, MiFID II Product Manager TeleWare Sep 26 2017 10:00 am UTC 45 mins
    The clock is ticking until MiFID II is implemented. January 3rd 2018 is just over 100 days away. How confident are you that your business can comply with the new record-keeping requirements?

    We're working with our customers to help ensure they will meet their MiFID II recording requirements. In this webinar we will share practical advice on how you can be ready on time.

    We will discuss:

    •Market insight into where businesses are in their MiFID II journey
    •What to do about data storage post MiFID II
    •Planning to grow despite more compliance
    •How to tackle the increased record keeping requirements

    The session will be hosted by:
    Vicky Ryder – Microsoft Practice Lead
    Andrew Fawcett – MiFID II Product Manager

    Target audience:
    Senior compliance and IT professionals in businesses impacted by MiFID II.
  • Is Your Supply Chain About to Be Disrupted Again? Analytics Provides the Answer.
    Is Your Supply Chain About to Be Disrupted Again? Analytics Provides the Answer. Nick Wildgoose, Zurich Insurance, and Jon Ball, Dun & Bradstreet Sep 27 2017 2:00 pm UTC 45 mins
    Join our webinar led by Nick Wildgoose – Global Supply Chain Product Leader at Zurich Insurance and Jon Ball – Senior Global Director, Analytic Consulting at Dun & Bradstreet, to hear the results of the latest market research. You’ll learn at which tiers in the supply chain disruptions are occurring more frequently and the causes of these disruptions. Nick and Jon will be providing you with a greater understanding of the challenges and opportunities facing companies across North America and Europe to improve supply chain resilience. They will also describe the innovations being brought in terms of supply chain risk assessment, technology, and transfer to help protect financial performance.
  • How Governments Can Adapt - Making Digital Transformation a Reality
    How Governments Can Adapt - Making Digital Transformation a Reality Keith Dawson - Principal Analyst, 451 Research, Michael Mueller- Director - Solutions Management, CenturyLink Sep 27 2017 5:00 pm UTC 60 mins
    Can government institutions use modern tools and technologies to become more flexible and responsive to their constituents? What should they be looking at, and how should they adapt to the challenges of data security, privacy, and reliance on legacy systems? Digital transformation is an ambitious project for any organization; government decision-makers are hoping it will provide a path to broader citizen engagement, empowered employees, and new digital infrastructures that will provide better access to data and services.

    In this webinar we will discuss the results of a survey on the challenges and imperatives of digital transformation, including the perspectives of government managers on their technology and operational challenges and expectations.
  • Holy ****, The Case is Filed!  What Do I Do Now?
    Holy ****, The Case is Filed! What Do I Do Now? Doug Austin and Tom O'Connor Sep 27 2017 5:00 pm UTC 75 mins
    The first days after a complaint is filed are critical to managing the eDiscovery requirements of the case efficiently and cost-effectively. With a scheduling order required within 120 days of the complaint and a Rule 26(f) “meet and confer” conference required at least 21 days before that, there’s a lot to do and a short time to do it. Where do you begin? This CLE-approved* webcast will discuss the various issues to consider and decisions to be made to help you meet your discovery obligations in an efficient and proportional manner. Topics include:

    + What You Should Consider Doing before a Case is Even Filed
    + Scoping the Discovery Effort
    + Identifying Employees Likely to Have Potentially Responsive ESI
    + Mapping Data within the Organization
    + Timing and Execution of the Litigation Hold
    + Handling of Inaccessible Data
    + Guidelines for Interviewing Custodians
    + Managing ESI Collection and Chain of Custody
    + Search Considerations and Preparation
    + Handling and Clawback of Privileged and Confidential Materials
    + Determining Required Format(s) for Production
    + Timing of Discovery Deliverables and Phased Discovery
    + Identifying eDiscovery Liaison and 30(b)(6) Witnesses
    + Available Resources and Checklists

    Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • Initial Coin Offerings: Regulatory Analysis by Jurisdictions Worldwide
    Initial Coin Offerings: Regulatory Analysis by Jurisdictions Worldwide Angela Chartrand, Sarah Hody, Neal Reiter, Marco Santori Sep 27 2017 6:00 pm UTC 75 mins
    Initial Coin Offerings (ICOs), Token Sales, Token Generating Events (TGE) are now all the rage. They are on the news, on your LinkedIn feed, on Twitter hashtags, and even on the Legislators' agendas… The US, Canada, and China are at the forefront of ICOs regulation, either defining them, supporting them, or banning them; and this is why it is important to understand the regulatory compliance implications these crowdfunding modalities carry, the legal framework that applies, and how to prepare - compliance wise - for a successful ICO.

    With this in mind we’ve put together this AML regulations primer, a webinar with the little details you need to know and understand before you start your journey into crypto-land and prepare for your upcoming ICO.

    Join:
    Angela Chartrand - Founder at Sentinence,
    Sarah Hody - Associate at Perkins Coie,
    Marco Santori - Partner at Cooley, and
    Neal Reiter (Moderator) - Director of Product at IdentityMind Global, in discussing:

    - The Regulatory Framework in the US, Canada, China, and other countries around the world
    - How to know if you are a security
    - Jurisdiction questions between different Government Agencies
    - The benefits of a Regulatory Sandbox
    - What kind of compliance do you need to do?
  • Payment transaction monitoring use cases
    Payment transaction monitoring use cases Siti Chen, Senior solutions engineer, IR Sep 28 2017 6:00 am UTC 30 mins
    Monitoring POS or ATM transactions is complex. Hear the latest in how industry leading Prognosis software helps large Financial institutions monitor fraudulent activity and up-time across payments networks.
  • How to Prepare for Phase 2 HIPAA Compliance Audits
    How to Prepare for Phase 2 HIPAA Compliance Audits Joseph Kirkpatrick, Managing Partner, KirkpatrickPrice; Sam Abadir, Director of Product Management, LockPath Oct 3 2017 6:00 pm UTC 60 mins
    The U.S. Department of Health & Human Services Office for Civil Rights announced on March 21, 2016 that Phase 2 of HIPAA audits have officially begun. A year later, more than 200 desk audits have occurred, however covered entities and their business associates are still struggling to know what to focus on and in which areas they are lacking safeguards.

    In this webcast, KirkpatrickPrice’s Joseph Kirkpatrick and LockPath’s Sam Abadir will discuss the lessons learned from HIPAA enforcement actions to date and what to expect from the OCR in 2018. Attendees will discover:

    • Trends from Phase 1 and 2
    • Key takeaways from Phase 2 desk audits
    • What the delayed on-site audits means for 2018
    • What you can do to proactively prepare for that inevitable knock
  • How the US Secret Service combats advanced ransomware
    How the US Secret Service combats advanced ransomware Amar Singh, Mark Grantz, Chris Payne, Brian Laing, Ronny Wolf Oct 4 2017 2:00 pm UTC 60 mins
    Following on from our popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next", we bring to you our next special episode with US Secret Service Special Agent Mark Grantz.

    If you think criminals are bored of Ransomware, think again! The ransomware market is anything but boring. Criminals are continuing to flock to ransomware as the barriers to entry, RaaS or ransomware-as-a-service, make it easy for anyone to try their luck at digital extortion. The authors behind Cerber — currently the most prominent ransomware family — release updated variants every 8.4 days on average!

    Join Amar Singh, global CISO and CEO of Cyber Management Alliance and US Secret Service Special Agent Mark Grantz as they
     
    •Dig deep into the inner workings of advanced cyber criminal gangs
    •Share how law enforcement agents, like Mark Grantz, keep pace and take down these criminal outfits and police cyberspace.
    •Share best practice tips and strategies on securing your organisation.
     
    Joining Mark and Amar are Ronny Wolf from GFI, Brian Laing from Lastline and cyber and data privacy expert Chris Payne from Advanced Cyber Solutions.
  • Legal Landmines: How Changing Collection Laws Can Affect YOUR Business
    Legal Landmines: How Changing Collection Laws Can Affect YOUR Business Michelle Kreidler Dove, Esq. Oct 4 2017 4:00 pm UTC 60 mins
    The dynamic nature of collection rules and regulations has many businesses and healthcare facilities unclear as to how far they can go in pursuit of delinquent accounts. This free, on-demand webcast will educate and engage viewers with insightful tips for effectively and safely refining their internal collections practices.
    You’ll learn tips such as:
    How to ensure accurate and effective credit reporting
    Why recent changes in case law should have you rethinking your current processes
    What Important information should be included in your consumer agreement
    How you can work with your collection agency to maximize recoveries.

    Michelle Kreidler Dove, Esq., General Counsel and Chief Compliance Officer at IC System leads this engaging presentation that will answer your most pressing collections-law related questions. You’ll benefit by taking cues and lessons learned from the experts at I.C. System, a family-owned, Seventy-nine year old collection agency.
  • Achieving Operational Excellence in Omnichannel Retail
    Achieving Operational Excellence in Omnichannel Retail Vanessa Hodgkinson (Openbravo) Oct 10 2017 9:30 am UTC 60 mins
    Operational excellence is more important than ever in today’s omnichannel retail environment. Heightened customer expectations and competition across channels has led retailers to explore new strategies which support the evolution of physical stores and the multidirectional workflows required by omnichannel operations. Today’s retail software offers an indispensible tool for integrating the data, operations, and technology needed to manage operations in an omnichannel environment.

    What you will learn:
    This webinar reviews the main principles of operational excellence and the new operational challenges and processes demanded by omnichannel retail. You will learn how omnichannel has redefined operational excellence and how a modern commerce platform such as Openbravo can help you apply the principles of operational excellence and to make your omnichannel retail business thrive.
  • CLIENT UPDATE: SBA Updates Environmental Guidance with New SOP 50 10 5(J)
    CLIENT UPDATE: SBA Updates Environmental Guidance with New SOP 50 10 5(J) James Haberlen, Managing Director, Lender Solutions, EDR Oct 11 2017 5:00 pm UTC 60 mins
    EDR will share the late-breaking changes to the SBA’s SOP 50 10 5—the agency’s first update to its environmental guidance since 2014 (when it adopted the revised ASTM Phase I E 1527 standard). Speakers will share details on the changes coming out October 1 and effective in January 2018. Don’t miss this timely update on what this round of changes mean to the environmental due diligence required on any loans seeking the agency’s approval. Benefits:
    -what’s changing?
    -latest statistics on SBA lending volumes
    -a primer on SBA’s tiered process for environmental investigations

    Join us for the latest!
  • Running Oracle Software on POWER/AIX in the Skytap Cloud
    Running Oracle Software on POWER/AIX in the Skytap Cloud Mike Stone, CIO, House of Brick Technologies; Dan Jones, Director of Product Management, Skytap Oct 12 2017 4:00 pm UTC 60 mins
    In this session we will provide an overview of licensing Oracle programs using Infrastructure as a Service (IaaS) on POWER/AIX VMs in the Skytap Cloud. There is a lot of confusion around Oracle licensing, especially in virtualized or cloud environments. Many of the references to discussion points and legal challenges resulting from running virtualized x86 platforms apply directly to POWER environments as well.

    Key takeaways from this webinar include:

    - Skytap Cloud is an effective option for IaaS, including for Oracle-based POWER/AIX applications.
    - The use of POWER/AIX VMs for Oracle workloads in Skytap Cloud ensures that Oracle workloads stay running only on licensed processors.
    - Skytap Cloud provides support for Oracle licensing by allocating dedicated resources to Oracle workloads.
    - In an Oracle audit, usage of Skytap Cloud environments will be documented as if the LPARs or servers are part of the customer’s on-premises environment.
  • Take your Incident Response plan to a whole new level!
    Take your Incident Response plan to a whole new level! Gary Southwell, General Manager, CSPi & John Black, Cisco Oct 17 2017 3:00 pm UTC 45 mins
    In this webinar, join Cisco and CSPi as they discuss how automated breach notification takes Cisco’s incident response services to a whole new level. With FirePOWER and nVoy the incident response process can start immediately after a breach is verified and therefore be completed faster, in some cases the full impact of a breach can be determined in minutes.

    This can be extremely powerful for companies which rely on managed services providers for their cyber breach incident response strategy. With FirePOWER and nVoy Cisco’s IR professional services team will proactively monitor the solution for you and will receive email notifications when a potential incident is occurring against your organizations critical assets to trigger IR activity as per services contract.

    Shortening the breach identification and investigation phase provides several benefits:
    - Meet stringent data privacy compliance regulations, like GDPR
    - Focus efforts on effective forensic analysis and remediation
    - Limit breach exposure and the expenses related to handling breaches

    Up your incident response game!
  • Cultivating Your Strategic and Creative Thinking
    Cultivating Your Strategic and Creative Thinking Dr. Ted Marra Oct 18 2017 2:00 pm UTC 75 mins
    Join our guest, Dr. Ted Marra as he introduces his new leadership course in Global Risk Academy.

    During the webinar we will cover:

    How does a truly strategic organization think? What is strategic thinking versus strategic planning? What are the vital few factors that will determine your organisation’s long-term success or failure and are they on your radar screen?

    Who should attend.

    People with 10 years management experience minimum up to and including C-Level in all disciplines responsible for strategic decisions or large scale operational issues - so they have large budget and many people reporting to them.

    Managers and senior management from all areas of the organisation having responsibility for planning and achievement of key business objectives.

    Why you should attend.


    - Reflect on how you got where you are as an organisation;

    - What factors were critical to your success? What factors were the basis for your success?

    - What held you back – prevented you from being even more successful?
    - What could you have done differently


    Understand what are the most critical factors that will better ensure your organisation is a “winner” in the future (e.g., next 3-5 years).

    Find out which ones you may be missing and what to do about it before it’s too late and you become just an “average or good” organisation when, with a little effort and the right strategic thinking and creativity, you could take the organisation to the next level of performance and move toward “greatness”.

    How to build exceptional stakeholder relationships and why doing this is critical in especially in turbulent times.
  • What Chance Does an Organisation have in Post-Apocalyptic GDPR World?
    What Chance Does an Organisation have in Post-Apocalyptic GDPR World? Amar Singh & Chris Payne Oct 19 2017 1:00 pm UTC 60 mins
    With the greatest shake-up of data protection regulation in a generation looming, CISOs, DPOs and IT Administrators are busy planning for the changes needed for their organisations to be compliant. But with 60% of IT executives suggesting staff as their biggest threat to adherence (Bluesource, 2017) and 90% of staff admitting to violating policies designed to prevent security incidents (BSI, 2017), have they really addressed the issue of friendly fire?

    In this live, informative and interactive webinar led by Amar Singh, Global CISO & CEO of Cyber Management Alliance. A panel of data security and policy experts will discuss, why staff remain such an active threat to GDPR compliance, why policies are being ignored and how to ensure that your staff are on-board with the GDPR before May 2018.

    Panellists:

    Amar Singh, Global CISO & CEO, Cyber Management Alliance
    Chris Payne, Data Privacy Expert & Managing Director, Advanced Cyber Solutions
    Dominic Saunders, CTO and Co-Founder, NETconsent
    Joe Lee – UK and Ireland Commercial Manager, NETconsent
  • MiFID II and Call Recording Compliance
    MiFID II and Call Recording Compliance Alick Smith | Rhian McPhail Oct 24 2017 9:00 am UTC 60 mins
    MifID II is coming this webinar will cover off what you need to know from a call recording perspective.
  • Reduce Friction and Cut Compliance Costs with Digital ID Verification
    Reduce Friction and Cut Compliance Costs with Digital ID Verification Sarah Clark, General Manager- Identity, Mitek Systems Oct 25 2017 2:00 pm UTC 45 mins
    The latest EU Anti-Money Laundering directive will significantly increase the frequency with which financial service providers need to conduct ‘Know Your Customer’ (KYC) checks. To maximise the effectiveness of digital transformation initiatives, financial services and other regulated industries must find effective digital identity verification solutions.

    Current methods for identity verification checks place an enormous cost burden on banks, payments processors, and lenders, as most methods rely heavily on manual processes. Furthermore, these processes are cumbersome for users, driving away potential customers.

    Figuring out how to balance the competing needs of compliance and costs against the expectations of today’s digital native users is key to any financial service provider looking to win and retain new customers.
  • Using GRC to Tackle IT Risk Management
    Using GRC to Tackle IT Risk Management Sam Abadir, Director of Product Management, LockPath Oct 26 2017 4:00 pm UTC 60 mins
    As business becomes more digital, companies are finding that managing risk is becoming more and more chaotic and expensive. Adding to the complication, technology is often not solely managed by the IT department. Marketing, sales operations, department operations, support, and more are increasingly taking control of their own IT. Ensuring teams enterprise-wide are using best practices for IT, adhering to frameworks and regulations, and complying with their contractual obligations has escalated into a difficult battle – one with potentially large consequences if waged poorly.

    In this session you will learn:
    • How companies are bringing order to the chaos of IT risk management using integrated risk management tools like Keylight
    • Where your organization lives on an IT Risk maturity model
    • Tactical steps to take to make your IT risk management processes more efficient and effective
    • How your organization can manage and report IT risks to every role in the organization
  • Best Practices in Global Risk Management
    Best Practices in Global Risk Management Frank Cirillo, Dun & Bradstreet and Jack Scarpelli, Xerox Corporation Nov 8 2017 4:00 pm UTC 45 mins
    Join our webinar led by Frank Cirillo, Sr. Consultant Advanced Analytics, Dun & Bradstreet and Jack Scarpelli, VP North America Credit Risk Officer, Xerox Corporation. In this session, Frank and Jack will be discussing the growing trends toward globally consistent risk management, the barriers many face and steps that can be taken to overcome those barriers. As companies shift from decentralized, judgmental, manual processed to centralized, statistically-based, automated process, they will discuss the positive impact to KPIs and how to make it less overwhelming to execute on a global strategy.
  • Road to GDPR: Critical Data Privacy Compliance
    Road to GDPR: Critical Data Privacy Compliance Ilanko Subramaniam, Director - Risk, Compliance and Data Protection, Templar Shield; Shane Westrup, Manager, LockPath Nov 9 2017 5:00 pm UTC 60 mins
    GDPR compliance designed to protect personal information of EU citizens will be a complex and time-consuming undertaking for most organizations. The challenge is interpreting the regulation and incorporating the appropriate processes and technologies to protect personal data of EU employees. The discussions will start with establishing a Privacy program to support data strategy and drive a compliance roadmap. In this webinar, Templar Shield’s Ilanko Subramaniam and LockPath’s Shane Westrup will discuss the basic tenets of the General Data Protection Regulation, building out a data privacy and security program, and utilizing tools to help your organization establish the necessary framework to comply with this regulation.

    -----------------------------------------------------------------------------

    Disclaimer/No Attorney-Client Relationship/No Legal Advice
    The information presented is not legal advice or a legal opinion, and it may not necessarily reflect the most current legal developments. You should seek the advice of legal counsel of your choice before acting upon any of the information presented
  • Data security: Minimizing global risk, maximizing recovery
    Data security: Minimizing global risk, maximizing recovery Stewart Rogers, Director of Marketing Technology, VentureBeat Nov 16 2017 6:00 pm UTC 60 mins
    We’re certainly not going to get less connected, less global, or collect less data -- but data breaches are more common than ever; 4,000 were reported just last year. It’s time to figure out how to minimize risk, reduce vulnerabilities end-to-end, and most importantly, deal swiftly and decisively with any breaches that break through our carefully constructed barriers.

    And it’s more important than ever in the wake of the increased regulatory pressures, especially with the GDPR coming into effect in May 2018, and personally identifiable information (PII) becoming more broadly defined.

    Data security is a big task, but best practices are beating out the bad guys. A strategy in place means less collateral damage, quicker bounceback, and intact customer confidence.

    You’ll learn about:
    * End-to-end data protection in the payment industry
    * Repairing tanked customer relationships and reputations after a breach
    * What General Data Protection Regulation (GDPR) regulations mean for your company
    * What is the future of GLOBAL attacks and how do US-based companies address them?

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat
  • Hit F5: Does Your Risk Management Policy Need to be Refreshed?
    Hit F5: Does Your Risk Management Policy Need to be Refreshed? K.C. Conway, MAI, CRE, Economist, Counselor of Real Estate, Valuation Expert Dec 6 2017 6:00 pm UTC 60 mins
    This expert panel will take a candid look at the importance of robust risk management at this stage of the market cycle. Looking back, there have been important milestones in the evolution of risk management from the early days of “Phase I or no Phase I?” decisions based solely on loan size. Other areas—like the alignment of the appraisal function and environmental risk management function—are still evolving. As the market enters a phases of moderating property values, lenders should be turning a close eye on their risk management practices. The impact an environmental issue may have on a property’s value is more significant as prices decline. Risk managers who are being challenged to make a case for tighter underwriting will learn valuable ammo for explaining why ERM is more important than ever. Attendees will also learn more about the future direction of regulatory guidance to better reflect budding industry best practices.

    Moderator:
    K.C. Conway, MAI, CRE, Economist, Counselor of Real Estate, Valuation Expert
    Speakers:
    Michael Pereira, CHMM, VP – Environmental Risk Officer, Umpqua Bank
    Michael Kulka, Founder and CEO, PM Environmental, Inc.
    Duane Beck, Enterprise Accounts Director, Lender Solutions, EDR