Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Fraud Scams: Red Flags & Best Practices to Prevent Loss
    Fraud Scams: Red Flags & Best Practices to Prevent Loss
    Josh McCarthy, Verafin Recorded: Jan 24 2020 59 mins
    Presented by Verafin

    From mass marketing fraud, to romance and work-from-home scams, and Business Email Compromise, savvy fraudsters are targeting your customers with a variety of illicit tactics — and inflicting millions of dollars in losses.

    Join Josh McCarthy as he discusses the potential reputational and financial risks to your institution and outlines best practices to protect your customers from the devastating emotional and financial effects of fraud scams.

    Highlights of this educational webinar include:

    - Evolution of fraud schemes & scams perpetrated through digital channels.
    - Red flags for common scams scenarios targeting customers.
    - Best practices for loss prevention, early detection, and investigation strategies.
    - Role of technology in fraud mitigation, including cloud data and multi-channel analysis.
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 23 2020 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • Podcast: Musings with Marc & Mary
    Podcast: Musings with Marc & Mary
    Mary Mack & Marc Zamsky Recorded: Jan 23 2020 17 mins
    Marc Zamsky, COO at Compliance Discovery Solutions and Mary Mack, CEO and Chief Legal Technologist at EDRM muse about Legalweek upcoming, what to do and see, BIG news Compliance is sharing and industry trends.
  • The 2019 Open Source Year in Review
    The 2019 Open Source Year in Review
    Mark Radcliffe, Partner at DLA Piper & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, Synopsys Recorded: Jan 23 2020 61 mins
    Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, partner at DLA Piper and general counsel for the Open Source Initiative, and Tony Decicco, shareholder at GTC Law Group & Affiliates.

    This annual review will highlight the most significant legal developments related to open source software in 2019, including:

    •Evolution of open source: control, sustainability, and politics
    •Litigation update: Cambium and Artifex cases
    •Patents and the open source community
    •Impacts of government sanctions
    •The shift left for compliance and rise of bug bounty programs
    •And much, much more

    Live attendees will earn CLE credit for this webinar. Don’t miss out—register today.

    CLE:
    DLA Piper LLP (US) has been certified by the State Bar of California, the Board on Continuing Legal Education of the Supreme Court of New Jersey, and the New York State Continuing Legal Education Board as an accredited CLE provider.
    The following CLE credit is being sought:
    •California: 1.0 Credit (1.0 General, 0.0 Ethics)
    •New Jersey: 1.2 Credits (1.2 General, 0.0 Professional Responsibility)
    •New York: 1.0 Transitional & Non-Transitional Credit (1.0 Professional Practice, 0.0 Ethics and Professionalism)
    CLE credit will be applied for in other states where DLA Piper has an office with the exception of Minnesota, North Carolina, Pennsylvania, and Puerto Rico.
  • 4 limitations of the three-way match you need to consider
    4 limitations of the three-way match you need to consider
    Ryan Birdsall Recorded: Jan 22 2020 27 mins
    The three-way match, which cross-references invoices, purchase orders, and receiving documents before issuing payments, has been considered the industry-standard procedure in accounts payable departments for years—until now.

    As businesses become more sophisticated, there are far more data points to confirm the validity of an invoice. Does it include all early payment discounts? Are the payment terms (net 30, net 60) enforced?

    Unfortunately, many accounts payable departments don’t have the time or resources to manually check these items and are unknowingly being overcharged for services that they didn’t receive, or products that aren’t for the negotiated rates or terms.

    Join Ryan Birdsall, Customer Success Manager, AppZen, as he discusses why Star Match brings far greater precision to the spend approval process than you’ve had in the past.
  • Digital Identity and Connected Cars - Leveraging the Power of IAM
    Digital Identity and Connected Cars - Leveraging the Power of IAM
    Dr. Heiko Klarl, CMO, iC Consult Group and Gerhard Zehethofer, Vice President IOT, ForgeRock Recorded: Jan 22 2020 40 mins
    As vehicles become smarter and more connected, their technology relies on digital identity to personalise and secure the customer experience. For the fleet manager, insurance provider, consumer, and anyone else in the modern connected vehicle environment, knowing “who” can access “what” is essential.

    In this joint webinar with iC Consult and ForgeRock you learn how to build up your connected identity strategy. Not only will you create synergies with other business areas, you also gain speed and a shorter time to market when rolling out connected services and explore new business models.

    Webinars / Webcasts
    With your registration you agree that we submit your data to the Sponsor of this webinar to enable them to contact you and to do follow-up marketing. The legal basis for processing your personal data this way is our legitimate interest according to Art. 6 (1) (f) GDPR, which would be the participation of our sponsors, which contribute large portions of the costs of the Webinars / Webcasts.
  • Identity Verification for CCPA Compliance: Trial & Error
    Identity Verification for CCPA Compliance: Trial & Error
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident Recorded: Jan 21 2020 44 mins
    The California Consumer Privacy Act (CCPA), which went into effect on January 1, 2020, gives consumers the right to access, delete, or opt out their personal data. Under CCPA, companies are not only obligated to furnish, delete, or opt consumers out of the sale of their data, they’re also required to verify every requestor’s identity to avoid inadvertently sharing sensitive data with fraudsters.

    After a giant GDPR loophole was exposed, it quickly became understood how easily cybercriminals were fraudulently submitting data subject requests in order to gain access to personal data that isn’t theirs. While this is certainly one reason to incorporate adequate identity verification into the consumer rights request workflow, cybercriminals aren’t the only threats that businesses need to worry about.

    Opportunistic data protection and privacy lawyers will be proactively scrutinizing processes to see if companies will make mistakes and accidentally furnish data to the wrong person so they can sue on behalf of their consumers. Additionally, CCPA consumer rights requests will likely shine a light on companies’ data protection practices, as the 2019 Carlton Fields Class Action Survey indicated that the next wave of class action suits will result from data breaches.

    In this webinar, we’ll discuss potential DSR threats from three different groups: cybercriminals, privacy lawyers, and data subjects, and how to avoid attacks with proper identity verification that offers an appropriate level of assurance that’s compatible with business’ specific needs.

    Key Takeaways:
    The importance of getting an automated DSR fulfillment workflow in place to handle a high volume of requests securely, consistently, and compliantly
    The role identity verification plays in avoiding DSR denial of service attacks
    Discuss how to implement “reasonable” verification that is frictionless for consumers and lawyers, but that keeps the bad guys out
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 21 2020 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • Digitale Identität und Connected Cars - Die Power von IAM richtig eingesetzt
    Digitale Identität und Connected Cars - Die Power von IAM richtig eingesetzt
    Dr. Heiko Klarl, CMO, iC Consult Group and Gerhard Zehethofer, Vice President IOT, ForgeRock Recorded: Jan 21 2020 39 mins
    Fahrzeuge werden zunehmend intelligenter und vernetzter. Um das Kundenerlebnis bestmöglich zu personalisieren und zu sichern, baut ihre Technologie auf digitale Identität. Für den Fuhrpark-Manager, den Versicherer, den Verbraucher und alle anderen Akteure im Connected Car Ökosystem ist es wichtig zu wissen, "wer" auf "was" zugreifen kann.

    In dem gemeinsamen Webinar von iC Consult und ForgeRock erfahren Sie, wie Sie:
    - Ihre Connected Identity-Strategie aufbauen können.
    - Synergien mit anderen Geschäftsbereichen schaffen können.
    - Beim Rollout von vernetzten Diensten als auch bei der Erforschung neuer Geschäftsmodelle die Geschwindigkeit erhöhen und die Time-to-Market verkürzen können.

    Webinare / Webcasts
    Mit Ihrer Registrierung erklären Sie sich damit einverstanden, dass wir Ihre Daten an den Sponsor dieses Webinars weitergeben, damit dieser Sie kontaktieren und Follow-up-Marketing betreiben kann. Die Rechtsgrundlage für die Verarbeitung Ihrer personenbezogenen Daten auf diese Weise ist unser berechtigtes Interesse gemäß Art. 6 (1) (f) DSGVO, das wäre die Teilnahme unserer Sponsoren, die einen großen Teil der Kosten für die Webinare / Webcasts übernehmen.
  • Learning from Fraud Detection: Segmenting AML to Fight Financial Crime
    Learning from Fraud Detection: Segmenting AML to Fight Financial Crime
    Brendan Brothers Recorded: Jan 17 2020 60 mins
    Why do we think about AML as a single idea, when fraud is segmented specifically by customer, channel or loss type? In this insightful session, Jim Richards and Brendan Brothers discuss the limitations of the current one-size-fits-all approach to compliance and anti-money laundering. Learn why segmentation is effective at fighting fraud, and how these lessons can be applied to transform the AML industry.

    Learning Objectives
    - Review of the limitations of current AML approaches and technologies to -effectively fight financial crime
    - Understand how segmentation improves fraud detection and how these lessons can be applied to strengthen anti-money laundering efforts
    - Learn how innovative technologies and customer segmentation will transform the AML industry
  • SkyStem: Perfecting the Close Checklist
    SkyStem: Perfecting the Close Checklist
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 16 2020 55 mins
    [Live Recording] It's time to spruce up the close checklist! Join us in this webinar where we will revisit best practices as well as practical tips to help improve the financial close process. Whether you have a close checklist, a close calendar, or even if you are still forming a close process, these practices will surely help your period-end close.

    Please note: CPE credit not available for this playback
  • Best practices when selecting a Colocation Provider
    Best practices when selecting a Colocation Provider
    Nlyte Recorded: Jan 15 2020 58 mins
    In this fast-moving market, what should businesses think about when selecting a provider? The shift to hybrid models of operation is here to stay.

    Enzo Greco, Chief Strategy Officer at Nlyte Software, Adam Levine Chief Commercial Officer at Data4 and George Rockett, CEO at DCD uncover key considerations for successful Colocation Provider and Tenant relationships:

    - Driving real-time visibility on resource-usage and performance to make data-based decisions
    - Reduce risk of downtime
    - Optimize consumption and reduce operational costs
    - Automating tasks and understanding facility performance
    - Great content for colocation providers and data center managers that use colocations
  • Build or Buy a Customer Identity Platform?
    Build or Buy a Customer Identity Platform?
    Andre Priebe, CTO, iC Consult Group & Mathias Conradt, Enterprise Solutions Engineer, Auth0 Recorded: Jan 15 2020 62 mins
    In this webinar, Andre Priebe, CTO of iC Consult Group, will give you an overview of the options available on the market when it comes to implementing a customer identity platform, along with their advantages and disadvantages.
    Mathias Conradt, Enterprise Solutions Engineer at Auth0, will then discuss the journey from building multiple individual login forms for each app, to buying an identity platform to support all your needs, complemented by an Auth0 live demo.

    In this joint webinar you will learn about:

    Why Identity Management is a key factor in business
    The pros & cons of building vs. buying a customer identity platform
    The total cost of ownership of both possible solutions
    Examples of what a customer identity platform should be able to support
    What the Auth0 Solution looks like and how it supports these requirements

    Webinars / Webcasts
    With your registration you agree that we submit your data to the Sponsor of this webinar to enable them to contact you and to do follow-up marketing. The legal basis for processing your personal data this way is our legitimate interest according to Art. 6 (1) (f) GDPR, which would be the participation of our sponsors, which contribute large portions of the costs of the Webinars / Webcasts.
  • Best practices when selecting a Colocation Provider
    Best practices when selecting a Colocation Provider
    Nlyte Recorded: Jan 15 2020 58 mins
    In this fast-moving market, what should businesses think about when selecting a provider? The shift to hybrid models of operation is here to stay.

    Enzo Greco, Chief Strategy Officer at Nlyte Software, Adam Levine Chief Commercial Officer at Data4 and George Rockett, CEO at DCD uncover key considerations for successful Colocation Provider and Tenant relationships:

    - Driving real-time visibility on resource-usage and performance to make data-based decisions
    - Reduce risk of downtime
    - Optimize consumption and reduce operational costs
    - Automating tasks and understanding facility performance
    - Great content for colocation providers and data center managers that use colocations
  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 14 2020 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • Kunden-Identitätsplattform selbst entwickeln oder kaufen?
    Kunden-Identitätsplattform selbst entwickeln oder kaufen?
    Andre Priebe, CTO, iC Consult Group & Mathias Conradt, Enterprise Solutions Engineer, Auth0 Recorded: Jan 14 2020 62 mins
    In diesem Webinar gibt Ihnen Andre Priebe einen Überblick über die Möglichkeiten, die es bei der Implementierung einer Customer Identity Plattform derzeit auf dem Markt gibt und welche Vor- und Nachteile diese mit sich bringen. Mathias Conradt wird dann den Weg vom Aufbau mehrerer individueller Anmeldeformulare für jede App bis zum Kauf einer Identity Platform für all Ihre Bedürfnisse anhand einer Auth0-Live-Demo erläutern.

    In diesem Webinar erfahren Sie mehr über:
    - Die Relevanz von Identitätsmanagement im Unternehmen
    - Die Vor- und Nachteile von selbst entwickeln vs. dem Kauf einer Customer Identity Plattform
    - Die Total Cost of Ownership der beiden möglichen Lösungen
    - Beispiele dafür, was eine Customer Identity Plattform unterstützen sollte
    - Die Auth0-Lösung und wie sie diese Anforderungen unterstützt.

    Webinare / Webcasts
    Mit Ihrer Registrierung erklären Sie sich damit einverstanden, dass wir Ihre Daten an den Sponsor dieses Webinars weitergeben, damit dieser Sie kontaktieren und Follow-up-Marketing betreiben kann. Die Rechtsgrundlage für die Verarbeitung Ihrer personenbezogenen Daten auf diese Weise ist unser berechtigtes Interesse gemäß Art. 6 (1) (f) DSGVO, das wäre die Teilnahme unserer Sponsoren, die einen großen Teil der Kosten für die Webinare / Webcasts übernehmen.
  • How Do You Find Your High-Risk Customers?
    How Do You Find Your High-Risk Customers?
    Corey Lynch, Verafin Recorded: Jan 10 2020 59 mins
    Presented by Verafin

    Financial institutions invest significant time and resources into identifying customers in high-risk categories, such as Private ATM Owners, Money Service Businesses (MSBs), Marijuana-Related Businesses (MRBs), Non-Governmental Organizations or Charities (NGOs), Cash Intensive Businesses (CIBs), and more.
     
    Unfortunately, for most compliance professionals these processes are primarily manual today. Continuously updating and reviewing reports and spreadsheets can hinder your ability to meet examiners expectations, fulfill compliance requirements, and follow your institution’s policies for uncovering high-risk customers.  
     
    Join us to learn how to alleviate manual processes for identifying higher-risk customers, automate due diligence processes, and strengthen your overall compliance program.

    Highlights of this webinar:
    - Review of CDD/EDD requirements and expectations for higher-risk categories of customers as outlined in the FFIEC BSA/AML Examination Manual.
    - Discussion on the challenges and potential risks of conventional processes for manually identifying and managing high-risk customers.
    - Overview of new technology approaches with targeted monitoring for risk factors, alerting you to unidentified higher-risk categories, including:
    > Private ATM Owners
    > Money Service Businesses (MSBs)
    > Marijuana-Related Businesses (MRBs)
    > Non-Governmental Organizations (NGOs) or Charities
    > Cash Intensive Businesses (CIBs)
  • SkyStem: Back to Basics with Reconciliations
    SkyStem: Back to Basics with Reconciliations
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 9 2020 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • Eliminate errors and waste in AP spend with AI
    Eliminate errors and waste in AP spend with AI
    Pippa Spencer Recorded: Jan 8 2020 28 mins
    Even if you have a tight accounts payable process with a best-in-class invoice automation system, it’s impossible to catch all of the errors, waste, and fraud in your business spend.

    Join Pippa Spencer, Lead Implementation Success Manager at AppZen, as she explains how AI-powered AP audit helps you to
    - Reduce spend
    - Streamline process
    - Stay compliant
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 7 2020 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • Artificial Intelligence and Machine Learning to Fight Financial Crime
    Artificial Intelligence and Machine Learning to Fight Financial Crime
    Brendan Brothers, Verafin Recorded: Dec 27 2019 54 mins
    Panel Discussion

    An engaging panel of industry leaders will provide their insights into the role of new technologies to fight financial crime. The experts will highlight the need to separate reality from the hype by discussing the benefits of artificial intelligence and machine learning through the lens of real-life cases.

    Learning objectives of this CAMS-accredited webinar:

    - Understand the challenges and limitations of conventional technology in an increasingly complex financial crime landscape.
    - Review of real-life cases where technology played a critical role to enhance detection, strengthen investigations, and improve reporting to law enforcement.
    - Gain insights from industry leaders on the future of crime-fighting technology including artificial intelligence and machine learning.

    Join us for this engaging panel with industry experts, as they highlight the need to separate reality from the hype by discussing the benefits of artificial intelligence and machine learning through the lens of real-life cases.
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Dec 26 2019 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • Crime Rings: The Intersection of Fraud and Money Laundering
    Crime Rings: The Intersection of Fraud and Money Laundering
    Verafin Recorded: Dec 20 2019 55 mins
    Presented by Verafin

    Banks and credit unions are facing significant challenges to prevent financial crimes, such as money laundering and terrorist financing, as criminals become more sophisticated in their efforts to evade detection.
     
    From criminal groups amassing millions in illicit profits by orchestrating online fraud schemes, to Human Trafficking, Human Smuggling, and Drug trafficking organizations using mule networks to facilitate the movement of criminal proceeds across borders — crime rings operating across multiple institutions are a real and growing threat.
     
    Join us for this educational webinar, as we provide insights into the trends and typologies of crime ring activity. We will discuss the intersection of fraud and money laundering activity in the context of organized criminal networks and provide real-life examples
     
    In this educational webinar, you will learn:
    - The role of fraud schemes in funding criminal organizations
    - Tactics used by criminal groups to move illicit funds through the US financial system
    - Walk through of real-life examples of crime rings that span multiple institutions
    - How technology and collaboration can overcome the challenges of a single institution’s limited view of activity.
  • Getting Automation Right with Professional Services
    Getting Automation Right with Professional Services
    Dor Haim, Professional Services Manager, Kryon Recorded: Dec 20 2019 22 mins
    The Robotic Process Automation (RPA) journey is all about technology taking the strain when it comes to repetitive tasks, allowing employees to focus on more profitable activities instead. Although we at Kryon take great pride in how easy it is for anyone to use our RPA solutions, we recognize that sometimes a little help might be needed to really get the maximum benefit from automation.

    This is exactly where Professional Services comes in.

    Join us for top tips on:
    ● Why you should consider using Professional Services
    ● The key areas where expert help can make a massive difference
    ● How to achieve trouble-free, tailored deployments for your company’s unique challenges
  • Scaling Your Automation Project the Right Way
    Scaling Your Automation Project the Right Way
    Salo Ben-Avi, Chief of RPA & Strategic Projects, Kryon Recorded: Dec 20 2019 19 mins
    Starting your Robotic Process Automation (RPA) journey is a big – but exciting – step. But once your RPA project is underway, how can you scale it up by finding even more processes that are ripe for automation? And just as importantly, how can you make sure that your project is optimized for the best possible results? Kryon’s unique Process Discovery™ tool answers both of these questions.

    Join us for pro tips and on:
    ● The #1 reason that most companies struggle to scale their automation projects
    ● How Process Discovery™ can save you precious time and money right from the start
    ● What you need to do to ensure that your RPA project keeps delivering the goods
  • Why Your Source-to-Pay-Process Loses Money
    Why Your Source-to-Pay-Process Loses Money
    Josh Morrison, Solutions Specialist, Business Development, PRGX Jan 28 2020 6:30 pm UTC 56 mins
    Many challenges exist throughout the Source-to-Pay (S2P) cycle. Companies are constantly challenged to find new efficiencies, identify leakage points to capture savings, and strategize around new profit-driving and growth opportunities.

    In this webinar, you will hear about the real keys to successfully managing your S2P processes, and the strategies and techniques that can be used by any organization to increase efficiency and effectiveness.

    In this webinar, our Global Director of Solution Consulting, Josh Morrison and Former CPO of UPS, Gary Kallenbach speak on how the best companies in the world optimize their S2P process.
  • SkyStem: Back to Basics with Reconciliations
    SkyStem: Back to Basics with Reconciliations
    Nancy Wu, Sales and Customer Support, SkyStem Jan 28 2020 8:00 pm UTC 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • Real-Time Digital KYC: How to Ignite Revenue and Minimize Client Disruption
    Real-Time Digital KYC: How to Ignite Revenue and Minimize Client Disruption
    Greg Watson, Rachel Woolley, Nicola Poole Jan 29 2020 10:00 am UTC 47 mins
    How can financial institutions move from micromanaged, siloed operations to managing KYC by exception and enable a truly digital, real-time model for KYC remediation, profiling and due diligence?

    In this webinar we examined:
    - What Digital KYC truly means
    - How Financial Institutions are undertaking real time KYC practices
    - The latest KYC trends and practices

    The industry is now looking toward real-time, instant KYC refreshes, profiling & due diligence solutions that operate on a continuous basis, allowing for true seamless digital compliance & onboarding. Until now, real-time KYC remediation, profiling and due diligence was not possible, however with the arrival of Fenergo’s Digital KYC solution, this has all changed.
  • What To Do At Legalweek
    What To Do At Legalweek
    Mary Mack, Ian Campbell, Chris Dale, Kaylee Walstad Jan 29 2020 6:00 pm UTC 75 mins
    Join longtime Legalweek participants, speakers Ian Campbell, CEO of iCONECT as he shares 25 years of LegalTech experience, Chris Dale, eDisclosure Information Project as he discusses his 13 years of LegalTech speaking & participation, Mary Mack, CEO of EDRM and Kaylee Walstad, CSO EDRM share what to do, what to see, what's hot and what's not and Do Not Miss events that happen everyday/evening during Legalweek!
  • Important eDiscovery Case Law Decisions of 2019 and Their Impact on 2020
    Important eDiscovery Case Law Decisions of 2019 and Their Impact on 2020
    Doug Austin and Tom O'Connor Jan 29 2020 6:00 pm UTC 75 mins
    2019 was another notable year for eDiscovery case law with several significant rulings that stand to impact eDiscovery practices, the admissibility of evidence and the potential of sanctions for discovery violations. How can these key case law decisions affect discovery within your organization? This CLE-approved* webcast session will cover key 2019 case law decisions covered by the eDiscovery Daily blog and what the legal profession can learn from those rulings. Topics include:

    + Biometric Fingerprint Scanning and Privacy
    + Non-party ESI Requests in Litigation
    + Social Media Trends and Judge "Friending"
    + Password Provision and Fifth Amendment Protection
    + Staying Discovery while a Motion to Dismiss is Considered
    + Case Law Trends in Ephemeral Messaging App Discovery
    + Case Law Trends in Mobile Device Discovery
    + Sanctions Trends under Rule 37(e)
    + Sanctions and Case Strategy
    + Inadvertent Disclosures and Sanctions

    Presentation Leaders:
    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience in legal technology and is the editor of the CloudNine sponsored eDiscovery Daily blog, a trusted resource for eDiscovery news and analysis.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • SkyStem: Perfecting the Close Checklist
    SkyStem: Perfecting the Close Checklist
    Nancy Wu, Sales and Customer Support, SkyStem Jan 29 2020 7:00 pm UTC 55 mins
    [Live Recording] It's time to spruce up the close checklist! Join us in this webinar where we will revisit best practices as well as practical tips to help improve the financial close process. Whether you have a close checklist, a close calendar, or even if you are still forming a close process, these practices will surely help your period-end close.

    Please note: CPE credit not available for this playback
  • How to Communicate Risk & Security Program Value to Executives
    How to Communicate Risk & Security Program Value to Executives
    Sam Abadir, CISM, Lockpath Jan 30 2020 5:00 pm UTC 60 mins
    Many departments struggle with building a business case to create an effective, ethics-based risk management program. Plenty of executives today still think of risk management as a defensive, overhead activity or activities that are performed to satisfy legislative or regulatory requirements and deserve minimal attention.

    In this webinar, Lockpath’s Sam Abadir will help attendees understand the different value propositions business executives need to know to understand and support risk management projects across the organization.

    Attendees will learn how to:
    •Articulate their current and future risk management goals
    •Understand their risk management value proposition
    •Define business case benefits and communicate value to business executives
    •Define tools and resources needed to achieve goals
    •Understand an approach for their GRC or IRM program
  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Jan 30 2020 8:00 pm UTC 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • Elder Financial Abuse
    Elder Financial Abuse
    John Hawkin, Verafin Jan 31 2020 5:30 pm UTC 42 mins
    Presented by Verafin


    Elder Financial Abuse is a significant and growing problem issue that has devastating effects on individuals and families. Believed to be largely underreported — financial institutions are facing increased responsibility to help combat the exploitation of vulnerable customers.

    Early detection of red flags and timely reporting to law enforcement are critical to protecting elderly customers from financial loss. This was emphasized in the 2011 Advisory from FinCEN, as well as the 2018 Joint Memorandum encouraging coordination among law enforcement, and adult protective service agencies (APS) to protect issued by CFPB, the Department of the Treasury, and FinCEN.

    Join us for this webinar, as we discuss the scale of Elder Financial Exploitation and outline key considerations from industry publications and guidance, including red flag indicators and best practices for reporting.
     
    In this webinar, you will learn:
    - The scale of Elder Financial Exploitation and the challenges of preventing fraud targeting senior customers.
    - Potential Red Flag Indicators of Elder Financial Exploitation from the FinCEN Advisory
    - Best practices for reporting Elder Financial Exploitation, including Suspicious Activity Reporting, and contacting appropriate local and state-level agencies.
  • Live demo: Audit every dollar of AP spend with AI
    Live demo: Audit every dollar of AP spend with AI
    Angie Rodriguez Feb 5 2020 7:00 pm UTC 60 mins
    Angie Rodriguez, Solution Consultant, AppZen, gives a high-level overview of how AppZen audits every dollar of AP spend and showcases the capabilities and key features of the AP Audit Platform.

    Attend this webinar to learn how to
    -Prevent duplicate charges
    -Enforce payment terms
    -Identify missing discounts
  • Leveraging Big Data and Collaborative Investigations for Fraud Prevention
    Leveraging Big Data and Collaborative Investigations for Fraud Prevention
    Brendan Brothers, Verafin Feb 7 2020 5:30 pm UTC 56 mins
    (ACAMS Webinar Rebroadcast)

    In this insightful session, Brendan Brothers, Co-Founder of Verafin and Anti-Financial Crime Specialist, will discuss the evolution of financial crime and how financial institutions can embrace innovative approaches to proactively prevent fraud and combat crime ring activity.

    Brendan will outline how financial institutions can leverage big data, machine learning technology and 314(b) information sharing for effective fraud prevention, including proactive trend identification, reduction in false positive results, and collaborative investigations of multi-institutional crime ring activity.

    Learning Objectives
    - Understand the limitations and challenges of conventional fraud prevention approaches
    - Leveraging big data, machine learning technology, and 314(b) information sharing to mitigate losses and prevent fraud
    - Enhancing detection, strengthening investigations, and improving reporting to law enforcement
  • Data at Work - Strategy, Part 1
    Data at Work - Strategy, Part 1
    Brendon Ellis, Caroline Carruthers and Kim Naess Feb 11 2020 10:00 am UTC 20 mins
    In part 1 of our podcast focusing on Data Strategy, our panel of experts take on some of the major questions around data strategy: How to get started, the importance of aligning your data strategy with your corporate vision, and getting everyone on the same page. The dangers of focusing too much on the technology itself - our imaginations and how we use those tools are just as vital... And why "perfection is a disease". Once you have listened to this podcast, please listen to the extended discussion in part 2.
    Watch also the introduction webinar to learn more about the series: https://www.brighttalk.com/webcast/15913/382721
  • Detecting and Reporting Crypto Transactions
    Detecting and Reporting Crypto Transactions
    Matthew Lau, CAMS, Product Manager, Guardian Analytics; Stephen Ryan, COO & Founder, CipherTrace Feb 11 2020 7:00 pm UTC 60 mins
    Detecting and reporting crypto transactions is an ongoing challenge because current legacy tools don’t have the capabilities to ingest crypto key words or bank account data.

    Guardian Analytics’ modern AML case management and CipherTrace’s crypto data together combine leading-edge technologies to:

    - Detect all the crypto transactions passing through your financial institution
    - Alert and generate cases on suspicious crypto transactions
    -Report on all the suspicious crypto transactions to FinCEN
  • MISAC Ransomware Prevention
    MISAC Ransomware Prevention
    Donald E Hester Feb 12 2020 6:00 pm UTC 120 mins
    MISAC MuniTech Academy presentation. Local governments are at high risk for ransomware attack, and the Federal Government and government associations recommend immediate action. A recent report from the Cybersecurity and Infrastructure Security Agency (CISA) states that the cost for recovery tops $5 billion in 2019 year to date. The department of Homeland Security, CISA, MS-ISAC, NGA & NASCIO recommend immediate action to safeguard against ransomware attacks. In order to help clients effectively combat the current growing cyber-threats, we have created a ransomware readiness checklist from the recent US Federal Government Interagency technical guideline, Cybersecurity and Infrastructure Security Agency (CISA) guidelines, National Cyber Security Centre (NCSC), UK and NIST guidelines. In this session we will cover the items in our checklist and the recommendations on preparation.
  • Data at Work - Strategy, Part 2
    Data at Work - Strategy, Part 2
    Brendon Ellis, Caroline Carruthers and Kim Naess Feb 18 2020 10:00 am UTC 22 mins
    In part 2 of our podcast focusing on Data Strategy, our panel of experts discuss some key learnings from their experiences: If an organisation is to grow and evolve in line with the value in its data, then so too must its data strategy. It's vital to have the drive and belief to be brutal when necessary to recalibrate or even cancel projects when they aren't going to plan. Why it's important to keep strategy as high-level as possible to avoid overcomplication, and how in time, your data strategy can be used to build out a wider data story and enable the organisation to not just embrace change but leverage it. Please note - we recommend that you listen to part 1, before listening to this episode.
    Watch also the introduction webinar to learn more about the series: https://www.brighttalk.com/webcast/15913/382721
  • Turning Good Security into Good HIPAA Compliance
    Turning Good Security into Good HIPAA Compliance
    Adam Greene, Partner, Davis Wright Tremaine; Kathleen Randall, EVP North America, SureCloud Feb 18 2020 5:00 pm UTC 45 mins
    It may seem odd, but your organization may have a robust, mature information security program but still have terrible compliance. In fact, recent HIPAA audits revealed this happens often within organizations which are focused heavily on information security. This webinar will bridge the gap between good information security and good HIPAA compliance, addressing what the regulators are looking for, and how their expectations differ from typical information security practices.

    The 45-minute webinar will provide practical takeaways regarding:
    1) How to ensure that you are conducting a risk assessment and implementing a risk management plan that will pass muster with regulators.
    2) How you can ensure that you get credit for the good information security work you are doing.
    3) The regulators' expectations for policies and procedures.
    4) Risk assessment scope best practices checklist

    In this webinar, Adam Greene, veteran health attorney and former key regulator at the U.S. Department of Health and Human Services, will walk through what key elements of the risk analysis will help you in the event of an OCR audit.
  • Why All Open Source Scans Aren’t Created Equal
    Why All Open Source Scans Aren’t Created Equal
    Phil Odence & Emmanuel Tournier at Synopsys Feb 20 2020 5:00 pm UTC 58 mins
    Understanding the risks associated with open source software has become the norm in tech due diligence but not all approaches are created equal. Are you approaching open source diligence in the most efficient and effective way possible? Do you understand the difference between a point in time open source analysis for M&A and ongoing open source management?

    Join us for this live webinar and learn how a purpose-built M&A open source audit differs from open source management tools and why it matters in tech due diligence. We’ll cover:

    •The types of risk around open source software
    •Why depth of analysis matters, and what it results in during M&A diligence
    •Why accuracy, reporting and expert human analysis are keys to thorough diligence

    Don’t miss this informative webinar. Register today.
  • Using Big Data to Improve Retail Margins
    Using Big Data to Improve Retail Margins
    Willl Auchincloss, VP Advisory & Analytics, PRGX | Jennifer Cyra, Former SVP Merchandising & Private Brands Office Depot Feb 25 2020 6:30 pm UTC 31 mins
    Continuous channel shifts create competitive pressure for retailers to invest more in pricing and customer strategy, but greater complexity of data in today’s changing world and a lack of tools to tackle these new issues means that both managing margins and buying better are becoming more challenging than ever.

    In the next installment of PRGX’s Retail Webinar Series, learn how PRGX’s Merchandise Margin Improvement (MMI) solution attacks this margin leakage problem by using modern technologies and a big-data approach.

    Listeners will come away with information on how their companies could reduce COGS, increase working capital, and gain insights into the following value-enriching opportunities:

    - Item-Level Quick Wins
    - Compliance Programs
    - Data-led Negotiations
    - Margin Management Enhancements
    - Mergers & Acquisitions
  • Contract Compliance: An Untapped Opportunity
    Contract Compliance: An Untapped Opportunity
    Shveta Agarwal, Contract Compliance Senior Audit Manager, US | Rob Brown, Director Supplier Services, The Coca-Cola Company Mar 12 2020 6:30 pm UTC 38 mins
    Procuring materials and indirect services involves ever-greater complexities in the global supply chain and risks that can impact profits. Organizations devote significant time and effort to negotiating complex supplier contracts, however; once contracts are in place, often customers assume they’re getting the value that they were promised. A disciplined approach to contract compliance testing extracts the greatest business insights and helps recover lost profits.

    In the next installment of PRGX’s Retail Webinar Series, learn how PRGX’s Contract Compliance program applies unmatched data mining technologies and specialized global resources to conduct supplier audits and maximize the return on your hard-fought supplier contracts.

    Listeners will come away with the understanding of how a comprehensive Contract Compliance audit program can:

    - Be considered a best practice in supplier governance among best-in-class organizations
    - Identify and recover negotiated savings in strategic supplier contracts
    - Provide actionable opportunities for business insights and future cost avoidance
  • Why Lawyers Should Care About Open Source Security in M&A
    Why Lawyers Should Care About Open Source Security in M&A
    Matt Jacobs, Synopsys, Jacob Ewers, Synopsys Mar 18 2020 4:00 pm UTC 60 mins
    As part of the M&A due diligence process, lawyers seek to understand the license compliance risks that come with the use of open source. But what about open source security vulnerabilities that could be lurking in the code that’s being acquired? Minimizing risk and exposure is the name of the game.

    Join this live webinar to learn why an open source security review should be part of every due diligence transaction. We’ll cover:

    •How the audit landscape has shifted to include security
    •The types of security vulnerabilities that can keep you up at night
    •How a security audit can minimize risk

    Don’t miss this informative webinar. Register today.
  • The Top 5 Ways to Prevent Overpayments
    The Top 5 Ways to Prevent Overpayments
    Lisa Marley, Audit Manager, PRGX Apr 7 2020 5:30 pm UTC 43 mins
    In this webinar, Recovery Audit expert Lisa Marley reveals five common occurrences when it comes to overpayments and solutions to combat them.
  • Are You Acquiring the Next Big Breach? Security Vulnerabilities & M&A
    Are You Acquiring the Next Big Breach? Security Vulnerabilities & M&A
    Hal Hearst, Synopsys. Phil Odence, Synopsys Apr 16 2020 4:00 pm UTC 60 mins
    Software contains vulnerabilities and if you’re acquiring a company where software is a big part of the deal, you should understand if there is anything in that software that can be exploited.

    Join this live webinar to learn why security is a key piece of tech due diligence and the way your audit vendor manages their security data matters. We’ll cover:

    •Why due diligence has moved beyond license compliance
    •How you (and your vendor) can get a more in-depth view of your vulnerabilities
    •Strategies for understanding your security risks

    Don’t miss this informative webinar. Register today.
  • MISAC MuniTech Academy ICS SCADA Cybersecurity
    MISAC MuniTech Academy ICS SCADA Cybersecurity
    Donald E Hester Apr 21 2020 5:00 pm UTC 120 mins
    Many organizations struggle to protect their Industrial Control Systems (ICS) and SCADA systems. Other organizations struggle with knowing how much cyber risk their organization has. ICSs are often critical systems with low tolerance for interruption, making them very tempting targets for threat-actors especially nation-states. Thus far, incidents have been low but the emergence of proof-of-concept attack software suggests that this trend may not hold for long. Local Governments need to get ready now before they find themselves a victim. Unlike personal computers, which can be reformatted and restored from backup if required, PLCs and other components can be “bricked.” This means that malware could render them completely inoperable and requiring physical replacement. In this session we will cover some of the difficulties with cybersecurity and ICS, including Supply Chain, Vendor Management, Shared Responsibility and going beyond the standards.
    ICS-CERT
    Coverage
    NIST CSF, NIST SP 800-53, COBIT, ISO 27001, ISA 62443, COSO, AWWA G430-14
    IT, OT, IoT, Cloud, AI
  • Five Key Components to Managing Supplier Contracts
    Five Key Components to Managing Supplier Contracts
    Vijay Parekh, Senior Director of Delivery, Contract Compliance EMEA Apr 30 2020 5:30 pm UTC 21 mins
    Procuring materials and indirect services involves ever-greater complexities in the global supply chain and risks that can impact profits. Organisations devote significant time and effort to negotiating complex supplier contracts, however; once contracts are in place, often customers assume they’re getting the value that they were promised. Through the forensic audit of a contract and examples of a good audits right clause, the importance and often under-estimated revenue benefits of a contract compliance program will be outlined.

    In this webinar, attendees will learn 5 tips for best practices when renegotiating supplier contracts:

    1.Get the language right
    2.Make sure both parties understand and acknowledge the commercial terms
    3.Accountability and responsibility
    4.Strong Governance
    5.Relationships are important
  • A Playbook of Success for Recovery Audit
    A Playbook of Success for Recovery Audit
    Zach Braford, Director of Product Management, PRGX May 26 2020 5:30 pm UTC 22 mins
    In this webinar, "A Playbook of Success for Recovery Audit," you'll discover four ways to get the most out of your Recovery Audit. Industry expert and Director of Product Development at PRGX, Zach Braford, outlines real-life winning strategies used for our clients.

    In this webinar, we explore:

    1. How to extract more benefits by engaging in detailed audits
    2. How to increase the value of your audit by increasing the scope
    3. How to manage an audit in a global company
    4. Defining a playbook of success for your company