Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Business Continuity Management and Resiliency for 2020 and Beyond
    Business Continuity Management and Resiliency for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Oct 17 2019 48 mins
    Business interruptions can hurt an organization's reputation, decrease revenue and loose customer trust. Business continuity and resiliency plans detail the impact of various disaster scenarios and creates a solution for ensuring critical operations remain open during a crisis.

    In this live webinar, Lockpath’s Sam Abadir will share what business continuity and resiliency management for 2020 and beyond looks like, including:

    • What areas business continuity management and resiliency encompasses

    • How your organization can gain efficiency from proper business continuity and resiliency management

    • Advantages of managing business continuity and resiliency on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage business continuity and resiliency in 2020 and beyond by attending this educational webinar. Register now!
  • Are you banking Marijuana-Related Businesses?
    Are you banking Marijuana-Related Businesses?
    Niki Pryor, Verafin Recorded: Oct 11 2019 24 mins
    Presented by Verafin

    FinCEN’s 2014 guidance outlines BSA obligations including SAR filing requirements for banking Marijuana-Related Businesses (MRBs). Whether or not your institution chooses to bank these businesses, it is imperative to your compliance program that you identify all potential MRBs in your customer base, even if they did not self-identify at account opening.

    To ensure you identify all potential MRBs in your existing customer base and complete the due diligence necessary to understand the nature of business — you likely have to rely on time-consuming manual reports and keyword searches.

    This 20-minute session details strategies to overcome the challenges of identifying high-risk customers for more effective due diligence, targeted monitoring, and enhanced reporting. Learn how Verafin uses artificial intelligence and open-source data in high-risk customer finders to automatically identify Marijuana-Related Businesses.

    Highlights of this 20-minute presentation:

    - Review of highlights from FinCEN Guidance, including red flags, due diligence requirements, and compliance obligations for Marijuana-Related Businesses.
    - Discussion on the challenges of identifying Marijuana-Related Business in your existing customer base, who did not self-identify at account opening.
    - Overview of the benefits of an Intelligent Segmentation approach to your high-risk customer management program with a focus on MRBs.
    - How to get alerted to Marijuana-Related Businesses and other high-risk customers in your existing customer base with Verafin’s high-risk-finder analysis.
  • Fuzzing Infotainment Systems and Telematics Units With Agent Instrumentation
    Fuzzing Infotainment Systems and Telematics Units With Agent Instrumentation
    Dennis Kengo Oka, Senior Solutions Architect, Synopsys & Rikke Kuipers, Product Manager, Synopsys Recorded: Oct 8 2019 58 mins
    In the past few years, cybersecurity has become more intertwined into each step of the automotive development process. In particular, fuzz testing has proven to be a powerful approach to detect unknown vulnerabilities in automotive systems. However, with limited instrumentation, especially on systems such as in-vehicle infotainment (IVI) system and telematics units, there are several types of issues that go undetected, such as memory leaks and cases where the application crashes but restarts quickly. Since these systems are typically based on operating systems providing more functionality such as Linux and Android, it is possible to use appropriate tools to collect additional information from the system under test (SUT) to determine whether there were any exceptions detected during the fuzz testing. Furthermore, it would be possible to gather more details about the detected exceptions on the SUT which helps developers to better understand and identify the root cause of the issues and fix the problems more efficiently. To this end, we introduce the Agent Instrumentation Framework and explain how it can be used to improve fuzz testing of IVIs and telematics units. We show how additional information can be collected from the target system and used to identify whether there are exceptions on the SUT and additionally help developers identify the underlying cause of any issues detected. Finally, to showcase the effectiveness of the agent instrumentation framework we built a test bench based on this approach and performed fuzz testing on multiple SUTs. Based on our findings we highlight several examples of issues that would have not been detected unless we used agent instrumentation.
  • Crime Rings: The Intersection of Fraud and Money Laundering
    Crime Rings: The Intersection of Fraud and Money Laundering
    Verafin Recorded: Oct 4 2019 55 mins
    Presented by Verafin

    Banks and credit unions are facing significant challenges to prevent financial crimes, such as money laundering and terrorist financing, as criminals become more sophisticated in their efforts to evade detection.
     
    From criminal groups amassing millions in illicit profits by orchestrating online fraud schemes, to Human Trafficking, Human Smuggling, and Drug trafficking organizations using mule networks to facilitate the movement of criminal proceeds across borders — crime rings operating across multiple institutions are a real and growing threat.
     
    Join us for this educational webinar, as we provide insights into the trends and typologies of crime ring activity. We will discuss the intersection of fraud and money laundering activity in the context of organized criminal networks and provide real-life examples
     
    In this educational webinar, you will learn:
    - The role of fraud schemes in funding criminal organizations
    - Tactics used by criminal groups to move illicit funds through the US financial system
    - Walk through of real-life examples of crime rings that span multiple institutions
    - How technology and collaboration can overcome the challenges of a single institution’s limited view of activity.
  • Live demo: Audit every dollar of AP spend with AI
    Live demo: Audit every dollar of AP spend with AI
    Angie Rodriguez, Solution Consultant, AppZen Recorded: Oct 2 2019 38 mins
    Angie Rodriguez, Solution Consultant, AppZen, gives a high-level overview of how AppZen audits every dollar of AP spend and showcases the capabilities and key features of the AP Audit Platform.

    Attend this webinar to learn how to
    -Prevent duplicate charges
    -Enforce payment terms
    -Identify missing discounts
  • Prepare for the Future of Regulation: Global Regulatory Outlook 2019-2021
    Prepare for the Future of Regulation: Global Regulatory Outlook 2019-2021
    Conor Coughlan, Joe Dunphy, Laura Glynn Recorded: Oct 2 2019 63 mins
    As witnessed in 2018, the global regulatory outlook in 2019 will be characterized by considerable challenges and changes by regional regulators, who will have a keen focus on AML, data protection and OTC reform. So how will this impact financial institutions and their clients? Join our regulatory experts as we evaluate:

    - What lies ahead on the Regulatory Roadmap for 2019/2020
    - How to plan and future-proof regulatory change management in your organization
    - Best Practices for implementing a rules and risk-based approach to managing regulatory compliance
    - Our market leaders, have also answered questions via our pre-event poll and real-time Q&A session.
  • Elder Financial Abuse
    Elder Financial Abuse
    John Hawkin, Verafin Recorded: Sep 27 2019 42 mins
    Presented by Verafin

    Elder Financial Abuse is a significant and growing problem issue that has devastating effects on individuals and families. Believed to be largely underreported — financial institutions are facing increased responsibility to help combat the exploitation of vulnerable customers.

    Early detection of red flags and timely reporting to law enforcement are critical to protecting elderly customers from financial loss. This was emphasized in the 2011 Advisory from FinCEN, as well as the 2018 Joint Memorandum encouraging coordination among law enforcement, and adult protective service agencies (APS) to protect issued by CFPB, the Department of the Treasury, and FinCEN.

    Join us for this webinar, as we discuss the scale of Elder Financial Exploitation and outline key considerations from industry publications and guidance, including red flag indicators and best practices for reporting.
     
    In this webinar, you will learn:
    - The scale of Elder Financial Exploitation and the challenges of preventing fraud targeting senior customers.
    - Potential Red Flag Indicators of Elder Financial Exploitation from the FinCEN Advisory
    - Best practices for reporting Elder Financial Exploitation, including Suspicious Activity Reporting, and contacting appropriate local and state-level agencies.
  • The Omnichannel Contact Center: Implementing a Frictionless Payment Experience
    The Omnichannel Contact Center: Implementing a Frictionless Payment Experience
    Cheryl Helm, Helm Communications; Pinar Apay, Worldpay; Mahendra Penumathsa, Unytalk Recorded: Sep 27 2019 61 mins
    Consumers these days are savvy. They’re also a bit impatient. Constantly connected and with the world in the palm of their hands through their smartphones, they’ve become accustomed to instantaneous feedback to any issue that arises, especially with the businesses they transact with. They use a variety of channels to communicate, whether it’s email, SMS, webchat, social media, or IM, among many others, seamlessly switching from one to the next, and they expect brands to have the same ability.

    For this reason, organizations must embrace a digital transformation and invest in omnichannel contact center solutions that allow them to communicate and collect payments via any digital channel to keep up with consumer demands. Learn from leading thought leaders in the industry in an exciting panel discussion how to do just that and more, including:

    - How to embrace an omnichannel communications and payments strategy in your contact center
    - Best practices for implementing a seamless customer experience between channels
    - How to overcome common challenges along the way

    Don’t wait – register now to reserve your spot!
  • Enhancing Safety, Operations, and Experience with Computer Vision
    Enhancing Safety, Operations, and Experience with Computer Vision
    Mark Jules, Global VP, Hitachi Vantara | Sameer Sharma, Global GM, Intel Recorded: Sep 27 2019 59 mins
    Video data has long supported safety and security efforts. But thanks to improvements in vision technology, machine learning (ML) and artificial intelligence (AI), and the ability to run analysis at the edge, there are innovative new uses for video data that improve safety, operations and customer experience.

    Join us in this live webinar where we’ll discuss:
    •The evolution of video technology and how it drives insights that improve the way we do business.
    •How video data and vision technology are used across various industries to drive ROI.
    •The technologies that drive these innovations and outcomes.


    About our speakers

    Mark Jules: Global Vice President, Smart Spaces and Lumada Video Insights, Hitachi Vantara

    Mark Jules leads Hitachi Vantara’s Smart Spaces business which provides solutions incorporating video technologies, internet of things (IoT) sensors and analytics to help organizations create smarter spaces that operate more efficiently. Mark served as CEO of Avrio RMS Group for more than a decade and was also the President and Founder of Protean Solutions, a provider of mobile platforms for battlefield and emergency communications.

    Sameer Sharma: Global GM (New Markets/Smart Cities), Intel

    Sameer Sharma is the Global GM (New Markets/Smart Cities) for IoT Solutions at Intel and a thought-leader in the IoT/mobile ecosystem, having driven multiple strategic initiatives over the past 19 years. He leads a global team that incubates and scales new growth categories and business models in IoT and Smart Cities. These solutions include intelligent transportation, AI and video, air quality monitoring and smart lighting in cities.

    Sameer has an MBA from The Wharton School at UPenn, and a Master’s in Computer Engineering from Rutgers University. He holds 11 patents in the areas of IoT and Mobile.
  • Data Privacy Trends and Predictions
    Data Privacy Trends and Predictions
    Laura Fey, Fey LLC; Linda Chapman, Ontala; Stacy Scott, Kroll; Sam Abadir, Lockpath Recorded: Sep 26 2019 59 mins
    Data privacy and security is one of the most prominent challenges affecting how businesses gather, store and process data. In this exclusive webinar, our panel of industry experts will share their perspectives of the current data privacy and security landscape and where it's headed.

    As an attendee, you’ll learn the latest trends and top predictions in data privacy and security for 2020 and beyond, which entails:

    - Growing awareness of data privacy and security at the board of directors.

    - The growing involvement of the board when it comes to privacy and security.

    - The convergence of privacy and security.

    - Data subject rights

    Register now!
  • Data Center Optimization in Government 2019 “Progress and Best Practices”
    Data Center Optimization in Government 2019 “Progress and Best Practices”
    Monique Bourque, Sean Torpey, Melonie Parker, David Peed, Jonathan Alboum, Anthony Vicinelly Recorded: Sep 26 2019 57 mins
    Since 2010 government agencies have been on a mission to consolidate data centers and move data to the cloud. How does data center consolidation and optimization help agencies stay focused on citizen services?

    During this webinar, you will learn how top government technology executives from the Justice Department, State Department and Federal Aviation Administration are addressing the challenges and opportunities around data center optimization.

    The following experts will explore what the future of data center optimization in government means to you:

    - Monique Bourque, Assistant Director for Innovation, Engineering and Data Center Operations, Department of Justice
    - Sean Torpey, Acting Deputy Assistant Administrator for Information & Technology and Chief Information Officer, Federal Aviation Administration
    - Melonie Parker, Division Chief, Enterprise Operations Center, Department of State
    - David Peed, VP & General Manager, Equinix
    - Jonathan Alboum, Chief Technology Officer, Veritas Public Sector
    - Anthony Vicinelly, Federal Technology Director, Nlyte Software

    Panelists will also share lessons learned, challenges and solutions, and a vision for the future.
  • A Serial Seller’s Perspective on M&A Tech Due Diligence
    A Serial Seller’s Perspective on M&A Tech Due Diligence
    Irad Deutsch, CTO, Belong.Life and Phil Odence, GM, Synopsys Recorded: Sep 26 2019 57 mins
    On the buy side of a tech deal and want to better understand sellers? Selling a company and want to benefit from the experience of someone who’s been there (and been there and been there)?

    Building a successful software company takes a lot of blood, sweat, and tears. When a liquidity opportunity presents itself, sellers want to make sure they get the best deal they can, and quickly. During due diligence, the potential acquirer will delve into all facets of the technology. The more prepared the sell side is, the fewer issues will arise, and the smoother the transaction will be.

    What do buyers need, and what can prepared sellers do to streamline the process? Security, quality, and the intellectual property rights of the software are critical. Buyers, sellers, and their legal advisors need to be comfortable that no big technical issues will crop up post-close. Plus, they want to know that they have absolute and uncontested rights to the software assets—in particular, that there are no issues with open source licenses.

    Irad Deutsch, CTO of Belong.Life, has successfully made it through the process with two companies and has it down to a science for his third. Join Irad and Synopsys’ Phil Odence as they discuss the seller’s perspective, lessons learned on the seller’s side, and how to prepare for the M&A tech due diligence process.

    Don’t miss this informative webinar. Register today.
  • Data Center Optimization in Government 2019 “Progress and Best Practices”
    Data Center Optimization in Government 2019 “Progress and Best Practices”
    Monique Bourque, Sean Torpey, Melonie Parker, David Peed, Jonathan Alboum, Anthony Vicinelly Recorded: Sep 26 2019 57 mins
    Since 2010 government agencies have been on a mission to consolidate data centers and move data to the cloud. How does data center consolidation and optimization help agencies stay focused on citizen services?

    During this webinar, you will learn how top government technology executives from the Justice Department, State Department and Federal Aviation Administration are addressing the challenges and opportunities around data center optimization.

    The following experts will explore what the future of data center optimization in government means to you:

    - Monique Bourque, Assistant Director for Innovation, Engineering and Data Center Operations, Department of Justice
    - Sean Torpey, Acting Deputy Assistant Administrator for Information & Technology and Chief Information Officer, Federal Aviation Administration
    - Melonie Parker, Division Chief, Enterprise Operations Center, Department of State
    - David Peed, VP & General Manager, Equinix
    - Jonathan Alboum, Chief Technology Officer, Veritas Public Sector
    - Anthony Vicinelly, Federal Technology Director, Nlyte Software

    Panelists will also share lessons learned, challenges and solutions, and a vision for the future.
  • Top 10 Steps to Adopting Financial Technology
    Top 10 Steps to Adopting Financial Technology
    Chris Walsh Recorded: Sep 24 2019 58 mins
    New software can be both expensive and time-consuming to implement. Once in place, they are, normally, with you for a long time.
    Therefore, it’s important to do the research and ground work before deciding what solution to choose. Identifying your pain points, achieving your ideal solution and evaluating possible providers, it’s all easier said than done. That’s why we want to share our expertise and provide you with some important advice along the way.
    Check out our easy-to follow top 10 steps to implement financial software to help you migrate to a successful software adoption.
  • How to Manage an Effective VRM Program in the Privacy Age
    How to Manage an Effective VRM Program in the Privacy Age
    Sam Abadir, Lockpath Recorded: Sep 20 2019 56 mins
    Vendor risk management can be a costly part of operations. With privacy laws like GDPR, CCPA, HIPAA and upcoming laws adding a new twist, many companies are limiting the number of vendors they manage, increasing risk exposure. This session shows a new approach to vendor risk and privacy compliance, how to expand the number of vendors managed, and shares examples for companies of all maturities.

    Register now!
  • Fraud Prevention: Leveraging Big Data and Collaborative Investigations
    Fraud Prevention: Leveraging Big Data and Collaborative Investigations
    Scott Peddle, Product Manager, Verafin Recorded: Sep 20 2019 60 mins
    In this session, Scott Peddle, Product Expert at Verafin, will discuss the evolution of financial crime and how financial institutions can embrace innovative approaches to proactively prevent fraud and combat crime-ring activity.

    Learn how financial institutions can leverage big data, machine-learning technology and 314(b) information sharing for effective fraud prevention. This includes proactive trend identification, reduction in false positive results and collaborative investigations of multi-institutional crime-ring activity.

    Highlights:
    - Limitations of conventional fraud prevention approaches that rely on limited data sets and approaches in today’s increasingly complex financial crime landscape
    - Big data intelligence approach for financial institutions that leverages machine-learning technology and 314(b) information sharing to mitigate losses and prevent fraud
    - Walk-through of a real-life crime-ring case to learn how data and technology played a critical role to enhance detection, strengthen investigations and improve reporting to law enforcement
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Sep 19 2019 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • The Future of ITAM in the Age of SaaS
    The Future of ITAM in the Age of SaaS
    Rich Reyes, EVP Software Advisory at Connor Consulting & Cory Wheeler, Co-Founder & VP of Customer Success/Services at Zylo Recorded: Sep 19 2019 30 mins
    SAM professionals drive vendor compliance, operational efficiencies, and ROI across the business. However, the introduction of SaaS has drastically impacted traditionally centralized IT and license management. Now that 70% of application spend is sourced outside of IT budgets according to IDC, what role do SAM practitioners play in building and maintaining modern ITAM strategies? How are SAM practitioners affected?

    This 30-minute webinar will focus on:
    ●The evolution of ITAM
    ●The difference between SAM and SaaS Management
    ●The competitive advantage of evolving a career alongside the growth of SaaS
    ●The future of ITAM, inclusive of both SAM and SaaS management.

    Zylo co-founder Cory Wheeler will utilize his experience of building procurement teams both in the on-prem and SaaS world to discuss the evolution of ITAM organization which led to the founding of Zylo.

    He will be joined by Connor Consulting Executive VP Rich Reyes who will leverage his experience from building a sustainable ITAM practice at a Fortune 100 retailer and leading the Global Software Advisory (SA) practice at Connor Consulting to inform this discussion.

    Register today to reserve your seat.
  • 6 Surprises Found in Your Invoices by AI Auditing
    6 Surprises Found in Your Invoices by AI Auditing
    Charlie Warne, Ann Jenkins Recorded: Sep 19 2019 27 mins
    Accounts payable departments at large enterprises pay thousands of invoices each month. With such a large volume of invoices, companies leave themselves at risk for overpayment and potential invoice fraud.

    As your business grows and your vendor list gets larger, how do you stay on top of the validity of each invoice?

    Join Ann Jenkins, Account Manager, XoomWorks, and Charlie Warne, Sr. Solutions Consultant at AppZen, as they discuss how auditing invoices with AI helps you to
    - Protect your business from liability
    - Avoid PR nightmares
    - Stay Compliant
  • Live Demo: Reach 100% audit coverage with AppZen
    Live Demo: Reach 100% audit coverage with AppZen
    Travis Andrade Recorded: Sep 18 2019 57 mins
    Travis Andrade, Sr. Product Marketing Manager, AppZen, gives a high-level overview of how AppZen audits every dollar of company spend and showcases the capabilities and key features of the Expense Audit Platform.

    Attend this webinar to learn how to
    -Reach 100% audit spend
    -Proactively enforce policy
    -Get employees paid faster
  • Ransomware Prevention Part 2
    Ransomware Prevention Part 2
    Donald E. Hester Recorded: Sep 18 2019 77 mins
    Second in a two-part series on ransomware. Local governments are at high risk for ransomware attack, and the Federal Government and government associations recommend immediate action. A recent report from the Cybersecurity and Infrastructure Security Agency (CISA) states that the cost for recovery tops $5 billion in 2019 year to date. The department of Homeland Security, CISA, MS-ISAC, NGA & NASCIO recommend immediate action to safeguard against ransomware attacks. In order to help clients effectively combat the current growing cyber-threats, we have created a ransomware readiness checklist from the recent US Federal Government Interagency technical guideline, Cybersecurity and Infrastructure Security Agency (CISA) guidelines, National Cyber Security Centre (NCSC), UK and NIST guidelines. In this session we will cover the items in our checklist and the recommendations on preparation.

    Coverage
    NIST CSF, NIST SP 800-53, COBIT, ISO 27001, ISA 62443, COSO, AWWA G430-14
    IT, OT, IoT, Cloud, Firmware
  • Thinking Like a Millennial in eDiscovery
    Thinking Like a Millennial in eDiscovery
    Doug Austin and Tom O'Connor Recorded: Sep 18 2019 62 mins
    eDiscovery isn’t just about emails and Office documents anymore. Newer sources of electronically stored information (ESI) and newer devices from which those sources are accessed are causing an explosion of data volumes and a proliferation of data sources that is unprecedented. And, millennials’ use of technology is a primary driver in the proliferation of these newer sources and devices, changing the paradigm of where potentially responsive ESI may need to be identified, preserved and collected. This CLE-approved* webcast session will discuss how evolving technology trends are impacting eDiscovery today and how to think like a millennial to stay on top of those developing trends. Key topics include:

    + Understanding Millennials and How They Differ from Previous Generations
    + Drivers for Millennials’ Thinking Today
    + How Litigation Support and eDiscovery Has Evolved Over the Years
    + Challenges Posed by BIG Data and Variety of Data Sources
    + Ethical Duties and Rules for Understanding Technology
    + Impact of Millennials on Legal Technology and eDiscovery
    + Your Clients May Have More ESI Than You Think
    + Recommendations for Addressing Today and Future Technology Challenges

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for 2017 and 2018.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • KYC, AML & Transparency for Cryptocurrencies and ICOs
    KYC, AML & Transparency for Cryptocurrencies and ICOs
    Conor Coughlan, Xavier Gomez, David DeLeon, Andrew Delaney, Laura Glynn Recorded: Sep 18 2019 59 mins
    This webinar is based on the latest market research into the challenges facing institutions, issuers, exchanges, & investors in determining viability & suitability, for investing in crypto-currencies, ICOs and derived offerings. How can we solve the KYC, AML & transparency challenges? So that this new asset class can mature, open to institutional investors and play a more value adding role for society & the global economy. Fenergo will share their market research findings, discuss and debate the topics with crypto professionals & RegTech professionals.

    Watch our recent webinar to learn more about:

    - The latest market research.
    - The current eco-system challenges and issues.
    - Practical requirements that are needed to solve the problem.
    - The next steps the industry and related parties need to take.
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Sep 17 2019 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • Characteristics of a High Performing Internal Audit Team
    Characteristics of a High Performing Internal Audit Team
    Ed Williams, Sr. Manager, Risk Advisory Services and Timothy Lietz, Director, Risk Advisory Services, Experis Finance Nov 7 2019 5:00 pm UTC 60 mins
    Experis Finance is pleased to announce another installment of our “Hot Topics Series” for Chief Audit Executives and their teams. This series of webinars provide practical insights on topics of interest to internal audit professionals. This discussion covers the proven components of high performing internal audit teams. In today’s business environment, Internal Audit Departments have to assemble highly effective teams and activities that produce insightful work for their organization in an efficient and nimble manner. Acquiring top notch talent, keeping them engaged and motivated, then having this team complete value-added audits as quickly and effectively as possible, is the ultimate goal of internal audit executives today.

    The webinar will provide participants with the following learning objectives:

    •Hear discussion on leading practices from cutting edge audit functions
    •Learn strategies on how to recruit, engage, challenge and retain the best internal audit talent for your organization
    •Understand the impact of today’s job market environment as you plan to address your Human Capital challenges in the year ahead
    •Discuss approaches to enable your internal audit function to provide more insight and expertise to your organization in the future
    •Hear strategies to employ to reduce internal audit completion cycle times and increase the value of each audit deliverable
    •Highlight the leading factors to establishing a winning culture within your internal audit function

    Presenters
    Ed Williams, Sr. Manager, Risk Advisory Services, Experis
    Timothy Lietz, Director, Risk Advisory Services, Experis
  • Operational Risk Management for 2020 and Beyond
    Operational Risk Management for 2020 and Beyond
    Sam Abadir Nov 6 2019 5:00 pm UTC 60 mins
    Operational risks have been constantly increasing due to immature processes, unmanaged third parties and more. With the growing number of complex products and services, this issue is intensified, and traditional operational risk management can't keep up.

    In this live webinar, Lockpath’s Sam Abadir will share what operational risk management for 2020 and beyond looks like, including:

    • What areas operational risk management encompasses

    • How your organization can gain efficiency from proper operational risk management

    • Advantages of managing operations on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage operational risk in 2020 and beyond by attending this educational webinar. Register now!
  • You’ve Got Your Open Source Audit Report - Now What?
    You’ve Got Your Open Source Audit Report - Now What?
    Tony Decicco & Leon Schwartz, GTC Law, Phil Odence, Synopsys Nov 14 2019 5:00 pm UTC 60 mins
    Companies’ use of open source software has surpassed the occasional and solidified itself as mainstream. Effectively identifying and managing the compliance and security risks associated with open source software can be a difficult task. Whether you’re acquiring another company, preparing for acquisition or simply wanting to manage the use of open source, the universal first step is to figure out the composition of the code, often via an audit. But what do you do once you have the audit report?

    Join us for this live webinar to learn best practices before and after an open source audit. We’ll cover how to:

    •Select and prepare the code base
    •Get the most out of an audit
    •Implement a third-party software policy
    •And more

    Don’t miss this informative webinar. Register today.