Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Breaking Down the PCI SSC’s New Guidance for Protecting Telephone-Based Payments
    Breaking Down the PCI SSC’s New Guidance for Protecting Telephone-Based Payments
    Wayne Murphy, Sec-1 Ltd.; Ben Rafferty, Semafone Recorded: Jan 17 2019 47 mins
    Over the last seven years, the technologies used by call and contact centers to communicate with customers and complete card transactions have changed drastically. Networking methodologies like VoIP have since become widely adopted, while the number of applications organizations employ to process customer information has risen dramatically. For this reason, the PCI SSC recently released their highly anticipated updated “Guidance for Protecting Telephone-Based Card Payments” for the first time since 2011, offering several much-needed clarifications for organizations looking to achieve PCI DSS compliance inside their contact centers.

    Join Semafone and Sec-1 Ltd. for this insightful webinar into the most pertinent changes, featuring two of the members of the PCI SSC’s Special Interest Group – Ben Rafferty, Chief Innovation Officer at Semafone, and Wayne Murphy, Senior Security Consultant at Sec-1 Ltd. We’ll cover the following:

    • How to avoid scope-creep inside the contact center during PCI DSS compliance
    • How Pause and Resume call recording solutions create more problems than they solve
    • How most 3rd party services are now in scope for PCI DSS compliance
    • How devices that control SIP Redirection are now also in scope
  • Assessing the impact of the Securities Financing Transactions Regulation
    Assessing the impact of the Securities Financing Transactions Regulation
    Jeremy Jennings-Mares, partner; Peter Green, senior of counsel and; Yiulia Makarova, of counsel - Morrison & Foerster Recorded: Jan 16 2019 64 mins
    In the wake of the global financial crisis, the Financial Stability Board (FSB), with the support of the G20 nations, launched its Shadow Banking initiative, to monitor non-banks that perform bank-like activities. This was in response to findings that certain non-banks exacerbated the build-up of excessive leverage and effected substantial maturity transformation, leading to financial stability concerns.
    One of the key recommendations emerging from the FSB initiative was the collation and monitoring by financial stability authorities of data on securities financing transactions. Following the FSB initiative, the Securities Financing Transactions Regulation (SFTR) was introduced in the EU in 2016, but is not yet fully operational.

    This presentation will cover:
    •the scope of the SFTR (which entities and which types of transactions are included);
    •disclosure of SFTs;
    •transparency of SFTs to fund investors;
    •restrictions on reuse of collateral;
    •sanctions;
    •third country issues; and
    •effects of Brexit.
  • GDPR Compliance
    GDPR Compliance
    Lockpath Recorded: Jan 15 2019 2 mins
    GDPR compliance is a big challenge for organizations doing business with, or in the EU. See how the Keylight Platform is the solution you need for GDPR compliance.
  • GRC & IT Security Series: Healthcare Compliance & Security: Understanding HIPAA
    GRC & IT Security Series: Healthcare Compliance & Security: Understanding HIPAA
    Paul Schoeny, VP Cybersecurity, BAP Recorded: Jan 9 2019 34 mins
    Join the GRC & IT Webinar Series for byte-sized sessions aimed at making federal regulations understandable and actionable.HIPAA compliance remains critical for all healthcare organizations to combat security breaches. It is no surprise that the Healthcare industry remains one of the top targets for cyber-attacks. To avoid hefty fines and to gain the eagle eye view of the overall health of the organizations, GRC, IT Security and Compliance teams are quickly developing strategies to mitigate security breaches and achieve compliance to HIPAA. Join this bite-sized webinar to learn how organizations are tackling HIPAA.
    -Understand the policies and controls set forth in HIPAA
    -Understand how traditional compliance methods invite risk
    -Understand how continuous monitoring of HIPAA control health can eradicate failing health scores.
    -Discuss the innovations happening to drive automation of security breach policy and policy health oversight
    -See checks and balances to confirm implementation and policy health.
  • Managing the Complexity and Cost of Technology with TAM
    Managing the Complexity and Cost of Technology with TAM
    Gary Paquette, GM Technology Asset Management, at Nlyte Recorded: Jan 9 2019 43 mins
    Listen in on the presentation from Gary Paquette, GM Technology Asset Management, Nlyte, he provides an overview of TAM: Technology Asset Management, including how it:

    - Provides a Technology Asset Baseline
    - Improves asset cost management
    - Allows organizations to become and remain compliant on their software entitlements
    - Reduces spending on underutilized resources
    - Integrates asset information across IT, Finance, and HR system
  • Rising Stars in 2019: Developing Leaders Program Launch
    Rising Stars in 2019: Developing Leaders Program Launch
    John Rybak, 2017 winner of the PRISM Industry Influencer award, and BB&T’s SVP Environmental Risk Manager Recorded: Jan 8 2019 45 mins
    Each year at EDR’s PRISM conference, an up-and-coming risk management or due diligence professional is recognized for impressive achievement in leadership, visibility, professional competency and/or industry involvement. Building on this popular awards category, EDR is excited to launch a new Developing Leaders program aimed to further the development of our industry’s future leaders. This new initiative will provide education and mentor/mentee connections to leverage the industry knowledge of prominent business leaders, and provide newer professionals with the tools and resources they need to fulfill their education and professional development goals.

    Each of the webinar speakers is an industry veteran who is deeply committed to helping rising professionals learn what they wish they knew when they were just starting out. Whether you’re a seasoned manager looking to retain top talent—or a newbie just starting out, join us for this kickoff webinar to hear what’s in store from EDR’s new Developing Leaders program!

    Who should attend:

    •Risk management professionals just starting out in the field
    •Experienced industry veterans
    •Anyone looking to broaden his/her professional development expertise

    Speakers:

    John Rybak, 2017 winner of the PRISM Industry Influencer award, and BB&T’s SVP Environmental Risk Manager
    Roger Caramanica, Ph.D., EDR’s VP of Organizational Development
    Dianne Crocker, EDR Insight’s Principal Analyst
  • The 7 Step Guide to Third-Party Risk Management
    The 7 Step Guide to Third-Party Risk Management
    Lockpath Recorded: Dec 27 2018 1 min
    A brief overview of what our guide to Third-Party Risk Management
  • GRC Buyer's Guide
    GRC Buyer's Guide
    Lockpath Recorded: Dec 27 2018 1 min
    Brief ad highlighting the benefits of the guide.
  • Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Enzo Greco, Chief Strategy Officer, Nlyte, Kollengode Anand, Segment Leader - DC Solutions, United Technologies Recorded: Dec 19 2018 53 mins
    In this webinar, Infrastructure experts at UTC and Nlyte Software discuss how you can:

    - Leverage sophisticated data center ecosystems, such as precision cooling
    - Provide insight into your ITSM solution
    - Improve resilience and reduce risk to your critical infrastructure
    - Create tighter integration between facilities and IT
  • Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Enzo Greco, Chief Strategy Officer, Nlyte, Kollengode Anand, Segment Leader - DC Solutions, United Technologies Recorded: Dec 19 2018 53 mins
    In this webinar, Infrastructure experts at UTC and Nlyte Software discuss how you can:

    - Leverage sophisticated data center ecosystems, such as precision cooling
    - Provide insight into your ITSM solution
    - Improve resilience and reduce risk to your critical infrastructure
    - Create tighter integration between facilities and IT
  • Penetration Testing or Vulnerability Scanning - Aren’t they the same thing?
    Penetration Testing or Vulnerability Scanning - Aren’t they the same thing?
    Mike Larmie, Federal Solutions Architect, Synack Recorded: Dec 18 2018 53 mins
    Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:

    -Who performs the services?
    -How often do they run in a network environment?
    -What’s covered in their data output and reporting?
    -What’s their value?

    Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.

    BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
  • Black Duck Audit Reporting: The Next Generation
    Black Duck Audit Reporting: The Next Generation
    Emmanuel Tournier, Sr. Manager, Black Duck On-Demand and Phil Odence, GM – Black Duck On-Demand at Synopsys Recorded: Dec 18 2018 45 mins
    You won’t want to miss this webinar, if you have received Black Duck audit reports and anticipate more in the future.

    Black Duck by Synopsys constantly strives to improve our offerings and reporting capabilities. We’ve expanded the range of our audit offerings, and by the first of the year, we’ll be rolling out a new set of reports and a new process for sharing them. Join us for a preview of the new reports and process. Black Duck On-Demand’s Phil Odence and Emmanuel Tournier will demonstrate how we have combined customers’ ideas with the best elements of our reporting to develop new reporting technology and processes designed to make reviewing audit results easier, more insightful, and more productive.
  • Crowdsourcing IP Research: From Novelty to Best Practice
    Crowdsourcing IP Research: From Novelty to Best Practice
    Peter Vanderheyden, COO, RWS IP Research Recorded: Dec 18 2018 42 mins
    Join RWS IP Research COO Peter Vanderheyden for a live webinar on how crowdsourcing your prior art can serve as a best practice for your IP research. What was once a novel and uncertain methodology has been reliably used to kill bad patents in litigation, monetize patent portfolios and even provide competitive analyses. In 40 minutes, we will discuss:

    •Why crowdsourcing is particularly suited for infringement cases, monetization efforts and even competitive intelligence;
    •A walk through of results illustrative of a crowdsourced search;
    •How RWS uniquely approaches the crowdsourcing process for purposes of finding prior art;
    •How technology plays a role and the advantage of our AOP Connect™ platform;
    •How crowdsourcing can help you to efficiently and effectively manage discovery risk and confidentiality; and more.

    About the Presenter

    Peter Vanderheyden is COO of RWS IP Research where he brings over 30 years of experience across all business disciplines from finance to product management and entrepreneurial startups. Prior to joining RWS, Mr. Vanderheyden was the Chief Executive Officer of Article One Partners where he led a team that developed AOP Connect and helped revolutionize the way that IP research is conducted through crowdsourcing. While vice president and Managing Director of LexisNexis’s Global IP Solutions, his team developed both TotalPatent and PatentOptiimizer, while spearheading the first truly semantic search engine for technical/patent content.

    Mr. Vanderheyden earned a BS in Business from the University of Minnesota with undergrad certification in math, science and engineering. Mr. Vanderheyden also has a US Patent to his credit.

    https://www.rws.com/
  • CDD in a Digital World
    CDD in a Digital World
    Paul Westcott, Product Director for Compliance & Supply and Neil Isherwood, Due Diligence Subject Matter Expert Recorded: Dec 17 2018 61 mins
    The rise of technology within the Customer Due Diligence space is evident. There has been a significant influx of ‘Regtech’ or ‘Fintech’ businesses offering innovative software solutions to age old CDD problems. Moreover, the constant claims that Artificial Intelligence, Machine Learning and Automation can improve the CDD landscape are impossible to ignore. In this webinar we will discuss what digital means for CDD professionals operationally, and for their place in the organisation, and will explore the assumption that systems will do all the heavy lifting for you. Additionally, we will interrogate the view that automation and machine learning, or both, truly means less effort for the compliance professional.

    As more CDD problems are framed as potential ones that can be solved through new technology, this webinar will outline what support frameworks are needed to sit alongside the technology for it to be successfully implemented and achieve the goals it was set out to deliver, and ultimately how this transformation will require highly skilled Compliance experts to adapt to new skills as their roles change.

    Presenters:
    Paul Westcott - Product Director Global Customer Due Diligence Products, Dun & Bradstreet
    Neil Isherwood - Due Diligence Subject Matter Expert, Dun & Bradstreet
  • 10 Things Corporate Counsel Hate—And How to Avoid Them
    10 Things Corporate Counsel Hate—And How to Avoid Them
    Robert Schlossman, CLO at Zscaler, Laszlo Kupan, GC at J.D. Power Recorded: Dec 13 2018 64 mins
    Today’s in-house counsel are changing the practice of law. GCs and CLOs are leading the charge to implement new legal technology, to bring new efficiencies to the legal process, and to, simply, do more with less. Meanwhile growing in-house expertise and autonomy are changing the dynamic with outside counsel, as corporate clients demand to be treated not as advisees, but as partners. If you want their business, you’ll need to keep them happy.

    We want to help you do that. Join us for our upcoming webinar featuring Robert Schlossman, Chief Legal Officer at Zscaler, and Laszlo Kupan, General Counsel at J.D. Power, as we explore the 10 things corporate counsel hate—and how to avoid them.

    Featured Presenters:
    Robert Schlossman, Chief Legal Officer at Zscaler, has been a key legal and business advisor to CEOs, management teams, and boards of directors of public, private equity, and venture capital backed companies. Robert develops legal departments into organizations that both protect a company and enable the success of the business. He has substantial experience with streamlining legal operations, optimizing legal budgets, creating and managing compliance programs, IP strategy, contracts, litigation, and more.




    Laszlo Kupan is General Counsel at J.D. Power, one of the leading marketing information services companies, where he works to help the company realize both its business and legal objectives. Prior to joining J.D. Power, Laszlo worked as senior counsel for Live Nation and General Counsel for Access Integrated Healthcare.
  • Continuous & Adaptable Security Models will Prevail
    Continuous & Adaptable Security Models will Prevail
    Dr. Srinivas Mukkamala, CEO & Co-Founder of RiskSense Recorded: Dec 13 2018 49 mins
    Dr. Srinivas Mukkamala will share his views on the most dramatic security threats that will draw more attention in 2019. He will identify why new technologies will begin creating an even more porous and vulnerable IT infrastructure. Consider:

    - AI might be your friend but it also powers your foes
    - Robotic Process Automation (RPA) another crack in your attack surface
    - DevOps Automation tools as targets for administrative controls and chaos
    - API Keys becoming the keys to the kingdom

    There is hope and Dr. Mukkamala will illustrate how organizations can have improved visibility, detection, remediation, and response when dealing with growing reliance on these technologies in 2019 and beyond.
  • The Complete Guide to Crowdsourced Security Testing
    The Complete Guide to Crowdsourced Security Testing
    Rajesh Krishnan, Product Marketing, Synack Recorded: Dec 13 2018 22 mins
    Adoption of bug bounty programs has doubled in the past 3 years, shining a light on crowdsourced security testing options. The bug bounty model, which incentivizes a crowd of creative hackers to probe organizations’ digital assets for exploitable vulnerabilities, has proven quite effective. However, not all crowdsourced testing programs are equal. All programs crowdsource hackers, most incorporate levels of controls for trust and accountability, and some use testing data to help break down testing coverage levels and risk management.

    Join this webinar to learn:
    - Why crowdsourcing hackers and bug bounty is trending
    - Who these crowdsourced hackers are and what they do
    - Where crowdsourced security programs differ
    - How to decide what crowdsourced programs best fit your organization
    - Where the future of crowdsourced security is heading
  • 2019 Risk Trends and Predictions
    2019 Risk Trends and Predictions
    Jake Olcott, BitSight; Michael Marriot, Digital Shadows; Jannie Wentzel, Focal Point Data Risk; Sam Abadir, Lockpath Recorded: Dec 13 2018 59 mins
    What a year 2018 has been, from indictments and data breaches to an increasing regulatory landscape and a greater focus on integrated risk management. What were the major risk trends in 2018 and what predictions can we make for 2019? In this can’t miss webinar, our panel of industry experts will recap 2018 and offer their views on what to expect in 2019 and beyond.

    As an attendee, you’ll learn:

    • The shift to a more integrated risk management
    • The growing emphasis on supply chain cybersecurity
    • The rise in data privacy and its impact on information security

    Plan now to attend this special webinar on 2018 highlights and trends and predictions for 2019.
  • Global Supply Chain Risk Report: Insights and Findings from Q3 2018
    Global Supply Chain Risk Report: Insights and Findings from Q3 2018
    Dr Heather Skipworth and Dr Emel Aktas, Cranfield School of Management Recorded: Dec 13 2018 28 mins
    Join this webinar, led by experts from Cranfield School of Management to hear the results of the Q3 Global Supply Chain Risk Report.

    The Global Supply Chain Risk Report is a joint study by Cranfield School of Management’s Centre for Logistics and Supply Chain Management and Dun & Bradstreet, which investigates the level of supply chain risk faced by European companies with international supplier relationships.

    Analysis has been carried out using data supplied by Dun & Bradstreet, which included around 600,000 anonymous transactions between European buyers and their suppliers who were located in more than 150 countries worldwide.

    During the webinar, we will focus on the Q3 2018 report, published in December 2018. We will cover the background, the key findings and practical implications for procurement professionals.

    Register now to learn:

    - The level of supply risk in Q3 2018
    - The differences across key industry sectors and how this should be considered in procurement decisions
    - How dependency on key suppliers changed compares with the previous quarter

    Presented by Dr Heather Skipworth and Dr Emel Aktas, Cranfield School of Management
  • IFLR Women in Business Law: using coaching to advance your career
    IFLR Women in Business Law: using coaching to advance your career
    Julie Smith, Pressurevalve (with introduction from IFLR managing editor Amelie Labbe) Recorded: Dec 13 2018 56 mins
    Coaching is now a key component of many development packages, but do we really understand what it is and how to use it to our advantage?
    In this practical session we’ll explore the following questions:
    - What is coaching and what isn’t coaching?
    - What type of challenges and goals can coaching help with?
    - What happens in the coaching process?
    - Are you ‘coachable’?
    - How do you find a coach and assess whether they are the right fit for you?

    Julie Smith

    Julie Smith is director and coach at Pressurevalve Ltd. As well as being a qualified executive coach, she’s also an experienced leader with 15+ years in management positions, 10 of which were in senior posts, including heading national operations and an interim CEO post. This means she understands the complexities, challenges and rewards of leadership. Key success factors in her coaching include helping people develop: skills in viewing situations from different perspectives, self-awareness, decision-making, confidence, self-belief, self-coaching and resilience. As well as coaching, Julie designs and facilitates sessions for leadership programmes in London and New York, runs network groups for leaders and is chair of the Global Taskforce of the American Express Leadership Academy, Alumni Network. If you’d like more information on Julie’s coaching services, plus self-coaching resources, visit: https://www.pressurevalvecoaching.com/free-stuff
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis?
    Mark Elwood, Marketing Director, TeleWare Recorded: Dec 13 2018 50 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • Winning Omnichannel Opportunities for Retailers in the Middle East
    Winning Omnichannel Opportunities for Retailers in the Middle East
    Mike Nasreddin, Sales Director - MEA, Openbravo Recorded: Dec 13 2018 60 mins
    In this webinar we argue that while the environment for retailers in the Middle East has changed in recent years, the attractions for both local and multinational retailers remain largely undiminished.
  • GRC & IT Security Series: Financial & Banking Service Regulations: SEC, PII, PCI
    GRC & IT Security Series: Financial & Banking Service Regulations: SEC, PII, PCI
    Jeffrey Lush, CEO and Co-founder, BAP Paul Schoeny, VP Cybersecurity, BAP Recorded: Dec 12 2018 29 mins
    Join the GRC & IT Webinar Series for byte-sized sessions aimed at making federal regulations understandable and actionable. Often understanding the interpretation of SEC Cybersecurity Guidance, PII and PCI can be difficult and is often more of an art than a science. The objective of every organization is to provide cybersecurity protection and compliance with the standards established within these regulations. Join us to discover the steps you need to develop your cyber strategy and:

    -Understand the SEC, PII and PCI regulations
    -Focus on the security objectives all regulations are hoping to achieve
    -Learn how to leverage your existing cyber investment, augment the tools you already have for real-time threat detection
    -Understand how continuous monitoring of Policy control health can eradicate failing scores.
    -Automate cyber standards, policy, and compliance
    -Learn how to build and discover your cyber standard needs
    -Analyze and validate the implementation of those standards
  • Master today's regulations and be prepared for tomorrow’s: OFAC includes bitcoin
    Master today's regulations and be prepared for tomorrow’s: OFAC includes bitcoin
    Moderator: Jose Caldera, Chief of Product and Marketing, IdentityMind Recorded: Dec 12 2018 60 mins
    The Office of Foreign Assets and Control (OFAC) included, for the first time, virtual currency addresses as part of the description of individuals in the SDN list. This is the first time any regulatory body has added specific virtual currency addresses to any sanctions list. This will represent a challenge to financial institutions, FinTECH, and every organization having to screen for OFAC lists, as a result of the inherent properties of virtual currencies and the broad reach of OFAC.

    In this webinar, David Murray, VP of Products and Services at FIN, an expert in sanctions screening and virtual currencies, and IdentityMind’s product team leadership will discuss the background behind this decision, what it means for regulated institutions, what we can expect in the future, and more importantly how to ensure that your program is up to date for compliance.

    Panelist: David Murray, VP Products and Services, Financial Integrity Network
    Neal Reiter, Director of Product, Virtual Currencies and Tokens, IdentityMind
  • Protecting Payments During the Holidays: Your Guide to Prevent Credit Card Fraud
    Protecting Payments During the Holidays: Your Guide to Prevent Credit Card Fraud
    Cole Valadez, Integrations Manager, PayJunction; Aaron Lumnah, Semafone Recorded: Dec 12 2018 39 mins
    With the Holiday Shopping Season now upon us, consumers are opening their wallets in earnest, with some estimates putting spending at over $1 trillion in the US alone. Brands everywhere can expect to see a huge spike in sales, and along with it, an increase in payment fraud. Not only does the influx of transactions make it harder to detect fraudulent activity, but swarms of temporary seasonal workers can become insider threats that compromise an organization’s security procedures.

    Join Semafone and PayJunction for an insightful webinar where you’ll learn the following:

    - Why payment fraud spikes during the Holiday Season
    - Ways to train and properly vet seasonal workers to ensure security
    - How to implement technology solutions to help cut down on fraud rates during this holiday season

    Make sure to reserve your seat by registering now!
  • Important eDiscovery Case Law Decisions of 2018 and Their Impact on 2019
    Important eDiscovery Case Law Decisions of 2018 and Their Impact on 2019
    Presentation Leaders: Doug Austin and Tom O'Connor Jan 23 2019 6:00 pm UTC 90 mins
    2018 was another notable year for eDiscovery case law with several significant rulings that stand to impact eDiscovery practices and the admissibility of evidence. How can these key case law decisions affect discovery within your organization? This CLE-approved* webcast session will cover key 2018 case law decisions covered by the eDiscovery Daily blog and what the legal profession can learn from those rulings. Topics include:

    + Technology Assisted Review best practices and trends
    + The use of sampling to settle disputes
    + Admissibility vs. proportionality and privacy disputes
    + Form of production disputes and the issues involved
    + Key case rulings on discoverability of mobile device data
    + Privilege disputes and clawback requests
    + Impact of rules changes on boilerplate objections
    + The state of sanctions three years after the 2015 Fed Rules updates

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author for 2017 and 2018.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Convergence of Cybersecurity and Fraud
    Convergence of Cybersecurity and Fraud
    Dr. Srinivas Mukkamala, CEO & Co-Founder of RiskSense Jan 23 2019 6:00 pm UTC 47 mins
    In most cases fraud, risk, and information security functions often only interact in the aftermath of a breach, and security and fraud point solutions typically remain isolated. With maturity in data pipelines, availability of shared data sets across risk, fraud, and information security, AI can be effectively used to detect anomalies and be predictive.

    In this webinar, Dr. Srinivas Mukkamala, a recognized expert on AI and neural networks, will discuss how a risk-based approach can facilitate the convergence of cybersecurity and fraud.
  • The End of Sanctions?
    The End of Sanctions?
    Mira Edelman, Craig Ball, and Casey Sullivan Jan 23 2019 7:00 pm UTC 75 mins
    Following the 2015 amendments to the Federal Rules of Civil Procedure, the amount of cases involving spoliation sanctions has plummeted. Today, cases involving discovery sanctions are only one third as common as they were during their peak in 2011 and 2012.

    Are we seeing the end of sanctions? And if so, what effects is this having on the legal practice?

    Join Logikcull and eDiscovery experts Craig Ball and Mira Edelman as we explore these topics, including a review of extensive new research on eDiscovery sanctions post-2015, key case laws, and emerging corporate discovery trends.

    About our presenters:

    Craig Ball

    Craig Ball is a trial lawyer, computer forensic examiner, law professor and noted authority on electronic evidence. Among his many accomplishments, he has served as the Special Master or testifying expert in computer forensics and electronic discovery in some of the most challenging and celebrated cases in the U.S. He is a founder of the Georgetown University Law Center E-Discovery Training Academy and regularly teaches eDiscovery and digital evidence at the University of Texas School of Law.

    Mira Edelman

    Mira Edelman has decades of experience in discovery, both as in-house counsel and in private practice. She has worked as Associate General Counsel and Director of eDiscovery Services and Information Governance for Facebook, Senior Counsel and Discovery manager for Google, and eDiscovery Counsel at Hughes Hubbard & Reed. Mira is also a frequent writer and speaker on issues such as sanctions, legal holds, and ESI.
  • GRC & IT Security Series: Tips and Tricks for FISMA, HIPAA, PCI, PII
    GRC & IT Security Series: Tips and Tricks for FISMA, HIPAA, PCI, PII
    Jeffrey Lush, CEO & Co-Founder, BAP Jan 23 2019 7:00 pm UTC 30 mins
    Join the GRC & IT Webinar Series for byte-sized sessions aimed at making federal regulations understandable and actionable. The challenge: achieving compliance against regulations such as FISMA, HIPAA, CCPA, GDPR, PCI and PII, among others. In this webinar quickly learn best practices in Information Assurance to automate regulation and compliance to achieve accountable security using controls, policies and more than check-the-box actions.
    -Techniques to adopt to automate policy and control mapping
    -Steps to improve your ability to see the over health of your environment
  • Managing the Business Risks of Open Source
    Managing the Business Risks of Open Source
    Scott Crawford, Research Director for Information Security, 451 Research & Phil Odence, GM, Black Duck by Synopsys Jan 24 2019 5:00 pm UTC 60 mins
    It’s no secret that “software is eating the world,” as Marc Andreessen once described—and it’s taking entire development communities to support it. Recently, open source has become a primary contributor to software found in the enterprise. According to a 2018 report from the Synopsys Center for Open Source Research & Innovation, the average percentage of open source in codebases examined in Black Duck audits has increased to 57% from only 36% from the previous year. But open source isn’t risk-free—and the implications can have a direct impact on the business.

    Join Scott Crawford, research director for information security with 451 Research, and Phil Odence, general manager of Black Duck On-Demand with Synopsys, to take a closer look at open source risks and the ways that businesses can better evaluate and mitigate them. They’ll cover the following points and more:

    • One of the highest-profile breaches of 2017 was the result of a widely exposed vulnerability in a popular open source application component, exposing millions of personal financial records—and costing business leaders their jobs.
    • In just the last few weeks, the implicit trust on which the open source ecosystem is based has been exploited to steal tangible assets.
    • What’s the real cost of a data breach? In at least one highly visible case, a breach reduced the dollar value of an acquisition by hundreds of millions. As business dependence on open source grows, so too does business exposure.
    • And of course, compliance with open source licenses remains a concern.

    Getting a handle on taming these threats to the business requires an approach that fits with the central role open source plays in the fast-moving world of continuous innovation.
  • Risk Management for 2020 and Beyond
    Risk Management for 2020 and Beyond
    Sam Abadir, Lockpath Jan 29 2019 5:00 pm UTC 60 mins
    Today’s fast-paced business environment demands efficiency and agility. Digital transformation and relying on third parties can streamline business processes and boost productivity, but they also bring new types of risk. As products and services grow in number and complexity, traditional risk management methods can’t adapt and scale to keep up. In this live webinar, Lockpath’s Sam Abadir will share what risk management for 2020 and beyond involves, including:

    -Critical capabilities for managing multiple types of risks

    -Strategies for tying risks to business objectives

    -Advantages of managing risk using a GRC platform

    -Leveraging the value chain for integrated risk management

    Discover the future for risk management by attending this educational webinar. Register now!
  • Managing the Complexity and Cost of Technology with TAM
    Managing the Complexity and Cost of Technology with TAM
    Gary Paquette, GM Technology Asset Management, at Nlyte Feb 6 2019 5:00 pm UTC 43 mins
    Listen in on the presentation from Gary Paquette, GM Technology Asset Management, Nlyte, he provides an overview of TAM: Technology Asset Management, including how it:

    - Provides a Technology Asset Baseline
    - Improves asset cost management
    - Allows organizations to become and remain compliant on their software entitlements
    - Reduces spending on underutilized resources
    - Integrates asset information across IT, Finance, and HR system
  • The 2018 Open Source Year in Review
    The 2018 Open Source Year in Review
    Mark Radcliffe, Partner at DLA Pipe & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, Synopsys Feb 6 2019 5:00 pm UTC 60 mins
    Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, Partner at DLA Piper and General Counsel for the Open Source Initiative and Tony Decicco, Shareholder, at GTC Law Group & Affiliates.

    This annual review will highlight the most significant legal developments related to open source software in 2018, including:

    •The rising importance of data and licensing considerations
    •Business model problems and the proposed solutions (RedisLabs and MongoDB)
    •Dangerous Legal Theories: core developers as fiduciaries
    •OSS vs. SSO: clash of models
    •Return of Linux patent troll: McHardy
    •The need to extend the scope of an audit to cover web services/APIs
    •The changing tide in open source license adoption
    •Big open source transactions
    •And more

    Live attendees will earn CLE credit for this webinar. Don’t miss out – register today.
  • Breached! What’s Your Cybersecurity Response Plan?
    Breached! What’s Your Cybersecurity Response Plan?
    EDRM and Zapproved Feb 12 2019 7:00 pm UTC 60 mins
    There is a lot of talk about strategies to prevent your data but what about your response plan if a breach does happen? Minimizing risk is essential, but just as critical for your litigation readiness plan is how to adjust your processes and measures in response. During this webinar, our panel of security experts will walk you through the steps and considerations following exposure.

    Speakers Include:
    Brad Harris, Vice President of Corporate Strategy, Zapproved LLC
    Chris Wolski, Chief Information Security Officer, Herman Miller Inc.
  • Fraudulent Wire Transfers in the Accounting Industry (1 CPE)
    Fraudulent Wire Transfers in the Accounting Industry (1 CPE)
    Ginger Johnson & Michael J Weber Feb 13 2019 6:00 pm UTC 75 mins
    Fraudulent wire transfers scams continue to plaque accounting firms nationwide. The FBI reports that fraudulent wire transfers have doubled since 2016. The new wave of scam e-mails have grown in their sophistication and appearance and no longer resemble clumsy “Nigeria” e-mails.
    Hear directly from the insurance company and lawyers on steps to prevent these fraudulent wire transfer scams and how to deal with a claim if this happens to your firm.

    Presented by Ginger Johnson & Michael J Weber - Michael J Weber Partner at Dinsmore. He focuses his practice on fidelity and surety bond claims/litigation, complex litigation, commercial law, transactional matters, general business matters/litigation and construction law. & Ginger Johnson is Specialty Claim Consultant at The Hanover Insurance Company working with Crime, Fidelity and first party Cybercrime claims up to $10M in the Management Liability Unit.
  • 2019 Federal Judges Survey: Key Takeaways and Trends
    2019 Federal Judges Survey: Key Takeaways and Trends
    EDRM and Exterro Feb 14 2019 6:00 pm UTC 60 mins
    Exterro and EDRM Duke Law surveyed over 250 active federal judges to empower legal professionals to hear directly from the bench on what e-discovery practices they should be applying.

    Register for this webcast to get exclusive advice and best practices for not only meeting e-discovery defensibility requirements but also learn...

    - Tips for reducing e-discovery expenses without sacrificing defensibility
    - How to effectively interact and communicate with judges on e-discovery issues
    - What new data types judges are seeing spoliated the most in their cases

    Speakers:
    John Rabiej, Deputy Director, Bolch Judicial Institute at Duke Law
    Jim Waldron, Director, EDRM at Duke Law
    Mike Hamilton, Director of Marketing Programs, Exterro
  • Delivering an Effective Cyber Security Exercise
    Delivering an Effective Cyber Security Exercise
    Daniel Norman, Research Analyst, ISF Feb 20 2019 1:00 pm UTC 45 mins
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks, such as ransomware and social engineering.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how to deliver an effective cyber security exercise and a wider cyber security testing programme to help organisations be better prepared for, and resilient to, a range of cyber attacks.
  • IT Risk Management for 2020 and Beyond
    IT Risk Management for 2020 and Beyond
    Sam Abadir, Lockpath Feb 21 2019 5:00 pm UTC 60 mins
    IT risk is always evolving, and in 2020 you need to be prepared what it may look like. New technologies and expanding trends such as cloud, digital transformation, and IT risk-related tasks being taken on directly by the business means IT risk will increase and potentially have greater impacts on the business without proper collaboration and management. Prepare for IT risk in 2020 and beyond by attending this live webinar led by Lockpath’s Sam Abadir. Topics to be discussed include:

    · Evolution of IT landscapes and what it means to IT risk management

    · IT risk management skillsets and disciplines

    · Collaboration across departments and building consensus

    · How organizational maturity impacts managing IT risk

    · How to sustain growth in 2020 and beyond



    Find out what you need to know to manage IT risk in 2020 and beyond by attending this educational webinar. Register now!
  • LIBOR Transition for Derivatives: A Global Approach
    LIBOR Transition for Derivatives: A Global Approach
    Hogan Lovells partners Evan Koster, James Doyle, Bronwen May, Katia Merlini, Jochen Seitz Feb 28 2019 1:30 pm UTC 90 mins
    The webinar will update viewers on the status of the LIBOR transition process globally, paying attention to the US, English, Asian, and EU markets. The webinar will summarise the results of the various market consultations, investigate how documentation is being affected, and explore issues relating to harmonisation with loan and other markets.
  • Cybersecurity in the Boardroom
    Cybersecurity in the Boardroom
    Mark Chaplin, Principal, ISF Mar 19 2019 1:00 pm UTC 45 mins
    Global spend on cybersecurity solutions will grow 33%, reaching $134 billion annually by 2022. Attackers are becoming more sophisticated and the threat of data breaches is bigger than ever. CISOs from around the world will discuss why security is a key focus for investment and how to employ the best strategy for your enterprise.

    In this webinar, Mark Chaplin, Principal, ISF will discuss how to communicate your security strategy to the board.
  • Configuration Compliance Management for 2020 and Beyond
    Configuration Compliance Management for 2020 and Beyond
    Sam Abadir, Lockpath Mar 21 2019 4:00 pm UTC 60 mins
    Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:

    •What configuration compliance management encompasses
    •Who should care about secure configuration management
    •Why organizations are not doing this today and how this impacts the business beyond IT


    Discover the future for configuration compliance management by attending this educational webinar. Register now!
  • Compliance and Policy Management for 2020 and Beyond
    Compliance and Policy Management for 2020 and Beyond
    Sam Abadir, Lockpath Apr 18 2019 4:00 pm UTC 60 mins
    Complying with regulations, managing policies and controls demand that organizations be flexible to meet any requirement thrown at them. It’s imperative that organizations plan to advance compliance and policy management so it can adapt as requirements change. If they’re using manual office tools, like spreadsheets and email this can slow down the advancement process, causing unnecessary risk. In this live webinar, Lockpath’s, Sam Abadir will share what compliance and policy management for 2020 and beyond entails, including:

    -How your organization can gain efficiency from compliance and policy management

    -Strategies for collaborating across departments

    -How streamlining processes can boost productivity

    -Planning ahead for sustained growth

    Discover the future for compliance and policy management by attending this educational webinar. Register now!