Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Cómo situar al cliente en el centro con una estrategia orientada al servicio Cómo situar al cliente en el centro con una estrategia orientada al servicio Geoff Nairn Recorded: Feb 23 2017 46 mins
    Los clientes esperan cada vez más que los minoristas vayan más allá de la simple venta de productos para ofrecer también experiencias y servicios para sus estilos de vida. Los minoristas que puedan ofrecer con éxito una estrategia de venta más orientada al servicio podrán beneficiarse de varias formas. Pueden aumentar la rentabilidad al ofrecer servicios de mayor precio y margen, y reforzar la lealtad a la marca utilizando el servicio como un factor diferencial que es difícil de reproducir por parte de los competidores.
  • How to put the customer first with a service-oriented retail strategy How to put the customer first with a service-oriented retail strategy Geoff Nairn Recorded: Feb 23 2017 34 mins
    Customers increasingly look to retailers to go beyond simply selling products by also offering experiences and services for their lifestyles. Retailers that can successful deliver a more service-oriented retail strategy stand to benefit in several ways. They can increase profitability and wallet share by offering higher-margin services, and they reinforce brand loyalty using service as a differential factor that is difficult for rivals to reproduce.
  • Incident Response and GDPR. What You Need To Know. Incident Response and GDPR. What You Need To Know. Amar Singh Recorded: Feb 23 2017 60 mins
    Warning - this is not just another GDPR webinar. Join Amar Singh in his popular and interactive webinars and deep-dive into this special Cyber Incident Planning & Response webinar where we share and discuss the following:

    * - What are the key components to automate in incident management to enable GDPR compliance.

    * - Four important questions a CISO or Manager must ask to manage an incident successfully.

    * - Understand Process Automation for Incident Orchestration.

    * - How you can, using the technology and processes, build a lean, effective and knowledge Security team with or without a Security Operations Centre.

    * - Data Protection and Incident Response for the non-technical manager.

    * - How and why it's critical that middle and senior management, working with technical teams, get involved in delivering effective cyber incident planning & response.
  • Confusion or Clarity? Cross-Border Regulation of Derivatives Confusion or Clarity? Cross-Border Regulation of Derivatives Peter Green, Jeremy Jennings-Mares, Julian Hammar of Morrison & Foerster; Ali Hosseini, JP Morgan Recorded: Feb 22 2017 91 mins
    We will provide an update on cross-border derivative issues including recent developments in the US and the EU. Among the topics to be considered are:

    An update on the rollout of the margining rules relating to uncleared derivatives in both the US and the EU;

    Ongoing implementation of clearing requirements for OTC derivatives;

    What is the current position in relation to exchange trading of derivatives – in particular, what effect will Mifid II have in the EU?

    Where are we on substituted compliance/equivalence as between the US and the EU?

    Will Brexit and/or the new Trump administration have any effect on the international framework for derivative regulation?
  • Utilizing Blockchain in Contract Management - Featuring Gartner Research Utilizing Blockchain in Contract Management - Featuring Gartner Research Nigel Montgomery Research Director, Gartner and Monish Darda Co-founder and CTO, Icertis Recorded: Feb 22 2017 31 mins
    Contracts are the backbone of an enterprise. Blockchain technology will have important implications when it comes to contract management. Blockchain is becoming a new area of interest, from governments creating secure databases of land titles to consortiums of leading financial institutions working together to design new distributed ledger technologies.

    It is a brave new world and a lot of conversations are going on. Where will it go? What will the impact be? What will blockchain bring to contract management?

    In this webcast, we’ll answer these questions and more with two of the industry’s leading experts: Gartner Research Director, Nigel Montgomery, and Monish Darda, CTO and co-founder of Icertis.

    In the webcast, Nigel and Monish discuss:

    - The opportunity seen by enterprises, working together, to design new distributed ledger technologies

    - What will be the impact of blockhain related technologies?

    - What will blockchain bring to contract management?

    - What can you do now to prepare?
  • (ISC)2 Managing Director EMEA Adrian Davis Insights with Cyber Leaders (ISC)2 Managing Director EMEA Adrian Davis Insights with Cyber Leaders Amar Singh - Cyber Management Alliance Recorded: Feb 20 2017 41 mins
    (ISC)2 Managing Director EMEA Adrian Davis talks to Amar Singh about his top tips for CISSP aspirants and about hs personal journey and how he made it.
  • Introducción a la Suite de Comercio de Openbravo para minoristas especializados Introducción a la Suite de Comercio de Openbravo para minoristas especializados Xavier Places, Product Marketing Director en Openbravo Recorded: Feb 16 2017 58 mins
    La Suite de Comercio de Openbravo es una solución de gestión multicanal para minoristas especializados de tamaño medio y grande que buscan avanzar en su estrategia omnicanal. Desde una solución de tienda a un completo ERP minorista, ofrece una excelente relación calidad-precio y mayor flexibilidad de adopción, en las propias instalaciones o en la nube en Amazon Web Services.
  • KYC in the online age KYC in the online age Panel Discussion featuring: UK Cabinet Office, CurrencyFair, IOX & Mitek Recorded: Feb 16 2017 47 mins
    Financial institutions from all over the world are facing increasingly strict regulations regarding the verification and authentication of their customers’ identity. The imminent enforcement of the 4AMLD and the publication of the 5AMLD will nothing but add pressure on the financial services industry.

    To keep a competitive edge and still be compliant with the latest Anti-Money Laundering (AML) and Know Your Customer (KYC) regulations, banks, prepaid card operators, digital currency processors, exchanges, and wallets are being compelled to embrace the digitalisation of traditionally cumbersome processes such as customer due diligence and ongoing authentication.

    Aiming to simplify KYC in this ever-changing regulatory environment, and optimizing the digital channels for further security and convenience, financial institutions need to successfully achieve this change within their policies, procedures, business models, and technology infrastructures.

    During this webinar, our panel of experts will provide answers to the following questions:

    •Are the technologies to underpin digital identity verification reliable and robust enough for financial institutions to rely on them?

    •Are customers prepared to go down the digital route?

    •Can financial institutions strike the right balance between rock-solid compliance, and smooth, easy, digital customer experience?

    •How are financial institutions coping with the challenges posed by the latest regulatory updates?

    Join us for this panel discussion with our expert speakers:

    Don Thibeau, Chairman & President, The Open Identity Exchange (OIX)
    Fintan Byrne, Head of Risk & Chief Compliance Officer, CurrencyFair
    Sarah Clarke, General Manager - Identity, Mitek
    David Rennie, Identity Assurance Programme, UK Cabinet Office
  • Taming the "God" User Taming the "God" User Amar Singh and Joseph Carson Recorded: Feb 16 2017 60 mins
    Privileged IT users hold significant power in an organisation. They can delete, change or read emails and create, reset or change user accounts amongst other things. In many cases the privileged user can easily bring a business to its knees.

    Businesses may be aware of the scale of the privileged insider threat but efficiently managing these users often remains an aspiration. Join Amar Singh in this interactive webinar as he talks to privileged management expert Joseph Carson and discusses how you can expertly manage your privileged users.

    Cyber Management Alliance's webinars are highly interactive and have a higher than normal user interaction during the webinar. So, sign-up now and take this opportunity to ask, learn and share.
  • Introduction to the Openbravo Commerce Suite Solution for Specialty Retailers Introduction to the Openbravo Commerce Suite Solution for Specialty Retailers Vanessa Hodgkinson Recorded: Feb 16 2017 48 mins
    The Openbravo Commerce Suite is a multi-channel retail management solution for mid-size to large specialty retailers looking to advance their omnichannel strategy. From Store solution to complete Retail ERP, it offers excellent value for money and greater adoption flexibility, either On Premise or in the Cloud in Amazon Web Services.
    Openbravo Commerce Suite features a powerful web- and mobile-ready POS with a broad set of assisted sale capabilities as well as support for store and headquarters operations such as inventory management, financials and analytics.
    These functionalities are delivered through an intuitive, user-friendly and productivity-enhancing web interface – all built on a highly flexible technology platform that allows the solution to be tailored to any retailer-specific need.
  • Introduction to the Openbravo Commerce Suite Solution for Specialty Retailers Introduction to the Openbravo Commerce Suite Solution for Specialty Retailers Vanessa Hodgkinson Recorded: Feb 9 2017 1 min
    The Openbravo Commerce Suite is a multi-channel retail management solution for mid-size to large specialty retailers looking to advance their omnichannel strategy. From Store solution to complete Retail ERP, it offers excellent value for money and greater adoption flexibility, either On Premise or in the Cloud in Amazon Web Services.
    Openbravo Commerce Suite features a powerful web- and mobile-ready POS with a broad set of assisted sale capabilities as well as support for store and headquarters operations such as inventory management, financials and analytics.
    These functionalities are delivered through an intuitive, user-friendly and productivity-enhancing web interface – all built on a highly flexible technology platform that allows the solution to be tailored to any retailer-specific need.
  • Filtering within CloudNine Filtering within CloudNine Brian Kelly, Customer Success Manager, CloudNine Recorded: Feb 8 2017 2 mins
    A short demo of the filtering function within the SaaS-delivered eDiscovery automation software from CloudNine. CloudNine simplifies litigation, investigations, and audits for legal, compliance, and security pros by allowing them to upload, review, and produce documents from one platform within minutes. For a free trial, visit eDiscovery.co.
  • Contract Management Maturity - A Tool, an App or a Platform? Contract Management Maturity - A Tool, an App or a Platform? Andrew Bartels, Vice President & Principal Analyst, Forrester Research, Samir Bodas, Co-founder and CEO, Icertis Recorded: Feb 1 2017 61 mins
    It's time to re-evaluate your contract management strategy. Today's digital business world demands the latest contract management software, automation, and integration in the cloud. Contracts are the foundation of commerce touching every department and function across the enterprise. Contract lifecycle management (CLM) systems help firms create, execute and manage the contracts that define their relationships with their customers and suppliers.

    There are a number of options that companies can choose to get the most out of their current and future CLM implementations.

    In this webinar: Icertis CEO Samir Bodas and Andrew Bartels, VP and Principal Analyst at Forrester will discuss the pros and cons of the various approaches to meet your contract-related business goals.
  • Ready for GDPR? Learn about challenges and ways to comply Ready for GDPR? Learn about challenges and ways to comply CEO Richard Hibbert & Head of Products, Oliver Vistisen Recorded: Feb 1 2017 45 mins
    The GDPR comes into force 25 May 2018 and this will have a significant impact on the way in which organisations collect, process and share data. Companies that fail to prepare for the GDPR risk incurring hefty fines of 20m euros or 4% of world-wide revenues, whichever is greatest. As such all organisations need a strategy for GDPR. By implementing a structured approach through the use of cloud-based applications, organisations will be able to effectively achieve and maintain compliance.

    In this webinar we will: explore the key provisions of GDPR, examine the challenges organisations are facing with the new rules, provide guidance for Risk Managers, Compliance Leaders and other IT Professionals on how to approach these challenges, then demonstrate how our cloud-based GDPR Applications Suite can provide effective solutions that ensure your business can achieve and maintain compliance.
  • Rise to the GST Challenge in Indian Retail Rise to the GST Challenge in Indian Retail Hari Madhavan - Director ERP Practice - Promantia Global Consulting LLP (& Geoff Nairn) Recorded: Jan 31 2017 33 mins
    The Goods and Service Tax (GST) will radically reform India’s economy creating a common Indian market for goods and services, and bringing important benefits for retailers. For example, manufactured goods could become cheaper, logistics and inventory costs will fall, and the obstacles to e-commerce in India created by state restrictions and levies will reduce. GST has to be implemented by September 16 2017 at the latest, so time is running out for retailers that have not yet embarked on a strategy to make their practices and systems compliant with the new GST regime.
  • Privileged Access Management Executive Interview Jackson Shaw from Dell Privileged Access Management Executive Interview Jackson Shaw from Dell Jackson Shaw Senior Director, Product Management, Identity & Access Management at Dell Recorded: Jan 28 2017 7 mins
    We interviewed Jackson Shaw; Senior Director, Product Management, Identity & Access Management at Dell and delved further into the topic of Privileged Access Management.
  • Outpost for Relativity from CloudNine Outpost for Relativity from CloudNine Brad Jenkins Recorded: Jan 28 2017 9 mins
    Outpost for Relativity from CloudNine is an automated data loading service for Relativity that automatically ingests and loads data into Relativity based on your specified criteria.

    CloudNine’s eDiscovery automation integration provides Relativity users with a tool that accelerates the upload, processing, and ingestion of electronically stored information (ESI). This complementary capability allows Relativity users to immediately ingest ESI directly from their desktops and automatically move ESI into Relativity.

    Learn more about Outpost for Relativity from CloudNine at eDiscovery.co.
  • Why Tier Certification Is Even More Meaningful in a Hybrid IT World Why Tier Certification Is Even More Meaningful in a Hybrid IT World Keith Klesner, Senior Vice President, North America, Uptime Institute Recorded: Jan 25 2017 48 mins
    Data Centers are continuing to evolve and will remain at the core of digital infrastructure. Today’s global information economy depends on data centers like never before. Whether a data center is on premise, colocated or in the cloud, they are responsible for the entire online infrastructure of a company, and the data centers are crucial to business critical infrastructure. For more than 20 years, Uptime Institute has served as an independent advisory body to all stakeholders in the industry responsible for the performance and availability of IT systems. We’ve helped the world’s leading data center organizations design, build, maintain, and optimize their facilities, compute systems, and operations, while balancing costs, resources, performance, and efficiency in an ever changing technology landscape. Uptime has assisted hundreds of enterprises and service providers to ensure their data centers are ready to meet their business needs. Join us as we share our experiences and learnings for a hybrid IT world.

    Topics include:
    - The value of simplicity in data center design and construction for IT and facility operations
    - Concurrent maintainability as a “must have” as "live work or deferred maintenance" is no longer acceptable
    - Tier Certification as a risk management tool for project owners and data center services buyers
  • What Every Attorney Should Know About eDiscovery in 2017 What Every Attorney Should Know About eDiscovery in 2017 Doug Austin and Karen DeSouza, Esq. Recorded: Jan 25 2017 62 mins
    Managing discovery is more complicated and expensive than ever, with more data and documents to manage, new sources and types of data to consider, and changing Federal and State rules. As an attorney, what do you need to know today to stay on top of it all? This CLE-approved* webcast session will cover key terms, rules, duties, and case law to give you the tools and resources necessary to efficiently and effectively meet the challenging discovery obligations that attorneys will face in 2017.

    Webcast Highlights

    + Key Terms
    + Phases of the EDRM
    + Rules Regarding Electronically Stored Information (ESI)
    + Competency Ethical Duties of Attorneys Regarding eDiscovery
    + Top Ten Important Cases in the Evolution of eDiscovery Best Practices
    + Useful Resources for eDiscovery Continued Education

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which has become a trusted resource for eDiscovery news and analysis.

    
Karen DeSouza: Karen is the Director of Review Services, In-House Counsel, and a Professional Services Consultant for CloudNine. Also, Karen helps attorneys with CloudNine's software and Pre-Litigation Consulting Services. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence. Before CloudNine, Karen worked as an E-Discovery Director, Project Manager, and as an Associate at various law firms in Houston area where her primary focus was litigation.

    *Approved for MCLE in TX and FL (and selected states based on approval at time of webcast delivery).
  • The Softer Side of IT: Cultivating hard-to-find soft skills in today's workforce The Softer Side of IT: Cultivating hard-to-find soft skills in today's workforce Experis and Right Management Recorded: Jan 17 2017 60 mins
    IT leaders are increasingly uncovering the value of soft skills within their workforce. They’re telling us that soft skills—specifically communication and collaboration skills—can be as important as some technical competencies. What is causing increasing demands for soft skills in IT talent? How do IT leaders assess the soft skills of new recruits? Can these skills be developed in existing employees?

    During this webinar, you’ll hear experts from Experis and Right Management discuss the need for improved soft skills within today’s IT workforce and how IT leaders can ensure their workforce has the skills required to succeed in today’s world of work.

    By participating in this webinar, you will:
    Understand the increasing importance of communication and collaboration skills in IT roles today
    Gain greater insight from workforce experts about how to assess new IT recruits for soft skill proficiency
    Learn best-practice strategies for developing communication and collaboration skills within your team

    * NOTE: This event qualifies for 1 CPE credit.
    Experis is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org. Should this course need to be cancelled or rescheduled by Experis, a 24-hour notice will be provided. For more information regarding administrative policies such as complaint and refund, contact Learning & Development at 414-319-3400.
  • CISSP Exam Strategies CISSP Exam Strategies Amar Singh Cyber Management Alliance Recorded: Jan 11 2017 38 mins
    An exclusive interview with CISSP trainer Abhi G about his top tips for preparing for the CISSP exam. Download the CISSP Exam Plan worksheet from the attachments section on this page.
  • RegTech 101: Implementing a RegTech Solution in your Organization RegTech 101: Implementing a RegTech Solution in your Organization Jose Caldera, IdentityMind; Oscar Jofre, KoreConX; Juan Lozada, AML/CTF Expert; Lisa Dawson, BSA/AML Expert Recorded: Jan 11 2017 70 mins
    For corporations and financial institutions RegTech is the vehicle to decrease compliance costs, control risks, and minimize the potential for regulatory actions and fines, while gaining operational efficiencies from the automation of manual processes. For regulators, it is the bridge between reactive supervision of financial activities and proactive and preventive real-time monitoring of all market participants. And this is only the beginning; the potential of RegTech is far greater than we can appreciate presently.

    With such an outlook, it is important we understand what RegTech is, and what its not. How to leverage RegTech solutions in order to reap the benefits of automated compliance, monitoring, and risk management; and most importantly how we can implement such solutions in our organizations.

    As with any piece of new technology, the process of discovering, researching, choosing and implementing a RegTech solution is no task for the faint hearted. And, even though we do know the benefits far outweigh the costs, it wouldn’t hurt to have a guiding hand; a roadmap for your first RegTech implementation, and how to achieve successful onboarding.

    Join us for a walk down RegTech Lane. At the end of the webinar you will:

    - Have a clear concept of RegTech, its benefits and potential
    - Know what to take into consideration when researching RegTech solutions for your organization
    - Understand the hurdles to implement a RegTech solution
    - Have a list of action items necessary to overcome these implementation obstacles
  • Insights with Cyber Leaders - Eugene Kaspersky Insights with Cyber Leaders - Eugene Kaspersky Amar Singh Cyber Management Alliance Recorded: Jan 10 2017 24 mins
    An exclusive interview with Kaspersky Lab founder and CEO Eugene Kaspersky. Find out about how Eugene made it and his thoughts about the future of cyber security. The first in the series of Insights with Cyber Leaders videos created by Cyber Management Alliance featuring our CEO Amar Singh.
  • Threat intelligence and predictions for 2017 with Kaspersky Lab Threat intelligence and predictions for 2017 with Kaspersky Lab Amar Singh Recorded: Jan 6 2017 60 mins
    Join us to learn about the top predictions for 2017, as identified by Kaspersky Lab's Global Research & Analysis Team (GReAT). Gain the latest intelligence on the threat landscape and our predictions for 2017

    We face a future of increasingly subtle and sophisticated threat factors; a world where traditional clues and indicators are no longer enough on their own to identify and block attacks; where information is wielded as a weapon, misdirection is king, and global networks of connected devices can be used to paralyse the Internet. What does this mean for business in 2017?

    Kaspersky Lab UK's Principal Security Researcher, David Emm, shall present the Who, What, How and Why in Kaspersky Lab's predictions for 2017 and explain how they will affect the cyber-security landscape throughout the year.

    - Who: The business sectors we predict will be particularly targeted in 2017 and who will attack them.

    - What: The data, behaviour and habits that will expose businesses to increasingly sophisticated threat factors.

    - How: The technical methods through which businesses will be targeted.

    - Why: What Kaspersky predict to be the endgame of 2017's cyber-criminals.

    Hosted by Amar Singh
  • Designing the Foundations of a Secure Organisation - Cyber Management Alliance Designing the Foundations of a Secure Organisation - Cyber Management Alliance Amar Singh - Cyber Management Alliance Recorded: Jan 3 2017 58 mins
    There are almost 300 controls you could review and select for this year or you can view this webinar and hear what the experts have to say about the most essential controls and how to use them to lay the foundations of a secure resilient business. Let's design a more secure 2017 together.
  • Best Practices for Effective eDiscovery Searching Best Practices for Effective eDiscovery Searching Doug Austin and Karen DeSouza, Esq. Feb 28 2017 6:00 pm UTC 75 mins
    With all of the hype about Technology Assisted Review, does keyword search still have a place in eDiscovery? You bet it does – if it is conducted properly. This CLE-approved* webcast session will cover goals for effective searching, what to consider prior to collecting ESI that will be subject to search, mechanisms for culling prior to searching, mechanisms for improving search recall and precision, challenges to effective searching and recommended best practices for searching and validating your search results to ensure effective search results.

    Webcast Highlights

    + Search Fundamentals
    + Considerations Before Searching
    + Mechanisms for Culling Before and After Searching
    + Mechanisms for Improving Recall and Precision
    + Searching Considerations and Challenges
    + Using Sampling for Defensible Searching

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog.

    
Karen DeSouza: Karen is the Director of Review Services, In-House Counsel, and a Professional Services Consultant for CloudNine. Also, Karen helps attorneys with CloudNine's software and Pre-Litigation Consulting Services. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence. Before CloudNine, Karen worked as an E-Discovery Director, Project Manager, and as an Associate at various law firms in Houston area where her primary focus was litigation.

    * Approved in Selected States (To Be Published Prior To Webcast Delivery)
  • Most 2FA Solutions are Insecure, Is Yours One of them? Most 2FA Solutions are Insecure, Is Yours One of them? Amar Singh & Chris Payne Mar 1 2017 2:00 pm UTC 60 mins
    Everyone knows two-factor authentication right? or do you just know how to use it? Something you know and something you own is a phrase we can all recite but very few actually understand two-factor authentication and its true benefits. How it works, why two solutions are not alike or what to look for in a true secure solution are just some of the conversation topics covered in this webinar.
  • The Identity Economy: Evolving from Analog to Digital The Identity Economy: Evolving from Analog to Digital Jose Caldera, IDM- Travis Jarae, One World Identity- Blake Hall, ID.me- David Delouya, AlphaPoint- Srikant Movva, HSBC Mar 1 2017 7:00 pm UTC 75 mins
    Digital identities are the lifeblood of the modern digital economy

    As human activity migrates online, challenges for authenticating physical identities arise, while businesses and consumers look around for guidance.

    Increasing demand for answers to the identity verification dilemma was just one of the contributing factors for the emancipation of the identity space as an industry of its own, vertical-agnostic.

    With such an outlook, it is important to understand what a Digital Identity is, and their current role in our society. Furthermore, how to leverage the identities to build better business models, deliver better products and services; and most importantly, how to take the leap and hop on the Identity Evolution train - after all, you don’t want to get left behind.

    We know implementing new technologies, and changing your current operations and processes can be a challenge. And even though the benefits far outweigh the costs, it always helps to have a guiding hand. Today, that guiding hand comes as a framework to understand how digital identities play a beneficial role in each industry and YOUR business, so you can start the journey from analog to digital identities within your organization.

    At the end of the webinar you will:

    - Be able to differentiate physical from digital identities, and the attributes that shape them.
    - Appreciate the function digital identities play today, and their potential to help overcome present [and future] social and economic challenges.
    - Understand the role of Blockchain in the Digital Identity Ecosystem.
    - Recognize the business models that are placing identity at the center: Identity-as-a-Service, or Identity APIs - and how they can reshape the world as we know it.
    - Know WHY and HOW to make the leap over to digital identities within your business.
  • Industry Leader Interview - Top Five Regulatory Risk in Asia Industry Leader Interview - Top Five Regulatory Risk in Asia Kelly Ann McHugh Mar 3 2017 9:00 am UTC 30 mins
    ECN is pleased to be hosting an interview with Kelly Ann McHugh, Head of Regulatory Intelligence, Proposition – Asia Pacific and Japan for Thomson Reuters on the 3rd March at 9.am GMT to discuss the current state of financial regulation in Asia, the key risk areas that need to be considered and to explore the future of financial regulation and how new technologies could impact the way financial institutions manage risk and remain compliant particularly in the areas of KYC and AML.
  • Examining the ROI of Behavioral Biometrics Examining the ROI of Behavioral Biometrics Oren Kedem, VP, Product Management, BioCatch & Dr. Raphael Yahalom, Affiliated-Researcher, MIT Sloan School of Management Mar 7 2017 3:00 pm UTC 75 mins
    Behavioral biometrics has been getting a lot of attention lately as being able to uniquely address the challenges posed by social engineering, account takeovers and malware. By looking at the way people scroll, type, toggle between fields and use shortcuts, behavioral biometrics can help determine the authenticity of a user, not just which device or password was used to login. However, as an emerging technology, many questions remain on its effectiveness and how to calculate its ROI.
    In this webinar, you will learn:
    - What are the roles of filters in calculating ROI of behavioral biometrics
    - What are the parameters that make up an ROI model
    - How to adjust parameters to maximize ROI
  • Contract Management 2020: Out of the Trenches and Into a New Digital Era Contract Management 2020: Out of the Trenches and Into a New Digital Era Pierre Mitchell, Chief Research Officer, Spend Matters and Samir Bodas, CEO of Icertis Mar 9 2017 6:00 pm UTC 45 mins
    Contract Management can be complex with different expectations from Product, Legal, Finance, Procurement and Sales – each with specific needs. Join this dynamic discussion with Pierre Mitchell, Chief Research Officer, Spend Matters and Samir Bodas, CEO and Co-Founder, Icertis to learn how you can make sense of it all with the right software and digital tools.
  • How to Navigate the Seismic Shift in Buy Side Compliance How to Navigate the Seismic Shift in Buy Side Compliance Stephen Anikewich Head of Compliance NICE Actimize Mar 15 2017 2:00 pm UTC 60 mins
    Change is the new normal for the buy side. Accommodating expanding global regulations and your own evolving business model can be a significant compliance challenge. Join us to hear how buy side firms are addressing the challenge from experts at PWC, Aite and NICE Actimize on March 15th at 10.00am EST.

    During this Webinar we’ll discuss:

    • What's behind the shift in compliance regulations, and what to expect in the future
    • How are hedge funds and asset managers, like you, reacting
    • Why you should embrace the change
    • Lessons learned from peers
    • Choosing the right technology

    Presenters:
    Stephen Anikewich, Head of Compliance, NICE Actimize
    Danielle Tierney, Senior Analyst, Aite
    Harshad Pitkar, Partner, Financial Services – Risk and Compliance, PWC
  • Data Transfers under the EU GDPR - do you need to comply? Data Transfers under the EU GDPR - do you need to comply? GDPR Expert at White & Case LLP, Tim Hickman and CEO Richard Hibbert at SureCloud Mar 15 2017 3:00 pm UTC 60 mins
    Many organisations transfer personal data across borders to both EU and non-EU recipients. The EU General Data Protection Regulation (“GDPR”) imposes strict rules about how such data should be transferred, and applies to many unsuspecting non-EU organisations.

    Join Tim Hickman, GDPR Expert at White & Case LLP and Richard Hibbert, SureCloud CEO, to get the legal perspective on personal data transfers under the GDPR, and practical guidance on how this issue affects your business.

    In this webinar we will:

    Explain what constitutes a data transfer (you may be surprised).

    Identify the different types of data transfer (e.g., internal transfers within a corporate group; external transfers to service providers; etc.) and examine the implications for businesses.

    Examine the pros and cons of each data transfer mechanism (example consent, adequacy, Model Clauses, Binding Corporate Rules, etc.).

    Provide hints and tips on how organisations can prepare for data transfers under the EU GDPR.
  • Revenue Recognition Implementation: Beyond the Debits and Credits Revenue Recognition Implementation: Beyond the Debits and Credits Pam Henry, CPA, CGMA and Ladonna Johnson, CPA; both of Experis Mar 15 2017 4:00 pm UTC 60 mins
    Assessment and implementation of the new revenue recognition standard is in full force and moving beyond the assessment phase for many companies. This webinar will provide a high-level summary of the new revenue recognition standard focusing on implementation considerations including tax and internal control documentation and procedures, as well as disclosure requirements and examples of the new significant footnote disclosures. This webinar will go beyond the debits and credits and into specific areas that companies should focus on as they move toward the adoption date. The presenters will share their perspectives gained and other issues noted when advising clients on their assessment and implementations as well as noted within industry guidance.

    Presented by:
    Pam Henry, CPA, CGMA; Director – Denver Finance and Accounting Operations
    Ladonna Johnson, CPA; Senior Manager – Technical Accounting and Financial Reporting Center of Expertise
  • Realizing NexGen Enterprise Contract Management Value in Global Organizations Realizing NexGen Enterprise Contract Management Value in Global Organizations Michel Gahard, General Counsel, Nancy Gillespie, Solution Specialist, Microsoft, Niranjan Umarane, GM Product, Icertis Mar 23 2017 5:00 pm UTC 60 mins
    In this recorded webinar, you will learn about Microsoft’s experience in moving from a ‘patchwork’ of third-party and internal solutions, to a scalable, streamlined solution from Icertis.
  • Privilege: Shifting Sands, Protecting Information in Cross-Border Investigations Privilege: Shifting Sands, Protecting Information in Cross-Border Investigations Satindar Dogra (Partner, London) and Adam Lurie (Partner, Washington D.C.), Linklaters LLP Apr 5 2017 3:00 pm UTC 75 mins
    With cross-border enforcement on the rise, companies must consider what information, if any, to provide to various regulators. But that’s only the start of the challenge. Having decided to provide information, companies must carefully consider how to protect their privileged and otherwise protected information, including information subject to data protection law.

    This GIR Live webinar will break down these challenges as well as looking at various strategies that companies can take to protect that which is privileged or protected when interacting with regulators around the world.

    In the GIR Live style, the webinar will aim to be highly conversational and will include time for a question and answer session with the presenters.

    Issues to be addressed include:
    •How to protect privilege and data privacy during an internal investigation in response to a regulator.
    •How to interact with regulators while preserving privilege and data protection rules.
    • How do legal privileges and data privacy protections vary between key jurisdictions?
    •How does increasing cross-jurisdictional cooperation between regulators impact these considerations?
    •What recent developments should practitioners should be aware of?