Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Are you ready for GDPR?
    Are you ready for GDPR? Lockpath Recorded: Nov 22 2017 1 min
    Visit https://lockpath.com/gdpr-checklist for more information on GDPR.

    Gophers Dance Practically Right?

    Giant Dinosaurs Prance Righteously?

    NO!

    General Data Protection Regulation. An EU data protection regulation that probably affects you and your business.
  • Bringing Order to the Chaos of Audit Management
    Bringing Order to the Chaos of Audit Management Sam Abadir, Director of Product Management, LockPath Recorded: Nov 21 2017 56 mins
    Companies and organizations are subjected to multiple types of audits, from internal governance to regulatory requirements to industry standards. Within each, the organization must identify auditable entities, conduct numerous audit activities and communicate findings. Audit management has become a matrix too complex for organizations to rely on spreadsheets, email, or basic collaboration software to perform.

    This reality has created the demand for an automated solution that organizes and centralizes every step of the audit process: risk assessment, planning, fieldwork and testing, time and expense management, issue tracking, workpaper management, reporting and remediation.

    In this webinar, LockPath’s Sam Abadir demonstrates the audit management capabilities of the Keylight Platform to define the audit universe, initiate audit projects and tasks, and generate audit findings and corrective actions.
  • Streamline Your Audit Process With Lockpath Keylight
    Streamline Your Audit Process With Lockpath Keylight Lockpath Recorded: Nov 21 2017 2 mins
    Manage Internal Audits Effortlessly & Effectively with the Lockpath Keylight Platform.

    Visit Lockpath.com/solutions/audit-management for more info.
  • How the State of Arizona Took a Proactive Stance Against Cyber Risk Management
    How the State of Arizona Took a Proactive Stance Against Cyber Risk Management Morgan Reed, Mike Lettman, and Dr. Srinivas Mukkamala Recorded: Nov 20 2017 52 mins
    In this webinar, Morgan Reed (CIO) and Mike Lettman (CISO) from the State of Arizona will discuss with RiskSense CEO Srinivas Mukkamala a case study on how the State of Arizona has implemented a proactive cyber risk management program that uses a credit score like model for assessing threats and remediating those that matter most.

    Mr. Reed, Mr. Lettman, and Dr. Mukkamala will continue and expand on their conversation initially started during a learning lounge panel at this year's 2017 NASCIO Conference. They will dive into the details of how their risk management approach has enabled IT to better measure and communicate risk to business leaders, and strategically focus on the most imminent cyber vulnerabilities in their environment.
  • Unite InfoSec and DevOps and Still Achieve Enterprise-wide Security
    Unite InfoSec and DevOps and Still Achieve Enterprise-wide Security Gary Southwell, General Manager, CSPi Recorded: Nov 16 2017 46 mins
    As organizations move to an agile DevOps model, they are confronted with one major question: How can they manage existing information-security processes to ensure data privacy?

    Since data breaches are not going to go away, organizations really need to focus on how to make breaches irrelevant so that in the event of a breach the data either will not be accessed, or if it is it won’t be in usable form.

    In this webinar, created for application developers and data security resources, CSPi will not only review best practices but also present a software framework to show how organizations can achieve uncompromised enterprise-wide security. Created for application developers and data-security resources, this webinar will also show you how this new approach complements established InfoSec security requirements and maintains the agile benefits of DevOps – all while providing the automated protection of critical data under any use.

    Don’t miss this webinar! Register today.

    Webinar highlights:
    Join us for this valuable webinar to learn how you can:
    1.Uniformly and automatically apply security policies across the enterprise, including containers and VMs as they spawn.
    2.Offload core-intensive security functions while improving application performance.
    3.Secure critical assets in all cases – in motion, at rest, and in use.
  • Emerging Cyber Threats for 2018
    Emerging Cyber Threats for 2018 Steve Durbin, Managing Director, ISF Ltd Recorded: Nov 16 2017 47 mins
    While cyberspace continues to provide opportunities for organisations they risk becoming disorientated and losing their way in a maze of uncertainty, as they grapple with complex technology, proliferation of data and increased regulation.

    In this webinar Steve Durbin, Managing Director, ISF, discusses the threats organisations will be facing in 2018 and offers insights into how to address them.
  • Lessons of a Cyber Attack to Prevent Future Cyber Epidemics
    Lessons of a Cyber Attack to Prevent Future Cyber Epidemics Srinivas Mukkamala PhD., CEO and Co-Founder RiskSense Recorded: Nov 14 2017 47 mins
    The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.

    Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.

    Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.

    What you will learn from this webinar:

    - How to prioritize what is most important when an attack happens.
    - Visibility into your attack surface and how to validate what the exposure is.
    - How to establish a metric based risk management program.

    About the Presenter:
    Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.

    Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.
  • Digitized identity verification - the future of ID & KYC
    Digitized identity verification - the future of ID & KYC Sarah Clark,Mitek Systems, Mike Montemarano, JP Morgan & Supriyo Guha, GENPACT Recorded: Nov 14 2017 49 mins
    Financial institutions from all over the world are facing increasingly strict regulations regarding the verification and authentication of their customers’ identity. Furthermore, with the increasing amount of data breaches, status-quo identity verification processes have not only been compromised but have also made complying with current regulations harder. This ever-changing environment has forced a tipping point for organizations to regard the adoption of new technologies for identity verification as a must-have rather than a nice-to-have.

    In the end, financial institutions must satisfy consumers’ demands for speed and ease of use to prevent them from going to the competition. To gain a competitive edge, remain compliant, and offer a frictionless and user experience, it is imperative for FIs to invest in technologies that bridge the compliance-convenience gap.
  • Considerations for Integrating Enterprise GRC Technologies
    Considerations for Integrating Enterprise GRC Technologies Brad Artigue, EY; Sam Abadir, LockPath Recorded: Nov 14 2017 50 mins
    GRC transformation is typified by the challenges of enterprise software implementation and exaggerated by the convergence of traditionally isolated business processes. EY has developed a measured approach to GRC transformation, developing an ecosystem that meets the current needs for consolidated reporting with minimal disruption to the current state of the business.

    In this session, EY discusses perspectives on GRC in general, trends in their customers’ use of GRC technologies, and their pragmatic approach to GRC transformation.
  • How to Trace Dirty Money
    How to Trace Dirty Money Carrie Tendler, Randall Arthur (both Kobre & Kim), James Mintz (Mintz Group) & George "Ren" McEachern (FBI) Recorded: Nov 13 2017 62 mins
    Coordinating Legal and Investigative Fact Finding to Recover Hidden Assets

    Kobre & Kim and Mintz Group will draw on their substantial experience in asset tracing and recovery to present on how legal teams and investigators can develop coordinated investigative strategies, including exploiting judicial mechanisms, to locate and recover debtor’s assets across multiple jurisdictions. The panel will outline the common steps debtors take to hide and structure assets and—in turn— how each of these steps provide opportunities for investigators and legal teams to find assets. Among the questions the panel will seek to answer are:
    •What judicial mechanisms in debtors’ favored jurisdictions can assist in tracing and recovering assets?
    •Are the patterns in how subjects hide assets the same around the world?
    •Are the patterns subjects use to hide and structure assets the same regardless of whether they are clean or dirty?
  • Road to GDPR: Critical Data Privacy Compliance
    Road to GDPR: Critical Data Privacy Compliance Ilanko Subramaniam, Director - Risk, Compliance and Data Protection, Templar Shield; Shane Westrup, Manager, LockPath Recorded: Nov 9 2017 57 mins
    GDPR compliance designed to protect personal information of EU citizens will be a complex and time-consuming undertaking for most organizations. The challenge is interpreting the regulation and incorporating the appropriate processes and technologies to protect personal data of EU employees. The discussions will start with establishing a Privacy program to support data strategy and drive a compliance roadmap. In this webinar, Templar Shield’s Ilanko Subramaniam and LockPath’s Shane Westrup will discuss the basic tenets of the General Data Protection Regulation, building out a data privacy and security program, and utilizing tools to help your organization establish the necessary framework to comply with this regulation.

    -----------------------------------------------------------------------------

    Disclaimer/No Attorney-Client Relationship/No Legal Advice
    The information presented is not legal advice or a legal opinion, and it may not necessarily reflect the most current legal developments. You should seek the advice of legal counsel of your choice before acting upon any of the information presented
  • Demostración Práctica: Progrese en la Omnicanalidad con Openbravo Commerce Cloud
    Demostración Práctica: Progrese en la Omnicanalidad con Openbravo Commerce Cloud Aurora Gete, Senior Pre-Sales Consultant en Openbravo Recorded: Nov 9 2017 50 mins
    Los clientes esperan ahora que los minoristas ofrezcan capacidades omnicanal y, si no pueden ofrecerlas, pueden irse a otro lado. Entonces, ¿cómo implementar su estrategia omnicanal con éxito y evitar los problemas que han afectado a muchos minoristas? Su software de venta minorista puede ser el punto más débil. Elija Openbravo Commerce Cloud y obtenga una solución innovadora y ágil basada en la nube diseñada para situar a la omnicanalidad en el centro de sus operaciones.

    Lo que aprenderá:
    En este webinar, aprenderá cómo Openbravo Commerce Cloud ayuda a desbloquear la agilidad y la innovación requeridas para adoptar la omnicanalidad en sus operaciones minoristas a través de robustas capacidades de punto de venta (POS) y gestión minorista sobre una plataforma rentable, confiable y escalable en la nube.

    Demostraremos cómo esta solución altamente flexible, móvil y lista para la nube le ayuda a soportar escenarios omnicanal esenciales como la compra online y recogida en tienda (BOPIS), compra online y devolución en tienda (BORIS) y otros, que aumentan la satisfacción del cliente durante su proceso de compra.
  • Governance, Risk, and Automation: Part 2
    Governance, Risk, and Automation: Part 2 Peter Tessin - Technical Research Manager, ISACA; Chris Swift - Product Manager, LockPath Recorded: Nov 9 2017 62 mins
    This is the first in a two-part series on governance, risk and automation.

    In Part I, we will explore concepts central to IT governance and risk. The presenters will use a conversational style to describe IT governance, how it works, and then go deeper into one central aspect, risk.

    Part II will build on the foundation presented in part one and describe how these issues are managed in an automated solution.
  • Practical Demo: Change the Game in Omnichannel with Openbravo Commerce Cloud
    Practical Demo: Change the Game in Omnichannel with Openbravo Commerce Cloud Aurora Gete, Senior Pre-Sales Consultant at Openbravo Recorded: Nov 9 2017 43 mins
    Customers now expect retailers to offer Omnichannel capabilities and if you cannot deliver, they may go elsewhere. So how do you implement your omnichannel strategy successfully and avoid the pitfalls that have affected many retailers? Your retail software may be the weakest link. Choose Openbravo Commerce Cloud and gain an innovative and agile cloud-based solution designed to put omnichannel at the center of your retail operations.

    What you will learn:

    In this webinar, you will learn how Openbravo Commerce Cloud helps unlock the agility and innovation it takes to embrace omnichannel in your retail operations with robust POS and Retail Management capabilities and a cost-effective, reliable and scalable cloud-based platform.

    We will demonstrate how this highly flexible, cloud- and mobile-enabled solution helps you support essential omnichannel scenarios such as Buy Online Pickup in Store (BOPIS), Buy Online Return in Store (BORIS), and other scenarios that boost customer satisfaction during their shopping journey.
  • Rethinking Data Security in a Zero Perimeter World
    Rethinking Data Security in a Zero Perimeter World Eric Ogren 451 Research and Bharath Vasudevan Forcepoint Recorded: Nov 8 2017 58 mins
    IT’s desire to become more nimble and agile has resulted in the rapid adoption of cloud delivered applications. This is not limited to the heavy hitters like salesforce.com for CRM or Office 365 for productivity. There are also applications servicing tasks and functions organizations might choose to outsource. The result is critical data spread across a vast array of resources, both on and off premise. Many organizations may use built-in cloud security functionality on top of their individual legacy deployments. However, this leads to silos of capability, mismatched policies, and noise in the form of alerts needing to be addressed.

    Join Forcepoint and 451 Research as we address how taking a human-centric, risk adaptive approach can transform data security programs.
  • Best Practices in Global Risk Management
    Best Practices in Global Risk Management Frank Cirillo (D&B), Jack Scarpelli (Xerox Corp), Sebastien Lacraz (Xerox Corp) Recorded: Nov 8 2017 45 mins
    Join this webinar led by Frank Cirillo, Sr. Consultant Advanced Analytics, Dun & Bradstreet and our business partners at Xerox Corp – Jack Scarpelli, VP North America Credit Risk Officer, and Sebastien Lacraz, Global Risk Analytics Director.

    In this session, you’ll learn about:
    -The growing trends toward globally consistent risk management, the barriers and steps to overcome those barriers.
    -The shift from decentralized, judgmental, manual procedures to a centralized, statistically-based, automated process.
    -How to achieve a positive impact on KPIs and make it less overwhelming to execute on a global strategy.
  • MiFID II and Call Recording Compliance
    MiFID II and Call Recording Compliance Alick Smith | Rhian McPhail Recorded: Nov 8 2017 32 mins
    MifID II is coming this webinar will cover off what you need to know from a call recording perspective.
  • Webcast: From Contract to Close: eSignature’s Impact on Sales Organizations
    Webcast: From Contract to Close: eSignature’s Impact on Sales Organizations Andrew Moravick, Research Analyst, Aberdeen Group & Rahim Kaba, Director of Product Marketing, eSignLive by VASCO Recorded: Nov 6 2017 56 mins
    In this webinar, Aberdeen’s Marketing & Sales Effectiveness Analyst Andrew Moravick teams up with eSignLive to explore the process and performance improvements that organizations can achieve with eSignatures. This webcast covers:

    - The critical operations streamlined and improved by eSignature
    - How to build the optimal eSignature workflow in conjunction with your core systems
    - Insights from successful eSignature deployments
    - CRM, CPQ and contract management integration options

    Watch Now!
  • Meet Both Supply Chain Management and Compliance Demands
    Meet Both Supply Chain Management and Compliance Demands Dun & Bradstreet Recorded: Nov 2 2017 5 mins
    Dun & Bradstreet's portfolio of integrated, scalable solutions helps you meet the best practices for supply chain management and compliance in your industry.
  • Former FBI Agent Steve Bongardt - Insights with Cyber Leaders -
    Former FBI Agent Steve Bongardt - Insights with Cyber Leaders - Amar Singh CEO Cyber Management Alliance Recorded: Nov 1 2017 19 mins
    Steve Bongardt, retired FBI agent, took time out recently to talk to Amar Singh from Cyber Management Alliance as part of their exclusive Insights With Cyber Leaders series. Steve opened up about his early career in the Navy and multiple applications to become an FBI agent, the impact of cyber security on his time as an agent, and one of his favourite interview tactics that he likes to use on potential employees.
  • Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider
    Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider Jim Curtis 451 Research, Steve Croce, Product Manager for ElasticSearch and DBaaS Object Rocket Recorded: Oct 31 2017 54 mins
    Clearly, the onslaught of data, particularly big data, continues to cause many organizations to look for new ways in which to store, analyze, and manage that data. Cloud computing from public cloud vendors is often one place in which enterprises turn. Traditionally deployed and managed on-premises, databases are the lifeline of many enterprises. And while the cloud is appealing for a number of reasons, there are still questions on the minds of many organizations in choosing the right cloud partner to manage their database in the cloud.
  • Digital Coin Offerings: Recent SEC Guidance and Tax Considerations
    Digital Coin Offerings: Recent SEC Guidance and Tax Considerations Morrison & Foerster's Joshua Klayman, Jay Baris, Alfredo Silva, Daniel Kahan and Shiukay Hung Recorded: Oct 31 2017 90 mins
    Token sales, also known as ICOs, represent a new capital-raising method that is being explored by a variety of companies in the market. In the past few months, the US Securities and Exchange Commission (SEC) has provided guidance concerning token sales. Although the SEC did not declare that all digital tokens constitute securities, it cautioned that certain tokens may be securities and that existing securities frameworks apply to token sales, notwithstanding that digital tokens may be distributed via distributed ledger technology.

    In addition, the IRS has published guidance relating to tokens that are “convertible virtual currencies” and has indicated that such tokens generally are treated as property for US federal income tax purposes.
    Token sales, and the legal and regulatory landscapes in the US and around the world with respect to digital tokens, continue to evolve.

    This webinar will explore the current legal, regulatory and tax landscape relating to token offerings and will consider the following:

    •What are digital tokens and how are they typically used and sold?
    •What guidance has the SEC provided regarding token sales, and what is the significance of that guidance?
    •What guidance has the IRS provided regarding tokens and what tax considerations are relevant to tokens and token sales?
    •What are some of the other legal matters that token issuers and their counsel should be aware of when contemplating launching token sales?
  • Bringing Order to the Chaos of Health and Safety Management
    Bringing Order to the Chaos of Health and Safety Management Sam Abadir, Director of Product Management, LockPath Recorded: Oct 31 2017 29 mins
    Health and safety management has its share of chaos, and a hard hat won’t help. Workplace accidents can result in OSHA fines, or lawsuits can damage the company’s reputation. Even when all goes well, health and safety professionals are buried in compliance paperwork. In this one-hour webinar led by LockPath’s Sam Abadir, you’ll discover:

    • The current trends within health and safety risk management
    • Common challenges organizations face with health and safety compliance
    • Where your organization falls on the health and safety maturity model

    You will also learn how integrating health and safety into a governance, risk management and compliance program can create a more efficient and effective health and safety program.
  • Webcast: E-Signatures & Digital Lending: How to Move 99% of Customers off Paper
    Webcast: E-Signatures & Digital Lending: How to Move 99% of Customers off Paper David Smith, Vice President, Application Systems, OneMain & Mary Ellen Power, VP Marketing, eSignLive by VASCO Recorded: Oct 31 2017 61 mins
    In this 60-minute presentation, you’ll learn how OneMain implemented e-signatures in the call center and online channels, then expanded to the branch network.

    Our speakers share firsthand insights and advice on topics like:

    Top e-signature requirements, such as security, deployment, scalability
    Best practices for preparing a national roll-out – including working with regulators on a state-by-state basis
    Designing optimal workflows for remote vs. in-branch transactions
    Preparing the branch network for e-signature
  • Using GRC to Tackle IT Risk Management
    Using GRC to Tackle IT Risk Management Sam Abadir, Director of Product Management, LockPath Recorded: Oct 26 2017 44 mins
    As business becomes more digital, companies are finding that managing risk is becoming more and more chaotic and expensive. Adding to the complication, technology is often not solely managed by the IT department. Marketing, sales operations, department operations, support, and more are increasingly taking control of their own IT. Ensuring teams enterprise-wide are using best practices for IT, adhering to frameworks and regulations, and complying with their contractual obligations has escalated into a difficult battle – one with potentially large consequences if waged poorly.

    In this session you will learn:
    • How companies are bringing order to the chaos of IT risk management using integrated risk management tools like Keylight
    • Where your organization lives on an IT Risk maturity model
    • Tactical steps to take to make your IT risk management processes more efficient and effective
    • How your organization can manage and report IT risks to every role in the organization
  • Murphy’s eDiscovery Law: How to Keep What Could Go Wrong From Going Wrong
    Murphy’s eDiscovery Law: How to Keep What Could Go Wrong From Going Wrong Doug Austin and Tom O'Connor Dec 1 2017 6:00 pm UTC 75 mins
    As data complexity, discovery costs, and regulatory challenges increase in volume and impact, the pulse rate of publicly highlighted eDiscovery mistakes continues to build. While these mistakes are unfortunate for those who experienced them, they can be beneficial to the rest of us in highlighting mistakes you can avoid in your own cases. During this free, one-hour, CLE* presentation, eDiscovery experts Doug Austin and Tom O'Connor will discuss examples of recent eDiscovery disasters and highlight the common characteristics of those disasters and what can be done to avoid them in your own cases. Topics include but are not limited to:

    + Attorney Duty of Competence
    + Avoiding the Mistake in Assuming that Discovery Begins When the Case is Filed
    + How to Proactively Address Inadvertent Privilege Productions
    + Up Front Planning to Reduce Review Costs
    + How to Avoid Getting Stuck with a Bad Production from Opposing Counsel
    + Understanding Your Data to Drive Discovery Decisions
    + Minimizing Potential ESI Spoliation Opportunities
    + How to Avoid Processing Mistakes that Can Slow You Down
    + Common Searching and Redaction Mistakes and How to Avoid Them
    + Checklist of Items to Ensure a Smooth and Accurate Production
    + Managing Communications: Attorney and Vendor Responsibilities

    Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • Getting Your Message Across:  Best Practice for Private and Public Companies
    Getting Your Message Across: Best Practice for Private and Public Companies Scott Lesmes, Anna Pinedo and James Tanenbaum of Morrison & Foerster Dec 4 2017 5:00 pm UTC 90 mins
    With companies remaining private longer, their stockholder base often becomes more widely dispersed. More and more privately held companies are facing interesting challenges in communicating effectively with various stakeholders, without violating securities laws. Companies contemplating or undertaking an initial public offering face particularly acute issues as they try to establish effective communications approaches. Finally, public companies face Regulation FD and other regulatory requirements that may require that they map out a careful communications approach. During this session, we will address the following:

    Trends and developments in capital markets communications;
    New modes of communication and engagement (e.g., social, digital);
    Non-GAAP financial measures;
    Navigating disclosure risks and requirements, including Regulation FD;
    Assessing materiality and whether there is an obligation to disclose (and when);
    Forward-looking statements, financial guidance and communicating with investment professionals, including analysts and rating agencies;
    Competitive benchmarking and key metrics;
    Optimizing value in an exit strategy, whether it is an IPO or an M&A exit; and
    Best practices in public debt communications (as a private company).
  • MiFID II Mobile Recording - Will you be “LOUD & CLEAR” or “OVER & OUT” ?
    MiFID II Mobile Recording - Will you be “LOUD & CLEAR” or “OVER & OUT” ? TeleWare experts and industry practitioners Dec 5 2017 11:00 am UTC 45 mins
    With the most significant regulatory change the financial markets have ever seen nearly upon us, are you prepared for the voice recording and data storage and retrieval requirements outlined in Article 16 of the MiFID II Directive.

    Join our webinar to hear experts from TeleWare and BT, as well as industry practitioners share their latest views on industry readiness and cost effective options to comply.
  • The Millennial Workforce
    The Millennial Workforce Timothy Lietz, Director of Risk Advisory Services, Experis Finance Dec 5 2017 5:00 pm UTC 60 mins
    The Millennial Generation is one of the five generations in today's workforce and now, also the largest! Learn what motivates this powerful generation as they move into leadership roles and mold the future direction of organizations they work within.

    This informative webinar will provide an in-depth look at the Millennial workforce and cover the following aspects of this new generation:
    •A look at the five generations interacting in today's workforce
    •An overview of Millennial Generation characteristics
    •Management tips for all generations to consider
    •Current examples of leading and mentoring Millennials
    Whether you lead Millennials today, have them as teammates or colleagues, or you report to one, this session provides insight into what motivates this powerful generation and the ways they will change our workforce over the coming years.
  • Best Practices for Legacy Archive Migration
    Best Practices for Legacy Archive Migration Robert Desteno, CEO, Archive360 & Bill Tolson, Actiance Dec 6 2017 4:00 pm UTC 60 mins
    Since the late 1990’s, corporate email archives have become a necessity for many organizations, especially for those in regulated industries or those faced with ongoing eDiscovery requirements.

    Email archives were seen as the only workable solution to capture, secure, manage and make searchable, those emails and attachments that government agencies requested or the courts demanded through eDiscovery requests.

    Prior to 2010, stand-alone, on-premise email archives were the go-to solution to ensure regulatory compliance and reduce eDiscovery risk. Cloud-based email archiving solutions were later introduced and have experienced phenomenal growth over the last several years. The adoption of cloud-based email archives has raised the question: Should you migrate your existing on-premise email archive data to the cloud, and if yes, what’s the best way to do it successfully?

    To answer this and other questions, Join Robert Desteno, CEO from Archive360 and Bill Tolson from Actiance as they explore this and other topics including:

    •The advantages of migrating to a cloud archive
    •Steps to consider before beginning the migration process
    •Best practices to ensure a successful migration
  • Hit F5: Does Your Risk Management Policy Need to be Refreshed?
    Hit F5: Does Your Risk Management Policy Need to be Refreshed? K.C. Conway, MAI, CRE, Economist, Counselor of Real Estate, Valuation Expert Dec 6 2017 6:00 pm UTC 60 mins
    This expert panel will take a candid look at the importance of robust risk management at this stage of the market cycle. Looking back, there have been important milestones in the evolution of risk management from the early days of “Phase I or no Phase I?” decisions based solely on loan size. Other areas—like the alignment of the appraisal function and environmental risk management function—are still evolving. As the market enters a phases of moderating property values, lenders should be turning a close eye on their risk management practices. The impact an environmental issue may have on a property’s value is more significant as prices decline. Risk managers who are being challenged to make a case for tighter underwriting will learn valuable ammo for explaining why ERM is more important than ever. Attendees will also learn more about the future direction of regulatory guidance to better reflect budding industry best practices.

    Moderator:
    K.C. Conway, MAI, CRE, Economist, Counselor of Real Estate, Valuation Expert
    Speakers:
    Michael Pereira, CHMM, VP – Environmental Risk Officer, Umpqua Bank
    Michael Kulka, Founder and CEO, PM Environmental, Inc.
    Duane Beck, Enterprise Accounts Director, Lender Solutions, EDR
  • From Supervision to Surveillance
    From Supervision to Surveillance Mitch Atkins, Founder and Principal at FirstMark Regulatory Solutions Dec 7 2017 4:00 pm UTC 60 mins
    Is your day spent plowing through endless piles of messages, while policy violations may lie hidden in your data? How can you make daily review easier while – at the same time – ensure you are addressing topics that are of greatest interest to regulators?

    Today, compliance officers of financial services firms are challenged by information like never before. Data volume is doubling every 18 months and new forms of electronic communication emerge regularly, making supervisory review workloads untenable. At the same time, SEC/FINRA/IIROC regulatory scrutiny over supervisory compliance practices has never been higher, with stiff regulatory fines appearing in the news almost daily. Clearly, conducting review of today’s communications with tools designed 10+ years ago for email is not sustainable.

    Join us and our special guest, Mitch Atkins, founder and Principal at FirstMark Regulatory Solutions, for a discussion of the issues impacting supervisory review, and how firms can re-focus efforts on the identification and mitigation of complex compliance risk. In this webcast you’ll learn:

    •Common compliance risks faced by broker-dealers and their impact on FINRA priorities in 2016;
    •How the growth of non-email is impacting compliance review;
    •Emerging best practices in managing review volumes and conducting compliance surveillance
  • Enterprise Risk Assessments for Immediate Value and Results
    Enterprise Risk Assessments for Immediate Value and Results Yvette Connor & Jannie Wentzel, Focal Point Data Risk; Sam Abadir, LockPath Dec 7 2017 5:00 pm UTC 60 mins
    Enterprise-level risk assessments are a business necessity today in light of data breaches, global outsourcing, and regulatory compliance challenges like GDPR. In this webinar, LockPath and Focal-Point will discuss strategies and best practices for creating and leveraging enterprise risk assessments. Attendees will learn:

    • Common goals and objectives for enterprise risk assessments
    • How to define assessment metrics
    • When to determine if a risk assessment is needed
    • When to use an integrated assessment vs. an individual assessment

    This is a can’t miss webinar for anyone responsible for enterprise-level risk and concerned about threats to business operations.
  • 2017 eDiscovery Case Law Review: Sanctions, Security and SCOTUS on Spoliation
    2017 eDiscovery Case Law Review: Sanctions, Security and SCOTUS on Spoliation Judge Frank Maas, Attorney Michael Simon and More Dec 7 2017 7:00 pm UTC 75 mins
    In modern legal practice, the difference between success and failure often boils down to the ability to navigate and make sense of data. To that end, the legal profession in 2017 was largely shaped by major developments in data and legal technology, from the way in which discovery sanctions were adjudicated to news-making data breaches, such as the so-called “Paradise Papers,” where the hacking of a major law firm exposed illicit tax-sheltering practices of many of the firm’s clients. Over the course of a tumultuous year, legal professionals confronted the specter of cybercrime, a shifting of judicial views on how (and how hard) evidentiary penalties should be imposed, and the fact that the demise of a client’s case -- or a fruitful career -- can arise from a simple failure to understand how modern tech works. The Supreme Court, in the high-profile Goodyear decision, even got in on the action.

    Join a panel of experts, including federal judges, as we glean practical guidance from the most important cases and developments of 2017.

    Cases reviewed include:

    Goodyear Tire & Rubber Co. v. Haeger, No. 15-1406 (U.S. Apr. 18, 2017): When does a court’s inherent power to sanction cross the line?

    Ronnie Van Zant, Inc. v. Pyle, 2017 U.S. Dist. LEXIS 138039 (S.D.N.Y. Aug. 28, 2017): Non-party sanctioned under Rule 37(e) for loss of cell phone information.

    Harleysville Insurance Co. v. Holding Funeral Home, Inc., No. 1:15cv00057 (W.D. Va. Oct. 2, 2017): Should privilege be waived due to inappropriate use of a file-sharing site?

    N.M. Oncology & Hematology Consultants v. Presbyterian Healthcare Servs., 2017 U.S. Dist. LEXIS 130959 (D.N.M. Aug. 16, 2017): Should sanctions be levied for giving employees discretion to preserve emails?

    Bailey v. Brookdale University Hospital Medical Center, No. CV 16-2195(ADS)(AKT), 2017 WL 2616957 (E.D.N.Y. June 16, 2017): Expensive discovery persuades court to split costs, and penalize counsel, in light of lopsided ESI agreement.
  • Best Practices for Migrating to Office 365
    Best Practices for Migrating to Office 365 Robert Cruz, Senior Director of Information Governance, Actiance & Justin Frech, Systems Engineer, VerQu Dec 12 2017 4:00 pm UTC 60 mins
    Prior to 2010, email messaging and archiving technologies were primarily deployed behind the firewall, with accompanying investments in storage, hardware, infrastructure, and IT resources. Since then, employee communications volume and variety have continued to explode –along with the cost and management hassle. Unfortunately, this time period has also witnessed an explosion of users utilizing their own devices, unsanctioned communications channels, and personal storage locations to get their jobs done.

    Now, as messaging systems move to Office 365 many are asking: Is the move to Office 365 also the right time to gain control over other employee communications channels, and if yes, what’s the best way to do it successfully?

    To answer this and other questions, join Actiance and VerQu as we explore:

    •Best practices in moving employee communications to Office 365
    •Steps to consider before beginning the migration process
    •How to assess regulatory compliance and eDiscovery implications when migrating to Office 365

    We will conclude with a discussion of how Actiance can help organizations harness Office365, while gaining control over the latest communication channels to ensure that companies meet regulatory compliance and eDiscovery demands.
  • OCC 2018 Part 1: Cybersecurity and Operational Resiliency
    OCC 2018 Part 1: Cybersecurity and Operational Resiliency Sam Abadir, Director of Product Management, LockPath Dec 12 2017 5:00 pm UTC 60 mins
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. Coming in at #1: cybersecurity and operational resiliency. Whether you’re a banker or service provider to the financial industry, this should not come as a surprise. In this webinar, you’ll learn how to get out in front of OCC’s #1 priority and the role of cybersecurity in managing operational risk.

    Attendees will learn:

    • OCC’s approach to cybersecurity and operational resiliency for banks of all sizes
    • The cybersecurity framework that examiners will review
    • Managing the rising risk from changes to product, process, and providers
    • The impact of current and proposed cybersecurity regulation
    • How GRC technology supports integrated risk management programs


    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • Osterman Research Report: Assessing the Total Cost of Veritas Enterprise Vault
    Osterman Research Report: Assessing the Total Cost of Veritas Enterprise Vault Michael Osterman, Osterman Research Dec 13 2017 4:00 pm UTC 60 mins
    Many organizations are evaluating cloud-based archiving solutions by performing comparative cost analyses against legacy on-premises systems. However, constructing a true comparative analysis can be difficult because the software, hardware, storage, and infrastructure costs of on-premises systems are often distributed across multiple IT cost centers or are simply difficult to estimate.

    Join Actiance and Michael Osterman of Osterman Research as we discuss the results of an Osterman survey on the actual costs of maintaining and operating a Veritas Enterprise Vault environment versus a cloud-based archiving solution.

    During this webinar, you will learn about:

    – Real world cost experiences in managing on-premise archives

    – How the survey results have led to the development of a TCO model to help you determine your own cost comparison

    – How the Actiance Platform offers a significantly lower cost of ownership while providing an architecture to support your archiving needs
  • M&A Leaders’ Survey from 451 Research and Morrison & Foerster
    M&A Leaders’ Survey from 451 Research and Morrison & Foerster Brenon Daly, 451 Research and Rob Townsend, Morrison & Foerster Dec 13 2017 6:00 pm UTC 60 mins
    Undeterred by the recent slowdown in M&A activity in 2017, tech acquirers have largely left their bullish forecast for dealmaking unchanged. For the third consecutive time, essentially half of the respondents to the semi-annual M&A Leaders' Survey from 451 Research and Morrison & Foerster indicated that they expected an acceleration in acquisition activity in the coming half-year. Join us for a lively discussion on where acquirers are looking to buy and what they expect to pay in those deals.
  • Microsoft Teams & Skype for Business - the road ahead for collaboration
    Microsoft Teams & Skype for Business - the road ahead for collaboration David Branscome, Microsoft | David Tupling, IR Dec 14 2017 4:00 pm UTC 60 mins
    When Microsoft launched Teams in 2016 many wondered what this would mean for Skype for Business. Join us to hear from Microsoft's David Branscome on the road ahead for Intelligent Communications and collaboration.
  • 2018 GRC Predictions
    2018 GRC Predictions Tom Garrubba, Santa Fe Group; David Grazer, Tevora; Peter Tessin, Discover Financial Services; Christina Whiting, Tevora Dec 14 2017 5:00 pm UTC 60 mins
    “It was the best of times, it was the worst of times,” wrote Dickens. 2017 has been a tumultuous year for governance, risk management, and compliance (GRC). 2018 could be just as stormy with cybersecurity, GDPR, and new risks caused by the shift to digital business. In this webinar, our panel of industry experts will recap the year’s highlights and offer their thoughts on what to expect in 2018.

    Discussion topics include:

    • Ramifications of major data breaches in 2017
    • The continuing shift in risk perspective from department to enterprise
    • Navigating third-party risk management on the road ahead
    • The role and influence of the board in 2018
    • GDPR and the trend toward data privacy and security

    Plan now to attend this special webinar on 2017 trends and 2018 predictions for GRC.
  • OCC 2018 Part 2: Bank Secrecy Act | Anti-Money Laundering
    OCC 2018 Part 2: Bank Secrecy Act | Anti-Money Laundering Sam Abadir, Director of Product Management, LockPath Jan 11 2018 5:00 pm UTC 60 mins
    Overview Description
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. One priority is familiar to most: Bank Secrecy Act (BSA) and Anti-Money Laundering (AML). Whether you’re a banker or service provider to the financial industry, compliance with BSA and AML is a day-to-day and ongoing challenge. In this webinar, you’ll learn what the OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.

    Attendees will learn:

    • Examiners’ review of programs for BSA/AML compliance and financial inclusion
    • The risk assessment process related to BSA and AML
    • Policies, procedures, and processes that effectively mitigate identified risks
    • The impact of non-compliance on a bank’s growth
    • How GRC technology supports compliance and integrated risk management programs

    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • OCC 2018 Part 3: Change Mgt to Address New Regs
    OCC 2018 Part 3: Change Mgt to Address New Regs Sam Abadir, Director of Product Management, LockPath Jan 25 2018 5:00 pm UTC 60 mins
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. A top priority is change management to address new regulation requirements. Whether you’re a banker or service provider to the financial industry, you may be aware of updated or new regulations like the National Flood Insurance Reform Act of 1994, the Military Lending Act, and the Prepaid Card Rule. In this webinar, you’ll learn what OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.

    Attendees will learn:

    • What to consider when designing, operating or improving their change management process
    • The increased focus on fair lending from a quantity and quality perspective
    • Policies, procedures, and processes for credit offered under the Military Lending Act
    • What CCA examiners are looking for with banks relying on third-party relationships
    • How GRC technology supports compliance and integrated risk management programs

    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • GDPR: Compliance and Preperation
    GDPR: Compliance and Preperation Steve Durbin, Managing Director, ISF LTD May 24 2018 12:00 pm UTC 45 mins
    With the EU's GDPR deadline upon us, where should organisation start in order to be GDPR ready?

    In this webinar, Steve Durbin, Managing Director at the ISF will discuss how organisations need to create a structured method in order to achieve sufficient levels of compliance. Steve will share insights into how organisations can achieve this through:

    - Identify how much personal data your organisation holds
    - implement a compliance programme
    - Translate compliance actions into tangible business benefits


    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • GDPR: Deadline Day Special
    GDPR: Deadline Day Special Steve Durbin, Managing Director, ISF LTD May 25 2018 12:00 pm UTC 45 mins
    After month's of planning and mapping out GDPR compliance activities, IT and security leaders are now under pressure to start implementing such plans.

    In this webinar, Steve Durbin, Managing Director at the ISF, will share his insights into the next steps organisations should take when implementing a GDPR compliance programme, to ensure q culture of security awareness is established across the enterprise.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.