Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Assessing IT Risk in a Healthcare Environment
    Assessing IT Risk in a Healthcare Environment Scott Breece - Community Health Systems, Sam Abadir - Lockpath Recorded: Jun 21 2018 59 mins
    In this webinar, Lockpath’s Sam Abadir and Community Health System’s Scott Breece will discuss the unique IT landscape of the healthcare industry and the challenges this presents for IT risk management.

    Abadir and Breece will discuss common strategies for identifying and managing IT risks including risk assessment methodologies, best practices for assessing business associates and third parties, incident response plans, and available toolsets to support these activities.
  • How Exclusion Risk Impacts Healthcare Providers and How to Manage It
    How Exclusion Risk Impacts Healthcare Providers and How to Manage It Scott Steinhardt - Kinney Services, Chris Swift, Lockpath Recorded: Jun 21 2018 46 mins
    For healthcare providers that receive Medicare and Medicaid reimbursements, managing exclusion risk is critical. Employees, business associates, suppliers, and more who land on state exclusion lists while employed or engaged by a provider can result in severe regulatory penalties. In this educational webinar, Lockpath and Kinney Services will guide you through the world of exclusion risk and point out what you need to know.

    Attendees will learn:

    * A definition of exclusion risk with real-world examples
    * Challenges encountered with managing exclusion risk
    * Strategies for implementing a consistent, repeatable review process
    * Technology's role in streamlining exclusion risk management

    Are you continually reviewing the exclusion status of employees and business entities? If not or reviews are conducted haphazardly, you run the risk of regulatory penalties and a potential crisis in the reimbursement process. Discover what you need to know to managing exclusion risk in this educational webinar.
  • Collecting Responsive ESI from Difficult Places
    Collecting Responsive ESI from Difficult Places Doug Austin and Tom O'Connor Recorded: Jun 20 2018 66 mins
    Believe it or not, there was a time when collecting potentially responsive ESI from email systems for discovery was once considered overly burdensome. Now, it’s commonplace and much of it can be automated. But, that’s not where all of the responsive ESI resides today – much of it is on your mobile device, in social media platforms and even in Internet of Things (IoT) devices. Are you ignoring this potentially important data? Do you have to hire a forensics professional to collect this data or can you do much of it on your own? This CLE-approved* webcast will discuss what lawyers need to know about the various sources of ESI today, examples of how those sources of data can be responsive to litigations and investigations, and how lawyers may be able to collect much of this data today using intuitive applications and simple approaches. Topics include:

    + Challenges from Various Sources of ESI Data
    + Ethical Duties and Rules for Understanding Technology
    + Key Case Law Related to Mobile Devices, Social Media and IoT
    + Options and Examples for Collecting from Mobile Devices
    + Options and Examples for Collecting from Social Media
    + Examples of IoT Devices and Collection Strategies
    + Recommendations for Addressing Collection Requirements
    + Resources for More Information

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Initial coin offerings: recent legal developments
    Initial coin offerings: recent legal developments Fredo Silva, Joshua Klayman and Daniel Kahan, Morrison & Foerster Recorded: Jun 20 2018 91 mins
    This webcast will discuss the latest developments related to initial coin offerings (also known as ICOs or token offerings), which are dramatically changing the ways in which organisations raise capital.

    Panellists will discuss:
    - recent market updates;
    - investment trends;
    - regulatory considerations; and
    - best practices.
  • Customer Interview - CNO Financial - Full Interview
    Customer Interview - CNO Financial - Full Interview Shelly Hogan - CNO Financial, Sam Abadir - Lockpath Recorded: Jun 19 2018 13 mins
    Hear how CNO Financial is streamlining their Compliance and Policy Management program with the Keylight GRC Platform.

    See the Attachments tab to access the full list of interview excerpts.
  • Customer Interview - CNO Financial - Who is Involved
    Customer Interview - CNO Financial - Who is Involved Shelly Hogan - CNO Financial, Sam Abadir - Lockpath Recorded: Jun 19 2018 1 min
    Hear how CNO Financial governs their policy review process.

    See the Attachments tab to access the full list of interview excerpts.
  • Customer Interview - CNO Financial - Building a Compliance Program
    Customer Interview - CNO Financial - Building a Compliance Program Shelly Hogan - CNO Financial, Sam Abadir - Lockpath Recorded: Jun 19 2018 2 mins
    Hear how CNO Financial is streamlining their Compliance and Policy Management program with the Keylight GRC Platform.

    See the Attachments tab to access the full list of interview excerpts.
  • Rethinking the Identity Risk Equation
    Rethinking the Identity Risk Equation Jannie Wentzel & Randy Potts - Focal Point Data Risk Recorded: Jun 19 2018 41 mins
    Identity risk impacts multiple business functions within an organization. Vendor risk, business continuity, compliance, and more all strive to reduce risk exposure with limited regard to the holistic picture. This session discussed how to shape this breadth of exposure and provide guidance and strategy to Identity Risk Management.
  • Financial Implications of Climate Change Legislation and Litigation
    Financial Implications of Climate Change Legislation and Litigation James Cameron Recorded: Jun 19 2018 46 mins
    In this webinar, we discuss the financial implications of climate change legislation and litigation with Richard Saines, Richard Lord and James Cameron.

    Agenda:
    - Current trends in climate litigation

    - Climate change and fiduciary duty, are they linked? 

    - Legal issues and their likely impact on US corporations and investors worldwide

    - Risk mitigation in the era of climate change for investors and company directors

    Speakers:
    Richard Saines, Partner at Baker McKenzie
    
Richard heads the North America Climate Change and Environmental Markets Practice at Baker McKenzie. He is recognised by Chambers USA and Chambers Global as a leading climate change lawyer.

    Richard Lord, Q.C. at Brick Court Chambers, London

    Richard has appeared in and advised on numerous cases in tribunals at The Supreme Court and House of Lords. He co-edited the book Climate Change Liability: Transnational Law and Practice.

    James Cameron, Chairman of Overseas Development Institute, and Chairman of Engaged Tracking
    
James has worked on climate change matters including the United Nations Framework Convention on Climate Change and Kyoto Protocol. He recently advised the Fijian presidency at COP23 in Bonn.
  • How well is your sanctions compliance process working?
    How well is your sanctions compliance process working? Huntswood, SWIFT Recorded: Jun 14 2018 60 mins
    Join SWIFT and Huntswood for an interactive discussion to help you address your sanctions compliance challenges.

    In many markets regulators now require you to screen transactions and customers against a number of rapidly evolving sanctions lists.

    Automated filtering tools, while effective, will generate false positives and false negatives. Follow up investigations must be conducted manually, which is time consuming and risky.

    This webinar will explain how implementing best practices can help you fulfil auditing and transparency requirements while also improving operational efficiency and reducing costs.

    In addition, we will cover how to:

    - Address evolving sanctions regulatory requirements
    - Simplify conversations with regulators
    - Balance internal resources for effectiveness and efficiency
    - Optimise global and internal list management
    - Upgrade your screening platforms without disrupting business operations

    Meet the panellists

    - Graham Hooper, Huntswood FCR Advisory Panel Member (formerly Director of Financial Crime Risk at Lloyds Banking Group)
    - Stephen Elliot, Managing Director of Financial Crime, Information and Payments, Huntswood
    - Tony Wicks, Head of AML and Fraud Prevention Initiatives, SWIFT (moderator)

    Date: Thursday, 14th June | Time: 13:00 GMT

    Not sure you can join? You can still register as we will be sharing the recording following the event.
  • Security Awareness - Sicherheitsbewusstsein aller Mitarbeiter schärfen
    Security Awareness - Sicherheitsbewusstsein aller Mitarbeiter schärfen Falk Trümner, DriveLock Senior PreSales Consultant Recorded: Jun 14 2018 38 mins
    Zusätzlich zu Angreifern von außen stellt das Verhalten von Mitarbeitern eine Gefahr für Unternehmen dar. Deswegen muss das Sicherheitsbewusstsein aller Mitarbeiter geschärft werden, um das Risiko von internen Bedrohungen zu minimieren. Das Aufgabenfeld von Sicherheitsteam steigt somit weiter an.
  • Why IAM Built on Open-Standards is the Key to Open Banking
    Why IAM Built on Open-Standards is the Key to Open Banking Rob Otto, EMEA Field CTO, Ping Identity; Barry O'Donohoe, Senior Partner, RaiDiAM Recorded: Jun 13 2018 60 mins
    Security, Compliance and User Experience - Why Identity Access Management Built on Open-Standards is the Key to Open Banking

    Learn how identity & access management (IAM) solutions, built on open standards, can help meet the technical requirements of PSD2 and Open Banking, including secure XS2A (access to accounts), Strong Customer Authentication (SCA), Dynamic Linking, and Consent Management, all while providing a seamless user experience and distinct competitive advantage.
  • Piecing Together IoT Risk from Flexible & Fractured Design Components
    Piecing Together IoT Risk from Flexible & Fractured Design Components Dr. Srinivas Mukkamala, CEO and Co-Founder, at RiskSense Recorded: Jun 12 2018 47 mins
    How do you handle risk assessment and vulnerability management for IoT when multiple security patterns need assessment? There is a new frontier for security that requires breaking conventional control and mitigation assumptions before a Frankenmonster rises from your IoT project.

    In this webinar, RiskSense CEO and Co-Founder Dr. Srinivas Mukkamala will discuss:

    - The assessment of chaining together multiple vulnerabilities and the potential exploit path through flexible and fractured design components for IoT.
    - Consideration for dynamically changing devices and utilization models that break traditional security and risk assessments.
    - IoT risk and the growing need to incorporate threat data, unintentional device use-cases, and the mechanisms to keep constant control of the devices themselves.
  • Risk Management - The Three Pronged Approach
    Risk Management - The Three Pronged Approach Christopher Heinz - Guidewire Recorded: Jun 12 2018 36 mins
    Looking to improve on the standard approaches to risk management? Guidewire has taken a more holistic approach. By using multiple, interwoven workflows within a single Keylight application, Guidewire's Information Security teams are able to deliver more than just tactical value to the organization and subsequently, our customers. See how Guidewire leveraged Keylight's flexible nature to allow for multiple avenues of assessing and mitigating risk.
  • LIVE DEMO - Securing your Open Banking API implementation
    LIVE DEMO - Securing your Open Banking API implementation Isabelle Mauny, CTO & Co-Founder, 42Crunch Recorded: Jun 7 2018 62 mins
    .During this practical webinar, you will learn:
        
    1. Why TLS and OAuth2 are not enough to secure your APIs
    API Security has a much wider spectrum and even if you are using OAuth today, you may not use it in a way that is adapted to the risk taken when exposing Open banking APIs. What about API attacks protection ? PKCE ? Message confidentiality and integrity ? 

    2. Why API security must be declared and not coded
    Developers should not have to master security standards such as OAuth and OpenID Connect and try to implement them properly into their APIs. Instead, they should rely on proven, reliable policies approved by the bank’s security team and simply apply those policies on top of their APIs.

    3. How declarative security helps with consistency and automation
    42Crunch's innovative tagging mechanisms can be used by developers to express security constraints on top of their Open API definitions (aka Swagger). Those tags are translated automatically, either via the UI or in the CI/CD pipeline into policies which are applied on APIs requests/responses, making it possible to apply security as early as possible in the API lifecycle and find security vulnerabilities early.

    4. How to enforce security in a scalable way using micro-firewalls
    We will show how to deploy the 42Crunch API Firewall at run-time whether on premises, in the Cloud or in a hybrid environment and how to monitor the system through real-time security dashboards.
  • IdentityMind 2.0: How our Clients Helped us Shape Transaction Monitoring
    IdentityMind 2.0: How our Clients Helped us Shape Transaction Monitoring Faisal Nisar – Director of Products, IdentityMind Recorded: Jun 6 2018 40 mins
    Transaction monitoring is required to meet AML and counter-terrorist financing (CTF) regulations. A good program can dynamically select the right sources of information to catch suspicious activity without bogging down compliance analysts with manual work. Many companies are still using dated or custom-built software which won’t pass muster with regulators, and make it harder to get that balance right. The best compliance programs take a risk-based approach, employing more stringent measures for higher-risk clients, while employing more lenient measures for trusted clients.

    With IdentityMind 2.0, we partnered with our clients to incorporate a highly accurate risk-based approach into our platform. IdentityMind 2.0 harnesses machine learning and time series anomaly detection to reduce false alerts, to increase automation, and to deliver a complete solution for your AML needs.

    Register for our webinar to see:

    • How we worked closely with our clients and incorporated their feedback into creating a powerful transaction monitoring tool in IdentityMind 2.0
    • How IdentityMind 2.0 allows you to implement a risk-based approach, in keeping with regulatory guidance
    • The benefits of moving to a user-first system for transaction monitoring analysis and investigation
    • How our pioneering work in digital identities underpins everything in the platform, delivers more accurate insights, and protects your business from fraudulent and criminal activity
  • Compliance Lifecycle 101
    Compliance Lifecycle 101 Lisa Hartford & Molly Stolpman - GCI Recorded: Jun 5 2018 43 mins
    Have you ever wondered how to get from point A to point B in the compliance world? This session walked through a complete compliance lifecycle showing you how to go from identifying what security framework to follow to providing reports to management.
  • Leveraging Keylight for ISO and SOC 2 Audit Success
    Leveraging Keylight for ISO and SOC 2 Audit Success Chris LaVesser - JLL, Matt Crome - Lockpath Recorded: May 31 2018 55 mins
    Selecting a solution to assist your organization in managing ISO and SOC 2 audits is no minor decision. This webinar explored the key steps for preparing to move a process to Keylight, from understanding your own data, to how best to utilize resources. We looked closely at the before and after effects of a successful implementation strategy for managing risks and audits.
  • Ready for the Omnichannel Challenge in Consumer Electronics Retailing?
    Ready for the Omnichannel Challenge in Consumer Electronics Retailing? Vanessa Hodgkinson, Openbravo Recorded: May 31 2018 38 mins
    We will review in this webinar the main challenges facing electronics retailers today, such as the fast-changing purchasing habits of omnichannel shoppers, greater assortment complexity, and the growing competition from online players. To stay competitive, retailers must make a step change in agility and innovation in their retail operations, adopt greater pricing and discounting agility, and put a sharper focus on customer service.

    We will discuss how Openbravo can help these retailers achieve greater competitiveness in this more challenging environment, with tools like mobile POS with integrated RFID or mobile payment options. We will explain how Openbravo can help you achieve more accurate sales forecasts and gain enterprise-wide real-time inventory visibility with advanced warehouse management capabilities from mobile devices.
  • eDiscovery for the Rest of Us
    eDiscovery for the Rest of Us Doug Austin and Tom O'Connor Recorded: May 30 2018 63 mins
    Does it seem like eDiscovery technology today is only for the “mega-firms” and “mega-cases”? What about for the “rest of us”? Are there solutions for the small firms and cases too? What does the average lawyer need to know about eDiscovery today and how to select a solution that’s right for them? This CLE-approved* webcast will discuss what lawyers need to know about eDiscovery, the various sources of data to consider, and the types of technology solutions to consider to make an informed decision and get started using technology to simplify the discovery process. Topics include:

    + How Automation is Affecting All Industries, including eDiscovery
    + Drivers for eDiscovery Automation Today
    + Challenges from Various Sources of ESI Data
    + Ethical Duties and Rules for Managing Discovery
    + Getting Data Through the Process Efficiently
    + Small Case Examples: Ernie and EDna
    + Key Components of an eDiscovery Solution
    + Types of Tools to Consider
    + Recommendations for Getting Started

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • PCI DSS, GDPR & Data Security for Call Centers: Navigating Regulatory Landmines
    PCI DSS, GDPR & Data Security for Call Centers: Navigating Regulatory Landmines Scott Kaplan, Semafone, Chanley Howell, Foley & Lardner LLP Recorded: May 24 2018 56 mins
    With the onslaught of cyberattacks we've already seen in just this year alone, data security has never been a higher priority for organizations. Protecting customer data is of utmost importance, especially with governments and regulatory bodies increasingly turning their attention to these issues and producing legislation to implore companies to take additional security measures.

    Contact centers are a part of the organization particularly fraught with responsibility, serving as a vast repository of sensitive customer data and finding themselves to be a favorite target for hackers and fraudsters. Because of this, contact centers face a myriad of laws and regulations governing the way they treat this data, such as the PCI DSS for those taking payments, among many others.

    Register now to join Scott Kaplan from Semafone and Chanley Howell from Foley & Lardner LLP, two leaders in the data security field for an insightful webinar where you'll learn:

    - The top data security regulations, laws, and standards bodies affecting contact center data governance
    - How to comply with sometimes competing regulatory requirements and resolve conflicting stipulations
    - How to achieve compliance more simply and cost effectively

    Additionally, registrants will receive a free copy of Semafone's newly released Navigating the Challenging Regulatory Landscape in Your Contact Center.

    Reserve your space now!
  • CECL Planning & Implementation: Smaller, Less Complex Financial Institutions
    CECL Planning & Implementation: Smaller, Less Complex Financial Institutions C. Michael Baron, Erik Mahlke, and John R. Fleming with Experis Recorded: May 24 2018 61 mins
    Issued by the FASB in 2016, the implementation dates for CECL (Current Expected Credit Loss) are approaching and it is essential that appropriate planning and implementation tasks start soon so that banks can be assured of meeting key milestones, most notable the objective of running parallel calculations for the year preceding the go live date. Proper CECL planning is a multi-discipline effort, requiring the time and effort of many of each bank’s accounting, risk and IT groups.
    This informative webinar will provide a practical overview of planning and implementation considerations facing smaller, less complex financial institutions, including coverage of the following topics:
    •Description of the CECL standard and comparison to the existing Incurred Loss Method (we will focus our discussion on the impact to the ALLL account)
    •Review of key planning and implementation tasks including guidance needed to establish timelines, key decisions that need to be made and how to leverage existing processes
    •Update on recent CECL developments including regulatory guidance on potential capital treatment and a description of the proposed auditing standard covering estimates

    Our presenters will share their perspectives and industry experience:
    C. Michael Baron (CIA, CISA, CFSA, AMLP)
    Regional Practice Director, Financial Services – Northeast

    Erik Mahlke
    Engagement Manager, Financial Services – Midwest

    John R. Fleming
    Technical Accounting SME, Financial Services - Northeast
  • Making Risk Meaningful
    Making Risk Meaningful Adam Billings, Lockpath Recorded: May 24 2018 44 mins
    How do you make sense of all that risk data your organization collects? Imagine not only analyzing risk data more efficiently but also bringing meaning to risk. It's possible. It takes leadership, alignment, standardization, and a clear risk methodology to discover connections in data. In this webinar, we'll share how to go about making risk meaningful. You'll learn:

    · Common methodologies for interpreting risk

    · Status of risk management in your organization

    · Frameworks and strategies for seeing risk in a new light

    · Keys to success in advancing your risk program

    There's no shortage of data collected. What's in short supply is, what does it all mean? Explore what works and what's possible in this educational webinar.
  • Understanding the SEC’s Guidance on Cybersecurity Disclosures and Compliance
    Understanding the SEC’s Guidance on Cybersecurity Disclosures and Compliance Marty Dunn and Emily Beers, Morrison & Foerster; Suzanne Barr, Fannie Mae Recorded: May 24 2018 61 mins
    The US Securities and Exchange Commission (SEC) recently indicated it was intensifying scrutiny of public companies’ cybersecurity practices. In this webinar we will cover:
    - The latest SEC guidance on cyber risk disclosure and insider trading practices for public companies;
    - The impact of the guidance on public company disclosure regarding cyber risk disclosure;
    - Insider trading practices following the guidance; and
    - Recent SEC enforcement action regarding cyber risk disclosure.
  • GDPR: Cutting Through the Noise
    GDPR: Cutting Through the Noise Alex Jordan, Senior Analyst, ISF LTD Recorded: May 24 2018 47 mins
    Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.

    So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?

    Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:

    -The ISF’s phased approach to GDPR implementation
    -Ways to determine the criticality of data and how to protect it appropriately
    -The urgent actions that a business can take to get GDPR compliance started
    -Common myths surrounding the GDPR, and guidance on cutting through the noise.
  • Judge Peck and the Adventure of the Missing 502(d) Order
    Judge Peck and the Adventure of the Missing 502(d) Order Judge Andrew J. Peck, Michael Simon Jun 26 2018 6:00 pm UTC 60 mins
    It may be the greatest unsolved mystery in the legal practice: the case of the missing 502(d) order. These orders can act as a strong shield against the waiver of privilege or protection when information is inadvertently produced during litigation—providing much more protection than a clawback agreement alone.

    Yet observe the typical courtroom today and such orders will almost never be found. Why?

    Join Judge Andrew J. Peck as he discusses the potential benefits of 502(d) orders, why and how to use them, and why so many lawyers are failing to fully protect client information during litigation.

    About Judge Peck:

    Judge Andrew J. Peck has been a leading name in eDiscovery since 1995, when he was first appointed Magistrate Judge for the Southern District of New York. Just a few months after taking the bench, shortly after O.J. Simpson’s trial concluded and Windows 95 was released, Judge Peck issued a key eDiscovery opinion, ruling that companies must make electronic versions of their computerized data available during discovery.

    In the years that followed, Judge Peck penned several widely influential opinions, from the first opinion approving the use of predictive coding in Da Silva Moore v. Publicis Groupe to a recent warning to the bar over boilerplate discovery objections in Fischer v. Forrest. Judge Peck retired from the bench in March and now serves as senior counsel at DLA Piper.
  • Why Brexit will hurt productivity in Financial Services the most...
    Why Brexit will hurt productivity in Financial Services the most... Mark Elwood - Marketing Director, TeleWare Jun 27 2018 10:00 am UTC 60 mins
    ... and the technologies that will prevent it.

    Join this webinar to hear how technology is creating a mobility enabled workforce to increase productivity in financial services and the lessons other sectors can learn.

    In the words of Nobel Laureate Paul Krugman ‘productivity isn't everything, but in the long run it is almost everything.’

    Creating a modern workforce that has access to the technology that will improve productivity is key to ending the productivity crisis. TeleWare, working with Financial Services clients are helping create a mobile enabled workforce designed to improve productivity. These lessons can be adopted in many vertical sectors, particularly in a post GDPR and Brexit world.

    Find out:
    • Why you should be focusing on increasing productivity in your business
    • How enabling your employees to use the latest technology with no cost to your business can improve employee satisfaction and create growth
    • Why mobility is the secret weapon in the fight against stagnant productivity growth
    • Which technologies you should be thinking about to create a mobility enabled workforce

    Target Audience:
    • Finance, Retail, Professional Services, Manufacturing, Construction, Health
    • UK & Ireland
    • SME – Enterprise
    • IT, Operations role profiles

    Join us for this insightful webinar that explores the technologies firms are adopting to help increase productivity and to beat their competition.
  • Prêt pour le challenge omnicanal du retail multimarque des articles de sport ?
    Prêt pour le challenge omnicanal du retail multimarque des articles de sport ? Christophe Dubuis Jun 28 2018 8:30 am UTC 60 mins
    Ce webinar présentera les avantages de la solution Openbravo Commerce Cloud pour les distributeurs d'articles de sport. Nous comprenons les défis de l’industrie du sport et nous vous présenterons le retour d’expérience avec certains de nos clients tel que Decathlon.
  • Take Your AML Operations from Wish List to Success
    Take Your AML Operations from Wish List to Success Jose Caldera, Chief Products and Marketing Officer, IdentityMind; Julie Conroy, Research Director, Aite Group Jun 28 2018 6:00 pm UTC 75 mins
    You know what you need to do to make your AML program a success. But, the gap between what you know you need and what you can deliver relegates those plans to the wish list.

    You’ve tried connecting different systems and data sources but find yourself stuck with a limited system that cannot keep up with what you need to be effective. The operational impact is significant and the fear of missing something important is always present.

    Modern technologies like IdentityMind can help you bridge the gap.

    We invite you to listen to Julie Conroy, Research Director at Aite Group and Jose Caldera, Chief Products and Marketing Officer at IdentityMind to discuss the current landscape of threats and compliance risk, how new technologies can address them, and a path for moving from legacy systems to the adoption of these new technologies.
  • Seize the opportunity: move your retail business to Openbravo Cloud
    Seize the opportunity: move your retail business to Openbravo Cloud Marcin Niskiewicz Jul 3 2018 9:30 am UTC 60 mins
    The webinar looks at the benefits of Openbravo Cloud in terms of ease-of-use, scalability, security and guaranteed service levels. We explain how Openbravo Cloud leverages the strengths of world-class cloud infrastructure providers such as Amazon Web Services.
  • Aproveche la oportunidad: gestione su negocio retail con Openbravo Cloud
    Aproveche la oportunidad: gestione su negocio retail con Openbravo Cloud Xavier Places Jul 3 2018 3:00 pm UTC 60 mins
    Conozca en este webinar los beneficios de la Openbravo Cloud en términos de facilidad de uso, escalabilidad, seguridad y garantía de niveles de servicio. Explicamos cómo la Openbravo Cloud aprovecha las fortalezas de los proveedores de clase mundial de infraestructuras en la nube como Amazon Web Services.
  • Omnichannel leader or laggard? What's your choice as a fashion retailer?
    Omnichannel leader or laggard? What's your choice as a fashion retailer? Vanessa Hodgkinson, Marketing Specialist at Openbravo Jul 10 2018 9:30 am UTC 60 mins
    We explain how Openbravo Commerce Cloud lets you truly embrace omnichannel retailing by enabling centralized management of all customers, channels and inventory to deliver the promise of a seamless shopping experience.
  • ¿Líder Omnicanal o rezagado?¿Cuál es su elección para su negocio retail de moda?
    ¿Líder Omnicanal o rezagado?¿Cuál es su elección para su negocio retail de moda? Xavier Places, Director de Marketing en Openbravo Jul 10 2018 3:00 pm UTC 60 mins
    Este webinar tratará los retos principales a los que se enfrentan hoy los minoristas de moda frente al creciente poder del comprador omnicanal, que requieren mayor agilidad y capacidad de innovación como elementos clave para su competitividad.
  • Roadmap to Smarter Business Continuity Management
    Roadmap to Smarter Business Continuity Management Sam Abadir, VP of Industry Solutions, Lockpath Jul 11 2018 4:00 pm UTC 60 mins
    Business interruptions can upset customers, cost sales, and put companies in a bad light. That's where business continuity management (BCM) comes in. A BCM plan details the impact of various disaster scenarios and formalizes steps for ensuring critical operations remain open during a crisis. In this live webinar, Lockpath's Sam Abadir will share a roadmap to smarter business continuity management.

    You'll learn:

    * The role of business continuity management on operations
    * How to identify risks that could potentially lead to disruptions
    * Strategies for modeling the business impact of various disasters
    * Importance of mapping plans to risk, controls, processes, and vendors

    Learn how to better prepare your recovery plans by attending this webinar on smarter business continuity management. Register now!
  • How expense report misconduct is the gateway drug into larger occupational fraud
    How expense report misconduct is the gateway drug into larger occupational fraud Guido van Drunen, Principal at KPMG Jul 11 2018 6:00 pm UTC 45 mins
    KPMG's Guido van Drunen has 30 years of experience in forensic accounting, auditing, finance, and law enforcement. He's skilled in leading and conducting complex financial investigations. He's led global investigations, with 10 years of law enforcement experience in various jurisdictions. In this webinar he will share his experiences monitoring early-stage occupational fraud, and trouble-signs to look forward as the misconduct grew into multi-million-dollar work crimes.
  • Hot Topics for Internal Audit
    Hot Topics for Internal Audit Tim Lietz and Ed Williams of Experis Finance Jul 18 2018 4:00 pm UTC 60 mins
    Experis Finance is pleased to announce the first of our Hot Topics Series for Chief Audit Executives and their teams. Our goal is to provide you with a series of webinars that provide practical insights on topics of interest to internal audit professionals. Our first session will cover Agility and preparing for Robotic Process Automation.

    The webinar will provide participants with the following learning objectives:

    •Define Agility in the context of Internal Audit
    •Share pragmatic insights in how to define and execute an Agile transformation
    •Discuss RPA and in practical terms as companies begin to assess, plan and implement
    •Highlight the role of audit in assessing the overall RPA plan
    •Link the opportunities of RPA to the concepts of Agile Auditing

    Presented by:
    Tim Lietz – CIA, CRMA, MBA
    Regional Director, Risk Advisory Services
    Experis Finance

    Ed Williams CIA, CRMA
    Sr. Manager, Risk Advisory Services
    Experis Finance
  • Accelerate Open Banking with APIs, Strong Authentication and Risk-Based Security
    Accelerate Open Banking with APIs, Strong Authentication and Risk-Based Security From CA Technologies: Sanjay Tailor, Mehdi Medjaoui, Robert Lindberg, David Chui Jul 19 2018 2:00 pm UTC 60 mins
    Whether driven by PSD2 compliance, market demand for mobile apps, or fintech competition, open banking is becoming a top priority for financial businesses. Through exclusive research and customer successes, we determined that building a modern application architecture with APIs, microservices and strong authentication is a key success factor in this space. In fact, our latest report shows that fully digital banks enjoy an estimated 25% cost-to-income ratio, versus 60% for traditional institutions.

    For this webcast, we assembled a panel that includes Mehdi Medjaoui, author of Banking APIs: State of the Market, along with experts in API and security capabilities, to introduce the elements of modern application architecture that all digital banking business leaders should know about – API management, microservices, strong authentication and risk-based security. You’ll learn about:

    * The current state of open banking, and what your peers are doing

    * How to invest in modern application architecture to improve your open banking projects

    * How to align better with IT to accelerate your time-to-market

    All registrants will also benefit from a complimentary copy of our Banking APIs: State of the Market report.
  • Key eDiscovery Case Law Review for First Half of 2018
    Key eDiscovery Case Law Review for First Half of 2018 Doug Austin and Tom O'Connor Jul 25 2018 5:00 pm UTC 75 mins
    Legal precedents set by past case law decisions remain one of the best ways to guide lawyers on how to do their job, especially when it relates to eDiscovery best practices. Case law examples help lawyers avoid mistakes made by others, as well as saving time and money for their clients. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2018 to enable lawyers to learn from these cases. Key topics include:

    + Is there a template for how parties should cooperate in a Technology Assisted document review?
    + Should a plaintiff be allowed to email all defendant employees to see if they have responsive documents?
    + Will fabrication of text messages result in sanctions post Rule 37(e)?
    + Can Twitter be compelled to produce direct messages between their own employees?
    + Can an individual be compelled to produce private Facebook photos by the opposing party?
    + How have proportionality considerations in the 2015 Federal rules affected scope of discovery?
    + Should a receiving party be granted a quick peek at privileged documents to resolve privilege disputes?
    + Should border searches of electronic devices require a warrant?
    + Can you be sanctioned for discovery violations even after a jury verdict?

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. 

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Discovering a Competitive Advantage with ISO 27001 Certification
    Discovering a Competitive Advantage with ISO 27001 Certification Jason Eubanks - Lockpath Jul 26 2018 4:00 pm UTC 60 mins
    Organizations with mature, enterprise-wide information security risk management programs enjoy a competitive advantage, thanks to ISO 27001 certification that signifies an international standard for safeguarding information. In this webinar, Lockpath's Jason Eubanks, a governance, risk management, and compliance (GRC) consultant and former ISO auditor, will share the business case for earning ISO 27001 certification and the critical role of a GRC platform in implementing a successful information security management system (ISMS).

    You'll learn:

    • Challenges and pitfalls with ISO 27001 certification
    • Tips on establishing and maturing an ISMS
    • Strategies for preparing and passing ISO audits
    • Technology's role in earning and maintaining certification

    Learn how ISO 27001 can give you a competitive advantage and strategies for earning certification. Register now to attend this educational webinar.
  • How GCI Built Its Security and Compliance Program
    How GCI Built Its Security and Compliance Program Lisa Hartford - GCI, Sam Abadir - Lockpath Aug 2 2018 5:00 pm UTC 60 mins
    General Communication Inc. (GCI), a telecommunications company based in Alaska, spent a year building its security and compliance program from the ground up. In this webinar, you'll see how GCI did it, starting with one person using the Keylight Platform, through challenges like creating new process and tearing down silos, to where they are by year-end: a fully engaged team leveraging Keylight to manage security and compliance.

    As a webinar attendee, you'll learn GCI's secret to:

    * Finding and training IT and security professionals
    * Developing new or streamlining existing processes
    * Scaling Keylight to address security and compliance requirements.

    Regardless of your program's status, hearing GCI's lessons learned can inspire and guide you in building or improving your company's security and compliance program. Register for this educational webinar today.
  • Roadmap to Smarter Audits
    Roadmap to Smarter Audits Sam Abadir, VP of Industry Solutions, Lockpath Aug 15 2018 4:00 pm UTC 60 mins
    Audits provide a vital checks and balances function in an organization. But what if audit's role as the third line of defense was more efficient and strategic? Doing so would enhance the role of the internal auditor. In this live webinar, Lockpath's Sam Abadir will share the roadmap to smarter audits, including:

    • Critical capabilities required for the audit process
    • Importance of customizing messaging to stakeholder audiences
    • The pros and cons of current audit management strategies
    • Strategic, effective audits that can scale with future growth

    More strategic and effective audits won't come from current processes. Discover the road to smarter audits by attending this educational webinar. Register now!
  • Security in the Golden Age of Cloud
    Security in the Golden Age of Cloud Steve Durbin, Managing Director, ISF LTD Oct 23 2018 12:00 pm UTC 45 mins
    Demand for cloud services continues to increase as the benefits of cloud services change the way organisation manage their data and use of IT.

    However, while these services can be implemented quickly and easily, with increased legislation and data privacy, the threat of cyber theft is on the increase and organisations must have a clear understanding of where their information is stored and how reliant these services are.

    In this webinar, Steve Durbin, Managing Director of the ISF will discuss the risks associated with cloud computing and how to manage them, as well as how to maximise the benefits.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.