Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • In-Place ECA Clearly Understand Your E-Discovery Burden Before Collecting Data
    In-Place ECA Clearly Understand Your E-Discovery Burden Before Collecting Data
    EDRM and Exterro Recorded: Aug 21 2019 33 mins
    In any matter, your potential e-discovery burden will greatly affect your case strategy. What if you could immediately—right after receiving a complaint—not only know how much likely data you would need to search, collect, process and review, but also have access to potentially responsive documents prior to collection? New e-discovery technology now empowers legal teams to do just that with in-place Early Case Assessment (ECA) capabilities.

    In our new technology webcast series, you will hear from technology experts along with in-house legal professionals like yourself on what e-discovery tools they are keeping an eye on and those that have made a lasting impact on their legal departments. This webcast will discuss how in-place ECA works, how other leading legal departments are using it, and why this technology will enable you to make big case strategic decisions earlier, saving you time and money.
  • The Seven Deadly Sins of Email in eDiscovery
    The Seven Deadly Sins of Email in eDiscovery
    Jeff Fugitt and Nancy Rigassio Recorded: Aug 21 2019 66 mins
    During this informative session you'll learn about the seven deadly sins of email, email best practices to avoid malpractice and how to identify the seven deadly sins in eDiscovery.
  • Why financial and professional services firms must get flexible working right
    Why financial and professional services firms must get flexible working right
    Kirsty Leighton Recorded: Aug 21 2019 51 mins
    Financial service companies will need to lead the charge in flexible and remote working if they are to attract the best possible talent. Something that has never been more important against a backdrop of Brexit and a growing millennial and Gen Z workforce.

    Today, only one in six (15%) employees work in businesses that don’t offer flexible working. What used to be a perk is now a mandatory offering.
    Alongside the importance of employee satisfaction, the UK is also facing a productivity challenge, on average the UK is 31% less productive than France.

    Join Mark Elwood, Director at TeleWare, Dr Lucy Green, CEO & Business Development Expert at Larato and David Mellard, Director and Founder at Bedrock HR, as they discuss:
    •The flexible working challenges financial services companies face – including security and data protection
    •Can financial services companies safely implement a bring your own device (BYOD) policy?
    •How to use tech to increase productivity
    •Scalable IT solutions for growing companies
  • Security+ Objective 1.4
    Security+ Objective 1.4
    Donald E Hester & Robert DeRoeck Recorded: Aug 15 2019 69 mins
    In this session we will explain penetration testing concepts.
    Find an exploitable vulnerability.
    Design an attack around it.
    Test the attack.
    Seize a line in use.
    Enter the attack.
    Exploit the entry for information recovery.
  • Vendor Risk Management for 2020 and Beyond
    Vendor Risk Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Aug 15 2019 48 mins
    Vendors are essential to your company's success; most organizations can’t operate without them. However, vendors require a different approach to risk management.

    Outsourcing your activities does not mean you outsourced managing the risk of those activities. The public, the regulators and the courts still hold you responsible. Without a considered approach to third-party risk management, the risk management of vendors and suppliers can easily get out of your control.

    In this live webinar, Lockpath’s Sam Abadir will share what vendor risk management for 2020 and beyond looks like, including:

    • What vendor risk management encompasses

    • How your organization can gain efficiency from proper vendor risk management

    • Advantages of managing vendors on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage vendor risk in 2020 and beyond by attending this educational webinar. Register now!
  • What You Need to Know About Open Source Licensing
    What You Need to Know About Open Source Licensing
    Mark Radcliffe, DLA Piper, Tony Decicco, GTC Law Group, Phil Odence, Synopsys Recorded: Aug 15 2019 62 mins
    Virtually every organization uses open source software, and lots of it, to create efficiencies in software development. But left unmanaged, open source can introduce legal, IP, compliance, and other risks for the business. With over 2,500 different licenses in use, legal professionals and technical managers need to understand the license obligations associated with open source and how to mitigate risks.

    Join top open source legal experts Mark Radcliffe from DLA Piper and Tony Decicco from GTC Law Group for a webinar as they do a deep dive into the types of open source licenses that could present challenges. They’ll cover:

    •The history and risk of open source software
    •Intellectual property law for software licensing
    •The most popular licenses and their obligations
    •Practical advice for helping your organizations or clients

    Don’t miss this informative webinar. Register today.

    CLE:

    DLA Piper LLP (US) has been certified by the State Bar of California, the Board on Continuing Legal Education of the Supreme Court of New Jersey, the New York State Continuing Legal Education Board, and the Pennsylvania Continuing Legal Education Board as an Accredited Provider. The following CLE credit is being sought:
    •California: 1.0 Credit (1.0 General, 0.0 Ethics)
    •New Jersey: 1.2 Credits (1.2 General, 0.0 Professional Responsibility)
    •New York: 1.0 Transitional & Non-Transitional Credit (1.0 Professional Practice, 0.0 Ethics and Professionalism)
    •Pennsylvania: 1.0 Credit (1.0 General, 0.0 Ethics)
    CLE credit will be applied for in other states where DLA Piper has an office with the exception of Minnesota, North Carolina, and Puerto Rico.
  • Delivering Digital Client Onboarding For Better Client Experience
    Delivering Digital Client Onboarding For Better Client Experience
    Conor Coughlan, James Follette, Rachel Woolley, Jonathan Jones, Philippe Guiral Recorded: Aug 13 2019 43 mins
    In this webinar, Fenergo and Accenture join forces to present a target operating model for how commercial and business banks can design their digital client journeys from end-to-end to deliver a better client experience throughout initial client onboarding and throughout the entire client lifecycle.

    In this webinar, you'll learn:

    The top trends in digital transformation and client experience
    Expected regulatory changes in 2019/2020 impacting Client Lifecycle Management
    Target Operating Model: How to design and implement a frictionless, straight through client journey from initial onboarding to ongoing lifecycle management, including the key digital technologies that will make this happen e.g. eSignatures, digital ID&V, biometrics etc.
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Aug 8 2019 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • How Organizations Use Next Generation Technology Asset Management For Compliance
    How Organizations Use Next Generation Technology Asset Management For Compliance
    Nlyte Recorded: Aug 8 2019 25 mins
    Businesses need to manage large numbers of network-connected devices, but the Excel method no longer cuts it - regardless of how good your formulas and macros are. Today, there are many stakeholders (HR, finance, legal, etc.) who constantly require recent information - especially on desktops, to complete their jobs.

    Referencing real-world case studies, Nlyte will highlight a new generation of IT Asset Management including:

    - Creating a "single source of truth" on all connected devices, for all departments
    - Automating software auditing to create a business-wide, dynamic baseline of data
    - Gathering GDPR, HIPAA, SOX-related info
    - Tightening security by spotlighting rogue devices and more

    We look forward to seeing you there.
  • Seven Steps to Effective Reputational Due Diligence
    Seven Steps to Effective Reputational Due Diligence
    John Arvanitis, Kroll; Tony Rock, Lockpath Recorded: Aug 8 2019 64 mins
    In today’s environment of evolving regulatory regimes and societal norms, more attention than ever is paid to how and with whom companies do business. As a result, effective reputational risk management is increasingly important for today’s compliance and ethics professionals. This webcast, “Seven Steps to Effective Reputational Due Diligence” discusses what organizations can do to protect and preserve its most important asset – its reputation.

    Topics covered include:

    • Creating a culture of compliance and accountability
    • Instituting and updating the code of conduct
    • Establishing a risk assessment methodology
    • Building a framework of communication and training related to reputation management
    • Crafting a third-party management strategy
    • Improving the Investigation and Reporting process
    • Instilling an Environment of Continuous Improvement
  • How Organizations Use Next Generation Technology Asset Management For Compliance
    How Organizations Use Next Generation Technology Asset Management For Compliance
    Nlyte Recorded: Aug 8 2019 26 mins
    Businesses need to manage large numbers of network-connected devices, but the Excel method no longer cuts it - regardless of how good your formulas and macros are. Today, there are many stakeholders (HR, finance, legal, etc.) who constantly require recent information - especially on desktops, to complete their jobs.

    Referencing real-world case studies, Nlyte will highlight a new generation of IT Asset Management including:

    - Creating a "single source of truth" on all connected devices, for all departments
    - Automating software auditing to create a business-wide, dynamic baseline of data
    - Gathering GDPR, HIPAA, SOX-related info
    - Tightening security by spotlighting rogue devices and more

    We look forward to seeing you there.
  • Reverse the Curse of Non-Compliant Spend
    Reverse the Curse of Non-Compliant Spend
    Ryan Birdsall Recorded: Aug 7 2019 31 mins
    Making sure your business expenses comply with policy, negotiated contracts, and spend regulations is no small feat. It’s hard to get people to read the T&E policy, much less follow it.

    And regulatory compliance? If you’re auditing only a fraction of your expenses and invoices, how the heck do you keep your company out of hot water and off of the front page of the newspaper?

    Join Ryan Birdsall, Customer Success Manager, AppZen, as he discusses how to enforce compliance and stay out of regulatory hot water.
  • Part II: A Day in the Life of an Ethical Hacker, with Callum Carney, SRT Member
    Part II: A Day in the Life of an Ethical Hacker, with Callum Carney, SRT Member
    Callum Carney, Synack Red Team Member and Justin Shaw-Gray, Sales Director, Synack Recorded: Aug 6 2019 35 mins
    Part II: A Day in the Life of an Ethical Hacker: A Discussion and Demo with Callum Carney, Synack Red Team Member

    Join us for part II of this compelling webcast series. This time around Callum will share his screen and walk you through the SRT portal and process he follows when responding to vulns. He'll answer more questions and will show you what it's like to be a member of the Synack Red Team.

    You'll hear about:
    - SRT tools including the XSS Hunter

    - What constitutes a vulnerability and the decisions that SRT members must make when faced with deciding what vulnerabilities are worth reporting

    - How detailed an SRT member's report typically has to be in order to be accepted during the 24hr reporting timeframe

    We hope you can join!
  • Operating Off-the-Shelf Identity Access Management with a DevOps methodology
    Operating Off-the-Shelf Identity Access Management with a DevOps methodology
    Tim Hobbs, DevOps Evangelist, iC Consult Group Recorded: Aug 1 2019 37 mins
    As modern applications require short development cycles and IAM systems that can be adjusted at the same pace, modern data centers are becoming configuration-driven, resilient environments designed to meet rapidly changing application needs - and modern IAM solutions must be in line with this paradigm.

    Identity Access Management (IAM) products are highly configurable systems tailored to the diverse needs of customer environments and applications.

    Introducing traditional IAM products into cloud containers is not a simple "lift and shift" operation, as it once was with the virtual machine infrastructure. Today's micro-service-enabled, service-mesh-oriented infrastructure expects simple, resilient, self-discovery services instead of brittle monoliths that rely on manual configuration.

    Join this webinar to understand how operating IAM products with a DevOps setting in terms of automation, repeatability, and continuous improvement is possible through close collaboration between IAM, application, and infrastructure experts.
  • Reviewing Modern JavaScript Applications
    Reviewing Modern JavaScript Applications
    Lewis Ardern, Senior Security Consultant, Synopsys Recorded: Jul 31 2019 60 mins
    Many penetration testers approach modern JavaScript applications from an “outside-in” perspective. But this approach often misses security issues in plain sight. In this webinar, we’ll demystify common JavaScript issues that should be better understood/identified during security reviews. We’ll discuss how to review applications in a code-centric manner by using freely available tools to help start identifying security issues through processes such as linting and dependency auditing.
  • Key eDiscovery Case Law Review for First Half of 2019
    Key eDiscovery Case Law Review for First Half of 2019
    Doug Austin and Tom O'Connor Recorded: Jul 31 2019 70 mins
    So far, 2019 has been another interesting year with notable and important case law decisions related to eDiscovery best practices. What do you need to know about the cases to avoid mistakes made by others and save time and money for your clients? This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2019 to identify trends that lawyers should consider for their own practices. Key topics include:

    + Can ESI related to an unsolved murder case be compelled to be produced in a related civil case?
    + Is the use of biometric fingerprint scanning technology an invasion of privacy?
    + When can non-parties be compelled to produce ESI in litigation?
    + Are social media photos that you didn’t post discoverable if you’ve been tagged in them?
    + Can sanctions be so important that you fight NOT to have a claim against you dismissed?
    + Is being forced to provide your cell phone password the “death knell” for fifth amendment protection?
    + Should a case ruling be reversed if a judge is Facebook friends with one of the parties?
    + Should discovery be stayed while a motion to dismiss is being considered?
    + Does Rule 37(e) eliminate the potential for obtaining sanctions for spoliation of ESI?

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for three consecutive years .

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jul 30 2019 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • Learning from Fraud Detection: Segmenting AML to Fight Financial Crime
    Learning from Fraud Detection: Segmenting AML to Fight Financial Crime
    Brendan Brothers Recorded: Jul 30 2019 60 mins
    Why do we think about AML as a single idea, when fraud is segmented specifically by customer, channel or loss type? In this insightful session, Jim Richards and Brendan Brothers discuss the limitations of the current one-size-fits-all approach to compliance and anti-money laundering. Learn why segmentation is effective at fighting fraud, and how these lessons can be applied to transform the AML industry.

    Learning Objectives
    - Review of the limitations of current AML approaches and technologies to -effectively fight financial crime
    - Understand how segmentation improves fraud detection and how these lessons can be applied to strengthen anti-money laundering efforts
    - Learn how innovative technologies and customer segmentation will transform the AML industry
  • How to Overcome Challenges When Implementing Customer Data Management Solutions
    How to Overcome Challenges When Implementing Customer Data Management Solutions
    Dr. Heiko Klarl Recorded: Jul 30 2019 46 mins
    As AI and other digital business models and technological trends revolutionise customer relationships, it's imperative that you start to personalise communication with customers.

    By addressing your customers personally - and in the right context - this approach to integrated customer data management can supercharge sales potential and improve the customer experience.

    Join this webinar to learn more about the strategic challenges associated with implementing customer data management solutions and how to address them, including:

    - Time-to-market requirements

    - International rollouts from America to China

    - Supporting new services in mergers & acquisitions
  • The Omnichannel Approach: Is It Already Outdated?
    The Omnichannel Approach: Is It Already Outdated?
    Vanessa Hodgkinson, Retail Analyst, Openbravo Recorded: Jul 30 2019 35 mins
    The answer to the question is clearly “No” and even though we hear the term omnichannel a lot in retailing, the reality is that very few retailers have been able to advance their omnichannel strategy as quickly as they would like.
    Most of the growth retail is coming from digital, so a retailer that cannot optimize digital commerce as a growth channel has a bleak future. Similarly, if you have yet to consolidate your channel silos, you cannot offer a joined-up customer experience that is essential for improving customer satisfaction and keeping shoppers visiting your stores.. This webinar will look at these two components of your omnichannel strategy and explain how Openbravo Commerce Cloud can help you overcome the obstacles in the path to successful omnichannel retailing.
  • SkyStem: Perfecting the Close Checklist
    SkyStem: Perfecting the Close Checklist
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jul 25 2019 55 mins
    [Live Recording] It's time to spruce up the close checklist! Join us in this webinar where we will revisit best practices as well as practical tips to help improve the financial close process. Whether you have a close checklist, a close calendar, or even if you are still forming a close process, these practices will surely help your period-end close.

    Please note: CPE credit not available for this playback
  • Security+ Objective 1.3
    Security+ Objective 1.3
    Donald E Hester & Robert DeRoeck Recorded: Jul 25 2019 55 mins
    In this webinar we are going to cover CompTIA’s SY0-501 Security+ certification exam objective 1.3: Explain threat actor types and attributes.
    Types of actors
    - Script kiddies
    - Hacktivist
    - Organized crime
    - Nation states/APT
    - Insiders
    - Competitors
    • Attributes of actors
    - Internal/external
    - Level of sophistication
    - Resources/funding
    - Intent/motivation
    • Use of open-source intelligence
  • Best practices when selecting a Colocation Provider
    Best practices when selecting a Colocation Provider
    Nlyte Recorded: Jul 25 2019 58 mins
    In this fast-moving market, what should businesses think about when selecting a provider? The shift to hybrid models of operation is here to stay.

    Join our webinar to uncover key considerations for successful Colocation Provider and Tenant relationships:

    - Driving real-time visibility on resource-usage and performance to make data-based decisions
    - Reduce risk of downtime
    - Optimize consumption and reduce operational costs
    - Automating tasks and understanding facility performance
    - Great content for colocation providers and data center managers that use colocations

    We look forward to seeing you there.
  • Data Security and Patient Safety - Two Sides of the Same Coin!
    Data Security and Patient Safety - Two Sides of the Same Coin!
    Iliana Peters, Polsinelli Recorded: Jul 25 2019 60 mins
    Iliana Peters, who is a Shareholder at Polsinelli, and a former Acting Deputy Director for HIPAA at the Department of Health and Human Services (HHS), will discuss emerging issues in data security, including major areas of information security risk, new threats to data security, helpful guidance and resources, and enforcement by HHS, the State Attorneys General, and the Federal Trade Commission.
  • Best practices when selecting a Colocation Provider
    Best practices when selecting a Colocation Provider
    Nlyte Recorded: Jul 25 2019 58 mins
    In this fast-moving market, what should businesses think about when selecting a provider? The shift to hybrid models of operation is here to stay.

    Join our webinar to uncover key considerations for successful Colocation Provider and Tenant relationships:

    - Driving real-time visibility on resource-usage and performance to make data-based decisions
    Reduce risk of downtime
    - Optimize consumption and reduce operational costs
    - Automating tasks and understanding facility performance
    - Great content for colocation providers and data center managers that use colocations

    We look forward to seeing you there.
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 8:00 am UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Daniel Norman, Research Analyst, ISF Aug 22 2019 12:00 pm UTC 44 mins
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • How to Leverage NIST CSF
    How to Leverage NIST CSF
    Sam Abadir, Lockpath Aug 22 2019 4:00 pm UTC 60 mins
    Many organizations have difficulty leveraging information in their cybersecurity and business operations to make the right risk decisions, establish the right risk priorities and appropriately allocate budget to best achieve their risk management goals.

    Many believe that NIST CSF is another standalone methodology instead of a tool designed to help your organization understand and build a roadmap to achieve the right level of cybersecurity. Successful NIST CSF programs help integrate, message and prioritize cybersecurity efforts not only within IT but across the entire business.

    In this live webinar, Lockpath’s Sam Abadir will share what implementing a NIST CSF solution entails, including:

    • Framework support
    • Budget expectations vs. reality
    • Correctly assessing an organization’s needs to implement NIST CSF
    • Proper management and management skills
    • Prioritizing cybersecurity within an organization

    Find out what you need to know to implement a NIST CSF solution by attending this educational webinar. Register now!
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 4:00 pm UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Microsoft Azure 2 Virtual Machines
    Microsoft Azure 2 Virtual Machines
    Donald E Hester & Robert DeRoeck Aug 22 2019 5:00 pm UTC 90 mins
    Our next session in our continuing series of webcast on Microsoft Azure. In this session we cover virtual machines and virtual machine management. Session will include demos.
    Virtual Machine Planning, Creating Virtual Machines, Virtual Machine Availability, Virtual Machine Extensions
  • Automating Regulatory Change & The Regulatory Rules Engine
    Automating Regulatory Change & The Regulatory Rules Engine
    Conor Coughlan, Joe Dunphy, Laura Glynn Aug 28 2019 9:00 am UTC 37 mins
    An insight into the industry's leading regulatory automation solutions and services, market research, insights and best practices. This special webinar aims to ensure compliance, regulatory, risk and operations professionals are armed with a key insights into how to solve the problem of regulatory change when it comes to KYC, AML & Client Lifecycle Management. This webinar will:

    Watch our recent webinar to learn more about:

    Market Trends & Regulatory Outlook
    The Fenergo approach to Regulatory Change
    The Fenergo regulatory rules engine
  • Maximize ROI through AR/AP Process Modernization
    Maximize ROI through AR/AP Process Modernization
    Medha Patel, CPA, Paro Aug 28 2019 3:00 pm UTC 60 mins
    What costly mistakes are businesses making that they don’t know about within the AR/AP process? Through our experience with our clients, here’s what we’ve noticed, and here’s how we were able to monumentally transform their business.

    In this webinar you'll learn:
    -The most succesful techniques to deal with slow or delinquent payments
    -How to effectively identify, prevent, and mitigate fraud
    -What internal controls will keep your AP process on-track and keep partners happy

    If you are looking to make an positive impact on your finance department and procedures, this webinar is a great place to start!
  • Security+ Objective 1.5
    Security+ Objective 1.5
    Donald E Hester & Robert DeRoeck Aug 29 2019 5:00 pm UTC 75 mins
    Our next session in our continuing series of webcast on CompTIA Security+. Objective 1.5. In this session we will explain vulnerability scanning concepts.
    Passively test security controls
    Identify vulnerability
    Identify lack of security controls
    Identify common misconfigurations
    Intrusive vs. non-intrusive
    Credentialed vs. non-credentialed
    False positive
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Aug 29 2019 6:00 pm UTC 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • SkyStem: Back to Basics with Reconciliations
    SkyStem: Back to Basics with Reconciliations
    Nancy Wu, Sales and Customer Support, SkyStem Sep 5 2019 6:00 pm UTC 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • SkyStem: Perfecting the Close Checklist
    SkyStem: Perfecting the Close Checklist
    Nancy Wu, Sales and Customer Support, SkyStem Sep 10 2019 6:00 pm UTC 55 mins
    [Live Recording] It's time to spruce up the close checklist! Join us in this webinar where we will revisit best practices as well as practical tips to help improve the financial close process. Whether you have a close checklist, a close calendar, or even if you are still forming a close process, these practices will surely help your period-end close.

    Please note: CPE credit not available for this playback
  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Sep 12 2019 6:00 pm UTC 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • Financial benchmark regulation in the EU
    Financial benchmark regulation in the EU
    Peter Green and Jeremy Jennings Mares, Morrison & Foerster; Shabana Qaiser, Bank of America Merrill Lynch Sep 17 2019 3:00 pm UTC 75 mins
    This webinar will focus on the current and future state of regulation of financial benchmarks used in the EU, both EU and non-EU benchmarks. The EU’s Benchmarks Regulation imposes a range of stringent requirements aimed at ensuring the integrity and reliability of benchmarks used in a vast number of financial transactions. Although the provisions of the Regulation are already in force, transitional provisions mean that many index providers will only be required to comply with the Regulation from 1 January 2020 or, in the case of critical benchmarks and non-EU benchmarks, 1 January 2022. After these dates, EU banks, fund managers and other financial institutions will be unable to use financial benchmarks in a huge range of funds, securities, derivatives and other financial instruments, unless they comply with the provisions of the Regulation. In particular, this webinar will discuss what financial markets participants need to know about:

    •Which persons/entities are affected by the Regulation
    •When an index or benchmark will fall within the scope of the Regulation, in particular its restrictions on benchmark use for certain transactions
    •Specific rules that affect certain benchmarks, such as critical benchmarks and commodity benchmarks
    •The timing for compliance with the Regulation
    •The specific provisions concerning the use of benchmarks from non-EU providers
  • The Future of ITAM in the Age of SaaS
    The Future of ITAM in the Age of SaaS
    Rich Reyes, EVP Software Advisory at Connor Consulting & Cory Wheeler, Co-Founder & VP of Customer Success/Services at Zylo Sep 17 2019 5:00 pm UTC 45 mins
    SAM professionals drive vendor compliance, operational efficiencies, and ROI across the business. However, the introduction of SaaS has drastically impacted traditionally centralized IT and license management. Now that 70% of application spend is sourced outside of IT budgets according to IDC, what role do SAM practitioners play in building and maintaining modern ITAM strategies? How are SAM practitioners affected?

    This 30-minute webinar will focus on:
    ●The evolution of ITAM
    ●The difference between SAM and SaaS Management
    ●The competitive advantage of evolving a career alongside the growth of SaaS
    ●The future of ITAM, inclusive of both SAM and SaaS management.

    Zylo co-founder Cory Wheeler will utilize his experience of building procurement teams both in the on-prem and SaaS world to discuss the evolution of ITAM organization which led to the founding of Zylo.

    He will be joined by Connor Consulting Executive VP Rich Reyes who will leverage his experience from building a sustainable ITAM practice at a Fortune 100 retailer and leading the Global Software Advisory (SA) practice at Connor Consulting to inform this discussion.

    Register today to reserve your seat.
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem Sep 17 2019 6:00 pm UTC 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Sep 19 2019 6:00 pm UTC 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • A Serial Seller’s Perspective on M&A Tech Due Diligence
    A Serial Seller’s Perspective on M&A Tech Due Diligence
    Irad Deutsch, CTO, Belong.Life and Phil Odence, GM, Synopsys Sep 26 2019 4:00 pm UTC 60 mins
    On the buy side of a tech deal and want to better understand sellers? Selling a company and want to benefit from the experience of someone who’s been there (and been there and been there)?

    Building a successful software company takes a lot of blood, sweat, and tears. When a liquidity opportunity presents itself, sellers want to make sure they get the best deal they can, and quickly. During due diligence, the potential acquirer will delve into all facets of the technology. The more prepared the sell side is, the fewer issues will arise, and the smoother the transaction will be.

    What do buyers need, and what can prepared sellers do to streamline the process? Security, quality, and the intellectual property rights of the software are critical. Buyers, sellers, and their legal advisors need to be comfortable that no big technical issues will crop up post-close. Plus, they want to know that they have absolute and uncontested rights to the software assets—in particular, that there are no issues with open source licenses.

    Irad Deutsch, CTO of Belong.Life, has successfully made it through the process with two companies and has it down to a science for his third. Join Irad and Synopsys’ Phil Odence as they discuss the seller’s perspective, lessons learned on the seller’s side, and how to prepare for the M&A tech due diligence process.

    Don’t miss this informative webinar. Register today.
  • Data Privacy Trends and Predictions
    Data Privacy Trends and Predictions
    Laura Fey, Fey LLC; Linda Chapman, Ontala; Stacy Scott, Kroll; Tony Rock, Lockpath Sep 26 2019 4:00 pm UTC 60 mins
    Data privacy and security is one of the most prominent challenges affecting how businesses gather, store and process data. In this exclusive webinar, our panel of industry experts will share their perspectives of the current data privacy and security landscape and where it's headed.

    As an attendee, you’ll learn the latest trends and top predictions in data privacy and security for 2020 and beyond, which entails:

    - Growing awareness of data privacy and security at the board of directors.

    - The growing involvement of the board when it comes to privacy and security.

    - The convergence of privacy and security.

    - Data subject rights

    Register now!
  • Business Continuity Management and Resiliency for 2020 and Beyond
    Business Continuity Management and Resiliency for 2020 and Beyond
    Sam Abadir, Lockpath Oct 17 2019 4:00 pm UTC 60 mins
    Business interruptions can hurt an organization's reputation, decrease revenue and loose customer trust. Business continuity and resiliency plans detail the impact of various disaster scenarios and creates a solution for ensuring critical operations remain open during a crisis.

    In this live webinar, Lockpath’s Sam Abadir will share what business continuity and resiliency management for 2020 and beyond looks like, including:

    • What areas business continuity management and resiliency encompasses

    • How your organization can gain efficiency from proper business continuity and resiliency management

    • Advantages of managing business continuity and resiliency on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage business continuity and resiliency in 2020 and beyond by attending this educational webinar. Register now!
  • Operational Risk Management for 2020 and Beyond
    Operational Risk Management for 2020 and Beyond
    Sam Abadir Nov 7 2019 5:00 pm UTC 60 mins
    Operational risks have been constantly increasing due to immature processes, unmanaged third parties and more. With the growing number of complex products and services, this issue is intensified, and traditional operational risk management can't keep up.

    In this live webinar, Lockpath’s Sam Abadir will share what operational risk management for 2020 and beyond looks like, including:

    • What areas operational risk management encompasses

    • How your organization can gain efficiency from proper operational risk management

    • Advantages of managing operations on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage operational risk in 2020 and beyond by attending this educational webinar. Register now!