Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • PCI DSS, GDPR & Data Security for Call Centers: Navigating Regulatory Landmines
    PCI DSS, GDPR & Data Security for Call Centers: Navigating Regulatory Landmines Scott Kaplan, Semafone, Chanley Howell, Foley & Lardner LLP Recorded: May 24 2018 56 mins
    With the onslaught of cyberattacks we've already seen in just this year alone, data security has never been a higher priority for organizations. Protecting customer data is of utmost importance, especially with governments and regulatory bodies increasingly turning their attention to these issues and producing legislation to implore companies to take additional security measures.

    Contact centers are a part of the organization particularly fraught with responsibility, serving as a vast repository of sensitive customer data and finding themselves to be a favorite target for hackers and fraudsters. Because of this, contact centers face a myriad of laws and regulations governing the way they treat this data, such as the PCI DSS for those taking payments, among many others.

    Register now to join Scott Kaplan from Semafone and Chanley Howell from Foley & Lardner LLP, two leaders in the data security field for an insightful webinar where you'll learn:

    - The top data security regulations, laws, and standards bodies affecting contact center data governance
    - How to comply with sometimes competing regulatory requirements and resolve conflicting stipulations
    - How to achieve compliance more simply and cost effectively

    Additionally, registrants will receive a free copy of Semafone's newly released Navigating the Challenging Regulatory Landscape in Your Contact Center.

    Reserve your space now!
  • Making Risk Meaningful
    Making Risk Meaningful Adam Billings, Lockpath Recorded: May 24 2018 44 mins
    How do you make sense of all that risk data your organization collects? Imagine not only analyzing risk data more efficiently but also bringing meaning to risk. It's possible. It takes leadership, alignment, standardization, and a clear risk methodology to discover connections in data. In this webinar, we'll share how to go about making risk meaningful. You'll learn:

    · Common methodologies for interpreting risk

    · Status of risk management in your organization

    · Frameworks and strategies for seeing risk in a new light

    · Keys to success in advancing your risk program

    There's no shortage of data collected. What's in short supply is, what does it all mean? Explore what works and what's possible in this educational webinar.
  • CECL Planning & Implementation: Smaller, Less Complex Financial Institutions
    CECL Planning & Implementation: Smaller, Less Complex Financial Institutions C. Michael Baron, Erik Mahlke, and John R. Fleming with Experis Recorded: May 24 2018 61 mins
    Issued by the FASB in 2016, the implementation dates for CECL (Current Expected Credit Loss) are approaching and it is essential that appropriate planning and implementation tasks start soon so that banks can be assured of meeting key milestones, most notable the objective of running parallel calculations for the year preceding the go live date. Proper CECL planning is a multi-discipline effort, requiring the time and effort of many of each bank’s accounting, risk and IT groups.
    This informative webinar will provide a practical overview of planning and implementation considerations facing smaller, less complex financial institutions, including coverage of the following topics:
    •Description of the CECL standard and comparison to the existing Incurred Loss Method (we will focus our discussion on the impact to the ALLL account)
    •Review of key planning and implementation tasks including guidance needed to establish timelines, key decisions that need to be made and how to leverage existing processes
    •Update on recent CECL developments including regulatory guidance on potential capital treatment and a description of the proposed auditing standard covering estimates

    Our presenters will share their perspectives and industry experience:
    C. Michael Baron (CIA, CISA, CFSA, AMLP)
    Regional Practice Director, Financial Services – Northeast

    Erik Mahlke
    Engagement Manager, Financial Services – Midwest

    John R. Fleming
    Technical Accounting SME, Financial Services - Northeast
  • Understanding the SEC’s Guidance on Cybersecurity Disclosures and Compliance
    Understanding the SEC’s Guidance on Cybersecurity Disclosures and Compliance Marty Dunn and Emily Beers, Morrison & Foerster; Suzanne Barr, Fannie Mae Recorded: May 24 2018 61 mins
    The US Securities and Exchange Commission (SEC) recently indicated it was intensifying scrutiny of public companies’ cybersecurity practices. In this webinar we will cover:
    - The latest SEC guidance on cyber risk disclosure and insider trading practices for public companies;
    - The impact of the guidance on public company disclosure regarding cyber risk disclosure;
    - Insider trading practices following the guidance; and
    - Recent SEC enforcement action regarding cyber risk disclosure.
  • GDPR: Cutting Through the Noise
    GDPR: Cutting Through the Noise Alex Jordan, Senior Analyst, ISF LTD Recorded: May 24 2018 47 mins
    Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.

    So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?

    Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:

    -The ISF’s phased approach to GDPR implementation
    -Ways to determine the criticality of data and how to protect it appropriately
    -The urgent actions that a business can take to get GDPR compliance started
    -Common myths surrounding the GDPR, and guidance on cutting through the noise.
  • GDPR: An Evolution, Not a Revolution
    GDPR: An Evolution, Not a Revolution Nicola Howell, Senior Compliance & Privacy Attorney at Dun & Bradstreet Recorded: May 24 2018 39 mins
    Feel prepared, not panicked, with our GDPR “need-to-knows” and tips for staying compliant beyond 25th May.

    Join our interactive session (part of the BrightTALK GDPR Deadline Day & Beyond Summit), to hear Nicola Howell, Senior Compliance & Privacy Attorney at Dun & Bradstreet, and Tash Whitaker, Head of Compliance at Moorcrofts LLP lead discussion on the following key topics:

    • Why the GDPR should be treated as an evolution, not a revolution, of current data protection laws

    • The crucial “need-to-knows” for compliance as the deadline approaches

    • Guidance on ongoing compliance monitoring and risk assessment – how to stay compliant past the 25th May deadline

    • Plus - live Q&A with our GDPR experts
  • DriveLock Managed Endpoint Protection aus der Cloud
    DriveLock Managed Endpoint Protection aus der Cloud Martin Mangold, DriveLock Head of SaaS Operations Recorded: May 24 2018 53 mins
    Herausforderungen moderner IT-Sicherheit - Es ist nicht damit getan, eine Security-Lösung anzuschaffen und zu installieren. Vielmehr muss eine solche Lösung regelmäßig an die aktuelle Bedrohungssituation und die jeweiligen Business-Bedürfnisse angepasst werden.
    Die Lösung - Managed Endpoint Protection von DriveLock
    Eine Ready2go-Sicherheitslösung, die keine eigene Server-Infrastruktur benötigt, erfordert nur niedrige Investitionskosten.
  • How Employees Fudge Their Expense Reports and How AI Can Stop It
    How Employees Fudge Their Expense Reports and How AI Can Stop It With Kathleen Walch and Ron Schmelzer, Managing Partners / Principal Analysts at Cognilytica Recorded: May 22 2018 33 mins
    Common examples of how employees look to take advantage of companies on their expense reports. Joined by the AI experts at Cognilytica.
  • New approaches to Low Carbon Investing
    New approaches to Low Carbon Investing Sam Gill Recorded: May 18 2018 42 mins
    With regulation to limit carbon emissions increasing worldwide, low carbon investment strategies are a hot topic among our members. Research from Engaged Tracking has shown that investment strategies that ‘tilt’ away from carbon-intensive companies towards more carbon-efficient ones have been outperforming the market.


    In this session we explore new approaches to low carbon investment, including:
    - Snapshot of the current market
    - Isabelle Delattre, CIO at Raymond James Asset Management, sharing insights on the process of designing a new ‘carbon momentum’ strategy
    - Engaged Tracking’s approach: designing new low carbon investment strategies


    Presenters:
    Sam Gill, CEO of Engaged Tracking
    Isabelle Delattre, CIO of Raymond James Asset Management International
  • Looking to the Future with CloudNine, Concordance and LAW PreDiscovery
    Looking to the Future with CloudNine, Concordance and LAW PreDiscovery Doug Austin Recorded: May 17 2018 66 mins
    This webcast provides an overview of CloudNine, the vision for our new robust suite of products and how they will extend and enhance your data and legal discovery efforts.

    Webcast Overview:

    CloudNine recently acquired the Concordance, LAW PreDiscovery and Early Data Analyzer platforms. So, who is CloudNine, why did they acquire these products and what is their vision for them going forward? This presentation and technology demonstration led by CloudNine Vice President and eDiscovery Daily Blog author Doug Austin will provide attendees an overview of CloudNine and its capabilities and how the newly acquired products fit into the vision for the future of eDiscovery technology at CloudNine.

    Presentation Highlights:

    + Who is CloudNine?
    + What We Do and How We Solve the Problems
    + Considerations for On-Premise, Off-Premise and Hybrid Approaches
    + What the Acquisition Means for Current On-Premise Customers
    + Looking to the Future with CloudNine Off-Premise and On-Premise Products

    Demonstration Highlights:

    + CloudNine Automated Legal Hold
    + CloudNine eDiscovery Platform (Upload/Process/Review/Produce)
    + CloudNine Automated Data Preservation and Collection

    Expected Duration: 60 Minutes Presentation + Q&A (As Required)

    CloudNine Software Showcase Presenter: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.
  • Do More to Safeguard Your Election Systems
    Do More to Safeguard Your Election Systems Srinivas Mukkamala and Chris Coyle Recorded: May 16 2018 30 mins
    Last month, Congress authorized $380 million in federal funding for states to improve and enhance election security. Do you have a plan to take full advantage your allotted funding?

    While the priorities for states differ, many experts are recommending careful consideration of cybersecurity improvements as your top priority.

    RiskSense would like to invite you to join us this webinar titled "Do More to Safeguard Your Election Systems". In this presentation we will discuss how to improve the security of your election systems, voter registration, and vote tabulation systems. We will suggest industry best practices to establish a more secure, scalable, and more sustainable approach to improving your state’s election security.
  • From BI to AI
    From BI to AI Naser Ali, Head of Solutions Marketing, Hitachi Vantara Recorded: May 16 2018 38 mins
    Business intelligence is evolving from traditional look-back analysis to forward-thinking prediction and prescription. Join Naser Ali of Hitachi Vantara in this webinar where he'll cover the following concepts:

    - Understanding why AI isn’t an academic pursuit or anything like traditional analysis
    - Why the value of AI comes from developing whole new processes
    - What to expect and when on the journey to predictive and prescriptive outcomes
    - A skills and infrastructure checklist
    - Plus: Gotchas - spotting the pitfalls and roadblocks
  • Cybersecurity and Law Firms: Understanding Legal and Ethical Obligations
    Cybersecurity and Law Firms: Understanding Legal and Ethical Obligations TCDI and EDRM Recorded: May 10 2018 62 mins
    Many have heard of the Panama and Paradise Papers where millions of sensitive documents were released to the public. Cybersecurity is not a new issue and the damage caused by attacks is rising exponentially each year. In fact, it is expected that cybercrime damages will reach 6 trillion dollars by 2021. Of the organizations targeted, law firms are seeing a rise in attacks due to the nature of the data they hold. In this presentation, a panel consisting of legal and technology experts, moderated by Tim Opsitnick of TCDI, will discuss the current trends in cyber attacks, why attackers are focusing on law firms and the techniques they implement, and the legal and ethical obligations a lawyer has in regard to protecting his or her clients' confidential data. Speakers include David Shonka, Former Acting General Counsel, Federal Trade Commission; Eric Vanderburg, Vice President, TCDI; and Kevin F. Brady, Of Counsel, Redgrave LLP.
  • Open Banking: Prioritise Privacy and Build Trust
    Open Banking: Prioritise Privacy and Build Trust Nick Caley Head of Financial Services & Regulatory ForgeRock Recorded: May 10 2018 52 mins
    Regulations like Open Banking, PSD2, and GDPR are an opportunity to reconsider your relationship with your customers. With breaches, data leaks, and the careless use of personal data constantly in the headlines, the need for trust is at an all time high. You need to prioritize privacy and make it a competitive differentiator in order to enable personalized products and services.

    In this webcast, Nick Caley, VP of Financial Services and Regulatory at ForgeRock will cover:

    * Current consumer attitudes and preferences around privacy and consent

    * The critical role of identity in building a trusted relationship with your customers

    * How the ForgeRock Identity Platform can help with consent management and strong authentication

    * Modern solutions including the Profile and Privacy Management Dashboard and User-Managed Access standard
  • Ask the Expert : Mobile communications recording in a post GDPR & MiFID II world
    Ask the Expert : Mobile communications recording in a post GDPR & MiFID II world Steve Haworth CEO, TeleWare, Andrew Fawcett, Product Manager, TeleWare, Nigel Simpson, Head of Sales, TeleWare, Mark Elwood, Recorded: May 10 2018 39 mins
    Tune in to the latest TeleWare webinar where you can ask our panel of experts about your mobile recording requirements. Find out:

    • The do’s and don’ts of mobile recording under MiFID II and GDPR
    • How are banks and other financial institutions deploying mobile recording?
    • How to get more value from your investment in mobile recording
    • Mobile recording and BYOD
    • Apps Vs SIM recording – which is right for your business

    This thought-provoking webinar will provide insights into these and other issues and help you pinpoint the main considerations in implementing a communications recording strategy for your business. With lots of opportunities to ask our experts, you can get the answers to your burning questions.
  • Looking to the Future with CloudNine, Concordance and LAW PreDiscovery
    Looking to the Future with CloudNine, Concordance and LAW PreDiscovery Doug Austin Recorded: May 8 2018 68 mins
    This webcast provides an overview of CloudNine, the vision for our new robust suite of products and how they will extend and enhance your data and legal discovery efforts.

    Webcast Overview:

    CloudNine recently acquired the Concordance, LAW PreDiscovery and Early Data Analyzer platforms. So, who is CloudNine, why did they acquire these products and what is their vision for them going forward? This presentation and technology demonstration led by CloudNine Vice President and eDiscovery Daily Blog author Doug Austin will provide attendees an overview of CloudNine and its capabilities and how the newly acquired products fit into the vision for the future of eDiscovery technology at CloudNine.

    Presentation Highlights:

    + Who is CloudNine?
    + What We Do and How We Solve the Problems
    + Considerations for On-Premise, Off-Premise and Hybrid Approaches
    + What the Acquisition Means for Current On-Premise Customers
    + Looking to the Future with CloudNine Off-Premise and On-Premise Products

    Demonstration Highlights:

    + CloudNine Automated Legal Hold
    + CloudNine eDiscovery Platform (Upload/Process/Review/Produce)
    + CloudNine Automated Data Preservation and Collection

    Expected Duration: 60 Minutes Presentation + Q&A (As Required)

    CloudNine Software Showcase Presenter: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.
  • Training Snapshot: Selecting Views with CloudNine
    Training Snapshot: Selecting Views with CloudNine Brian Kelley Recorded: May 3 2018 5 mins
    A snapshot demonstration of the process required to select user views within CloudNine to select a view that best fits with your workflow of reviewing documents.

    Workflows associated with reviewing documents in discovery can be varied, depending on the task to be accomplished during a review, the type of information needed to conduct the review effectively and the individual’s preferred style in conducting the review. CloudNine provides the ability for users to select from three different views of the data: 1) a vertical doc list view that enables you to see the document and metadata within a single screen navigated within a sequential list of documents, 2) a native tree view list that enables a drill down based on the organization of the data loaded and 3) a table view that enables you to view the metadata for multiple records on one form and the document on another form. These three options give reviewers a choice in selecting a view that best fits their workflow.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • Roadmap to Smarter Vendor Risk Management
    Roadmap to Smarter Vendor Risk Management Lockpath Recorded: May 3 2018 37 mins
    Vendors are essential to your company's success; however, they also add a layer of risk. A data breach is often traced to a service provider. A supplier botches a shipment and upsets a key customer. For risk challenges with vendors, the answer is proactive vendor risk management. In this webinar, you'll learn the roadmap to smarter vendor risk management, including:

    · Guidance on managing collected vendor data
    · Time-saving features with assessments
    · Tips on spotting trends and high-risk vendors
    · Pros and cons of continuous monitoring
    · Impact of vendor risk on operational risk

    Don't wait for an incident or a high-level exec questioning your vendor risk management processes to get smarter about vendor risk management. Learn smart strategies for the road ahead in VRM. Register for this webinar.
  • Looking to the Future with CloudNine, Concordance and LAW PreDiscovery
    Looking to the Future with CloudNine, Concordance and LAW PreDiscovery Doug Austin Recorded: May 2 2018 67 mins
    This webcast provides an overview of CloudNine, the vision for our new robust suite of products and how they will extend and enhance your data and legal discovery efforts.

    Webcast Overview:

    CloudNine recently acquired the Concordance, LAW PreDiscovery and Early Data Analyzer platforms. So, who is CloudNine, why did they acquire these products and what is their vision for them going forward? This presentation and technology demonstration led by CloudNine Vice President and eDiscovery Daily Blog author Doug Austin will provide attendees an overview of CloudNine and its capabilities and how the newly acquired products fit into the vision for the future of eDiscovery technology at CloudNine.

    Presentation Highlights:

    + Who is CloudNine?
    + What We Do and How We Solve the Problems
    + Considerations for On-Premise, Off-Premise and Hybrid Approaches
    + What the Acquisition Means for Current On-Premise Customers
    + Looking to the Future with CloudNine Off-Premise and On-Premise Products

    Demonstration Highlights:

    + CloudNine Automated Legal Hold
    + CloudNine eDiscovery Platform (Upload/Process/Review/Produce)
    + CloudNine Automated Data Preservation and Collection

    Expected Duration: 60 Minutes Presentation + Q&A (As Required)

    CloudNine Software Showcase Presenter: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.
  • Strategies for Monetising Open Banking
    Strategies for Monetising Open Banking Roger Vincent, Head of Partner Innovation, Equifax; Nick Cabrera, Director, Finance Edge Recorded: May 2 2018 38 mins
    Roger Vincent, Head of Innovation with Equifax will share his insights on making the most of Open Banking and his lessons learned along the way.

    In this webinar Roger will talk about:

    * How increased use of open APIs is likely to shape the financial services market, why challenger banks are making headway, the big banks are building partnerships and the impact of APIs among payment service providers.
    * Activities banks need prioritise in the wake of Open Banking; starting with compliance & legal issue and why they need to assess time/resources carefully before trying to deploy solutions.
    * Which strategies are likely to thrive in the new environment and how regulatory compliance can quickly be turned into competitive advantage to commercialise Open Banking.
    * Overcoming security and privacy concerns associated with data sharing and the implementation of GDPR.
    * Strategies to encourage customer engagement by using Open Banking applications to enrich user experience to create long term value over short term revenue.
  • Training Snapshot: Creating Fields with CloudNine
    Training Snapshot: Creating Fields with CloudNine Brian Kelley Recorded: Apr 27 2018 10 mins
    A snapshot demonstration of the process required to create new user metadata fields within CloudNine to track and classify documents and the review and production process.

    Classifying documents as responsive, non-responsive or privileged and recording and tracking information about the documents during the review and production process is key to effective management of the discovery process as a whole. CloudNine provides the ability for users to create their own metadata fields and share those created fields with other users (if desired) to track and classify documents and manage them throughout the review and production process.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • Finding Meaning in Security Metrics
    Finding Meaning in Security Metrics Mike Gerdes, Director, Information Security Center of Expertise, Experis US, Inc. Recorded: Apr 26 2018 62 mins
    The Internet has brought about dramatic changes in the structure, methods and operational capabilities of businesses, and how they interact with their customers, suppliers and communities. Along with the business benefits of the technological advances has come a demand for better security governance, operational risk and performance information to support business decisions and resource allocations. Unfortunately, many security metrics become shelfware or are routinely ignored because the recipients find little value in the measures, metrics and other report contents they routinely receive.
    This session will:
    •describe the various types and uses of metrics
    •establish some common attributes of meaningful metrics
    •discuss the importance of differentiating metrics by audience
    •describe a process for developing meaningful metrics
    •discuss the importance of performing periodic reviews and updates.

    Participants will gain a better understanding of meaningful security metrics and be able to:
    •Recognize some common impediments that prevent metrics from providing value
    •Move beyond the metrics status quo to a portfolio of meaningful metrics
    •Discriminate the security metrics provided based on audience attributes and needs
  • ¿Listo para el reto omnicanal en el comercio minorista deportivo multimarca?
    ¿Listo para el reto omnicanal en el comercio minorista deportivo multimarca? Xavier Places, Director de Marketing, Openbravo Recorded: Apr 26 2018 56 mins
    Revisaremos los principales desafíos a los que se enfrenta el sector minorista multimarca deportivo en la actualidad, como nuevos hábitos de los compradores omnicanal, una mayor complejidad del surtido y la creciente competencia, tanto en línea desde el comercio electrónico como fuera de línea con marcas que han pasado de ser principalmente empresas mayoristas a poderosos gigantes minoristas.

    Aprenda cómo Openbravo puede ayudar a los minoristas multimarca deportivos a competir mejor en este entorno, mejorando la calidad de las previsiones de ventas, por ejemplo, consiguiendo una más fácil y rápida introducción de nuevos productos o mejorando el servicio al cliente con una solución de punto de venta móvil.
  • Ready for the Omnichannel Challenge in Multi-brand Sports Retailing?
    Ready for the Omnichannel Challenge in Multi-brand Sports Retailing? Xavier Places, Marketing Director, Openbravo Recorded: Apr 26 2018 54 mins
    Review the main challenges that the multi-brand retail sector faces today such as the changed purchasing habits of omnichannel shoppers, greater assortment complexity, and the growing competition, both online from e-commerce pure-plays and offline from brands that have shifted from being primarily wholesale companies to powerful retail giants.

    Learn how Openbravo can help multi-brand retailers compete better in this more challenging environment, by improving the quality of sales forecasts, for example, or making it quicker and easier to introduce new products, or improving customer service with mobile POS.
  • Getting Off the Sidelines and into the Game using Technology Assisted Review
    Getting Off the Sidelines and into the Game using Technology Assisted Review Doug Austin and Tom O'Connor Recorded: Apr 25 2018 63 mins
    The use of Technology Assisted Review (TAR) has been accepted in the courts for several years, but most lawyers still don’t use it and many still don’t know what it is or how it works. Why not? Are the terms TAR and predictive coding synonymous or are there other forms of TAR that can also facilitate review? This CLE-approved* webcast session will discuss what TAR really is, when it may be appropriate to consider for your case, what challenges can impact the use of TAR and how to get started. Topics include:

    + Understanding the Goals for Retrieving Responsive ESI
    + Defining the Terminology of TAR
    + Different Forms of TAR and How They Are Used
    + Acceptance of Predictive Coding by the Courts
    + How Big Does Your Case Need to Be to use Predictive Coding?
    + Considerations for Using Predictive Coding
    + Challenges to an Effective Predictive Coding Process
    + Confirming a Successful Result with Predictive Coding
    + How to Get Started with Your First Case using Predictive Coding
    + Resources for More Information

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • eDiscovery for the Rest of Us
    eDiscovery for the Rest of Us Doug Austin and Tom O'Connor May 30 2018 5:00 pm UTC 75 mins
    Does it seem like eDiscovery technology today is only for the “mega-firms” and “mega-cases”? What about for the “rest of us”? Are there solutions for the small firms and cases too? What does the average lawyer need to know about eDiscovery today and how to select a solution that’s right for them? This CLE-approved* webcast will discuss what lawyers need to know about eDiscovery, the various sources of data to consider, and the types of technology solutions to consider to make an informed decision and get started using technology to simplify the discovery process. Topics include:

    + How Automation is Affecting All Industries, including eDiscovery
    + Drivers for eDiscovery Automation Today
    + Challenges from Various Sources of ESI Data
    + Ethical Duties and Rules for Managing Discovery
    + Getting Data Through the Process Efficiently
    + Small Case Examples: Ernie and EDna
    + Key Components of an eDiscovery Solution
    + Types of Tools to Consider
    + Recommendations for Getting Started

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Ready for the Omnichannel Challenge in Consumer Electronics Retailing?
    Ready for the Omnichannel Challenge in Consumer Electronics Retailing? Vanessa Hodgkinson, Openbravo May 31 2018 9:30 am UTC 60 mins
    We will review in this webinar the main challenges facing electronics retailers today, such as the fast-changing purchasing habits of omnichannel shoppers, greater assortment complexity, and the growing competition from online players. To stay competitive, retailers must make a step change in agility and innovation in their retail operations, adopt greater pricing and discounting agility, and put a sharper focus on customer service.

    We will discuss how Openbravo can help these retailers achieve greater competitiveness in this more challenging environment, with tools like mobile POS with integrated RFID or mobile payment options. We will explain how Openbravo can help you achieve more accurate sales forecasts and gain enterprise-wide real-time inventory visibility with advanced warehouse management capabilities from mobile devices.
  • IdentityMind 2.0: How our Clients Helped us Shape Transaction Monitoring
    IdentityMind 2.0: How our Clients Helped us Shape Transaction Monitoring Faisal Nisar – Director of Products, IdentityMind Jun 6 2018 6:00 pm UTC 45 mins
    Transaction monitoring is required to meet AML and counter-terrorist financing (CTF) regulations. A good program can dynamically select the right sources of information to catch suspicious activity without bogging down compliance analysts with manual work. Many companies are still using dated or custom-built software which won’t pass muster with regulators, and make it harder to get that balance right. The best compliance programs take a risk-based approach, employing more stringent measures for higher-risk clients, while employing more lenient measures for trusted clients.

    With IdentityMind 2.0, we partnered with our clients to incorporate a highly accurate risk-based approach into our platform. IdentityMind 2.0 harnesses machine learning and time series anomaly detection to reduce false alerts, to increase automation, and to deliver a complete solution for your AML needs.

    Register for our webinar to see:

    • How we worked closely with our clients and incorporated their feedback into creating a powerful transaction monitoring tool in IdentityMind 2.0
    • How IdentityMind 2.0 allows you to implement a risk-based approach, in keeping with regulatory guidance
    • The benefits of moving to a user-first system for transaction monitoring analysis and investigation
    • How our pioneering work in digital identities underpins everything in the platform, delivers more accurate insights, and protects your business from fraudulent and criminal activity
  • LIVE DEMO - Securing your Open Banking API implementation
    LIVE DEMO - Securing your Open Banking API implementation Isabelle Mauny, CTO & Co-Founder, 42Crunch Jun 7 2018 3:00 pm UTC 60 mins
    .During this practical webinar, you will learn:
        
    1. Why TLS and OAuth2 are not enough to secure your APIs
    API Security has a much wider spectrum and even if you are using OAuth today, you may not use it in a way that is adapted to the risk taken when exposing Open banking APIs. What about API attacks protection ? PKCE ? Message confidentiality and integrity ? 

    2. Why API security must be declared and not coded
    Developers should not have to master security standards such as OAuth and OpenID Connect and try to implement them properly into their APIs. Instead, they should rely on proven, reliable policies approved by the bank’s security team and simply apply those policies on top of their APIs.

    3. How declarative security helps with consistency and automation
    42Crunch's innovative tagging mechanisms can be used by developers to express security constraints on top of their Open API definitions (aka Swagger). Those tags are translated automatically, either via the UI or in the CI/CD pipeline into policies which are applied on APIs requests/responses, making it possible to apply security as early as possible in the API lifecycle and find security vulnerabilities early.

    4. How to enforce security in a scalable way using micro-firewalls
    We will show how to deploy the 42Crunch API Firewall at run-time whether on premises, in the Cloud or in a hybrid environment and how to monitor the system through real-time security dashboards.
  • Why IAM Built on Open-Standards is the Key to Open Banking
    Why IAM Built on Open-Standards is the Key to Open Banking Rob Otto, EMEA Field CTO, Ping Identity; Ralph Bragg, Senior Partner, RaiDiAM Jun 13 2018 9:00 am UTC 60 mins
    Security, Compliance and User Experience - Why Identity Access Management Built on Open-Standards is the Key to Open Banking

    Learn how identity & access management (IAM) solutions, built on open standards, can help meet the technical requirements of PSD2 and Open Banking, including secure XS2A (access to accounts), Strong Customer Authentication (SCA), Dynamic Linking, and Consent Management, all while providing a seamless user experience and distinct competitive advantage.
  • Security Awareness - Sicherheitsbewusstsein aller Mitarbeiter schärfen
    Security Awareness - Sicherheitsbewusstsein aller Mitarbeiter schärfen Martin Mangold, DriveLock Head of SaaS Operations Jun 14 2018 9:00 am UTC 60 mins
    Zusätzlich zu Angreifern von außen stellt das Verhalten von Mitarbeitern eine Gefahr für Unternehmen dar. Deswegen muss das Sicherheitsbewusstsein aller Mitarbeiter geschärft werden, um das Risiko von internen Bedrohungen zu minimieren. Das Aufgabenfeld von Sicherheitsteam steigt somit weiter an.
  • How well is your sanctions compliance process working?
    How well is your sanctions compliance process working? Huntswood, SWIFT Jun 14 2018 12:00 pm UTC 60 mins
    Join SWIFT and Huntswood for an interactive discussion to help you address your sanctions compliance challenges.

    In many markets regulators now require you to screen transactions and customers against a number of rapidly evolving sanctions lists.

    Automated filtering tools, while effective, will generate false positives and false negatives. Follow up investigations must be conducted manually, which is time consuming and risky.

    This webinar will explain how implementing best practices can help you fulfil auditing and transparency requirements while also improving operational efficiency and reducing costs.

    In addition, we will cover how to:

    - Address evolving sanctions regulatory requirements
    - Simplify conversations with regulators
    - Balance internal resources for effectiveness and efficiency
    - Optimise global and internal list management
    - Upgrade your screening platforms without disrupting business operations

    Meet the panellists

    - Graham Hooper, Huntswood FCR Advisory Panel Member (formerly Director of Financial Crime Risk at Lloyds Banking Group)
    - Stephen Elliot, Managing Director of Financial Crime, Information and Payments, Huntswood
    - Tony Wicks, Head of AML and Fraud Prevention Initiatives, SWIFT (moderator)

    Date: Thursday, 14th June | Time: 13:00 GMT

    Not sure you can join? You can still register as we will be sharing the recording following the event.
  • How Exclusion Risk Impacts Healthcare Providers and How to Manage It
    How Exclusion Risk Impacts Healthcare Providers and How to Manage It Scott Steinhardt - Kinney Services, Chris Swift, Lockpath Jun 21 2018 4:00 pm UTC 60 mins
    For healthcare providers that receive Medicare and Medicaid reimbursements, managing exclusion risk is critical. Employees, business associates, suppliers, and more who land on state exclusion lists while employed or engaged by a provider can result in severe regulatory penalties. In this educational webinar, Lockpath and Kinney Services will guide you through the world of exclusion risk and point out what you need to know.

    Attendees will learn:

    * A definition of exclusion risk with real-world examples
    * Challenges encountered with managing exclusion risk
    * Strategies for implementing a consistent, repeatable review process
    * Technology's role in streamlining exclusion risk management

    Are you continually reviewing the exclusion status of employees and business entities? If not or reviews are conducted haphazardly, you run the risk of regulatory penalties and a potential crisis in the reimbursement process. Discover what you need to know to managing exclusion risk in this educational webinar.
  • Laptop verloren, Firmendaten futsch – Sensibilisierung von Mitarbeitern
    Laptop verloren, Firmendaten futsch – Sensibilisierung von Mitarbeitern Andreas Fuchs, DriveLock Product Manager Sep 18 2018 9:00 am UTC 60 mins
    Unternehmen stehen in der Pflicht, sowohl ihre eigenen Daten als auch die Daten von Dritten zu schützen. Dies gilt natürlich bereits heute und verschärfte sich mit dem 25. Mai 2018 nochmals, als die neue Datenschutz-Grundverordnung (EU-DSGVO) in Kraft getreten ist, die empfindliche Bußgelder in Höhe von bis zum 20 Millionen EUR oder 4 % des weltweiten Umsatzes vorsieht. Unternehmen sollten sich und ihre Mitarbeiter daher mit geeigneter Security schützen sowie regelmäßige Schulungen und klare Sicherheitsrichtlinien implementieren. Aber auch die Mitarbeiter sind in der Verantwortung. Aktives Fragen, Informieren oder die Teilnahme an Security-Schulungen helfen, Schaden und die persönliche Haftbarkeit auf ein vertretbares Maß zu reduzieren.
  • BadUSB - Die Maschine gehorcht jedem, der mit ihr redet
    BadUSB - Die Maschine gehorcht jedem, der mit ihr redet Mario Schwalm, DriveLock Senior Manager PreSales Sep 25 2018 9:00 am UTC 60 mins
    Für Hacker und Spione ist es ein Leichtes, Industrieanlagen zu kapern. Erfahren Sie wie Sie sich davor schützen können.
  • Die Top 3 der aktuellen Sicherheitsgefahren: Malware, Phishing, Menschen
    Die Top 3 der aktuellen Sicherheitsgefahren: Malware, Phishing, Menschen Andreas Fuchs, DriveLock Product Manager Oct 2 2018 9:00 am UTC 60 mins
    Passwörter auf der Schreibtischunterlage notieren, Viren-verseuchte Anhänge öffnen oder einfach mal die Tastatur mit Kaffee fluten – Mitarbeiter können einem Unternehmen ganz schön zusetzen.
    Die drei größten Sicherheitsrisiken im Unternehmen bleiben Malware, Phishing-Attacken und unbeabsichtigtes Fehlverhalten von Anwendern.
  • Das Internet of Things ist kein Kindergeburtstag
    Das Internet of Things ist kein Kindergeburtstag Mario Schwalm, DriveLock Senior Manager PreSales Oct 18 2018 9:00 am UTC 60 mins
    Der Siegeszug des Internet of Things (IoT) scheint unaufhaltbar – ebenso wie die nachschwappende Sicherheitslückenwelle.
    Der Grund dafür ist die immer noch stiefmütterliche Behandlung bei der Absicherung der jeglicher Endgeräte.
    Der Trend macht vor keiner Branche halt und sorgte in der Vergangenheit vor allem bei Kinderspielzeug für Aufregung.
  • Security in the Golden Age of Cloud
    Security in the Golden Age of Cloud Steve Durbin, Managing Director, ISF LTD Oct 23 2018 12:00 pm UTC 45 mins
    Demand for cloud services continues to increase as the benefits of cloud services change the way organisation manage their data and use of IT.

    However, while these services can be implemented quickly and easily, with increased legislation and data privacy, the threat of cyber theft is on the increase and organisations must have a clear understanding of where their information is stored and how reliant these services are.

    In this webinar, Steve Durbin, Managing Director of the ISF will discuss the risks associated with cloud computing and how to manage them, as well as how to maximise the benefits.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • IoT-Risiken im Unternehmen. Tipps wie man sicher bleibt.
    IoT-Risiken im Unternehmen. Tipps wie man sicher bleibt. Marc Lemarquis, DriveLock Director PreSales / Professional Services Oct 25 2018 9:00 am UTC 60 mins
    Es mag noch so innovativ klingen. Das Phänomen Internet der Dinge (Internet of Things, IoT) erhöht jedoch die Sicherheitsrisiken für Unternehmen und Verbraucher gleichermaßen. Ein Gerät mit einem Betriebssystem, das sich zum Internet verbindet, lässt sich nun mal auch potenziell kompromittieren. Ultimativ endet das möglicherweise in einer Hintertür, mit der sich in Unternehmens-Netzwerke eindringen lässt.
  • „Hello World!“– Wenn Hacker Ihren Computer übernehmen.
    „Hello World!“– Wenn Hacker Ihren Computer übernehmen. Mario Schwalm, DriveLock Senior Manager PreSales Nov 6 2018 10:00 am UTC 60 mins
    „Hello World!“ – Hacker übernehmen die Kontrolle über das Endgerät.
    Über Schwachstellen ist es Kriminellen möglich, sich Kontrolle über den Computer zu verschaffen.
  • Endpoint Security aus der Cloud: Ersetzen von herkömmlichem AntiVirus
    Endpoint Security aus der Cloud: Ersetzen von herkömmlichem AntiVirus Martin Mangold, DriveLock Head of Cloud Operations Nov 22 2018 10:00 am UTC 60 mins
    Moderne Angriffe wie Ransomware und erweitertes Phishing werden immer häufiger. Angriffe der "nächsten Generation" erfordern Endpoint Protection Lösungen die solche Angriffe stoppen, mehr Bedrohungen erkennen kann als herkömmliche Lösungen. Endpoint Protection Lösungen, die speziell für die Verwendung von Cloud-basierten Analysen entwickelt wurden, ermöglichen einen noch dynamischeren und proaktiveren Ansatz für die Endpunktsicherheit.
  • Ransomware bleibt ein Problem – nicht nur für Windows
    Ransomware bleibt ein Problem – nicht nur für Windows Falk Trümner, DriveLock Senior PreSales Consultant Dec 11 2018 10:00 am UTC 60 mins
    Ransomware hat Unternehmen und Privatanwender letztes Jahr auffällig zugesetzt. Das BSI kommt nach seiner Analyse von Daten aus April bis Oktober 2017 zur Prognose, dass auch dieses Jahr von Ransomware und Ransomware as a Service (RaaS) inkl. Do-it-yourself-Bausätzen geprägt sein wird. Neben Windows müssen sich zukünftig allerdings auch Linux, Mac und Android User wappnen.