The Volcker Rule - a webinar by Protiviti and Morrison & Foerster LLP
A Discussion of Implications of the Volcker Rule for Financial Institutions
The federal financial regulatory agencies have agreed to publish proposed rules that implement the proprietary trading and private fund sponsorship and investment prohibitions of the Dodd-Frank Act's Volcker Rule. Several of the participating agencies have already published the proposed rules for public comment.
In addition to applying the basic restrictions of the Volcker Rule to covered banking entities, the proposed rules would create a number of significant regulatory compliance, corporate governance and reporting obligations for affected financial institutions.
â¢ Proprietary trading
o What is proprietary trading?
o Dealing, underwriting and market-making activities
o Trading in exempted financial instruments
o Impact on derivatives, securitizations and structured finance activities
o Permitted hedging and customer trading activities
â¢ Exempted and prohibited private equity and hedge fund activities
â¢ Impact on foreign bank trading and private equity/hedge fund activities
â¢ Conflicts of interest and "high risk" activities
â¢ Compliance, governance and reporting requirements
RecordedDec 14 201180 mins
Your place is confirmed, we'll send you email reminders
You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?
Please submit top-of-mind questions during the webinar registration process.
CPE credits will be provided to qualifying attendees.
Protiviti has conducted the second-annual Executive Perspectives on Top Risks Survey. We obtained the views of more than 370 board members and C-suite executives about risks that are likely to affect their organisation in 2014.
Join Managing Director, Mike Purvis and Director, Dirk Verwohlt for a discussion of the report findings.
Internal auditors play a vital role in their organisation’s strategies and daily activities. Your department’s audit plan should be a well-balanced examination that covers regulatory requirements and aligns key risk areas within the organisation.
Join Protiviti's Mark Harrison & Adam Christou, as they help internal audit professionals identify hot topics & emerging trends in 2014 to better execute the department’s strategic focus on risk throughout the year.
Neville Thomas, Head of Internal Audit Group at AMP, Chris Grant, & Ewen Ferguson, Protiviti
IT audit is a dynamic area with high personnel turnover, rapidly changing environments and shifting risk profiles. Protiviti's third-annual IT Audit Benchmarking Survey Report analyses the underlying IT audit trends facing our profession today.
Attend this webinar discussing key findings such as:
• Data security is of paramount concern
• Significant gaps in IT auditing
• Lack of IT audit risk assessments
• Strengthening IT governance practices
Protiviti's Tim Long, Scott Jones, John Atkinson, Steven Stachowicz, Nicole Weber
With nearly 40 percent of the Dodd-Frank Act yet to be implemented, numerous new consumer protection requirements taking effect this year, and the continued strong focus on anti-money laundering and sanctions compliance, regulatory compliance will remain a major challenge for the financial services industry in 2014.
Join Protiviti's Tim Long, Scott Jones, John Atkinson, Steven Stachowicz and Nicole Weber on Wednesday January 29, as they help compliance, risk and internal audit professionals identify some of the important regulatory issues and developments for 2014 that will need to be included in internal audit and compliance programs.
Topics will include:
• Consumer Financial Lending and Deposits Products
• Anti-Money Laundering and Sanctions
• Broker-Dealers and Investment Advisers
• The impact of the Current Environment on Compliance and Internal Audit organizations
CPE credits will be provided to qualifying attendees.
We look forward to having you join us. If you have any questions, contact Esther Veenhuizen at 212.708.6350 or email@example.com.
Brian Christensen, David Brand and Keith Keller, Protiviti
Internal auditors play a vital role in their organization’s strategies and daily activities. Your department’s audit plan should be a well-balanced examination that covers regulatory requirements and aligns key risk areas within the organization. However, in today’s fast changing environment, plans change and the needs of the organization may evolve rapidly. Has your support of the organization kept pace with those changes? Should you make changes to your audit plan to ensure coverage of new risks? Also, do you know what new elements should be included in your 2014 plan?
The objective of this presentation is to help internal audit professionals identify emerging trends in need of attention so that auditors can better execute the department’s strategic focus on risk.
Scott Moritz, Managing Director, Protiviti and Pam Verick, Director, Protiviti
Internal Auditors are often the first line of defense in a company’s fight against fraud and corruption. Indeed, Internal Auditors are often called upon to “pivot” when a routine internal audit unearths red flags that may be indicators of fraud, corruption or misconduct.
This presentation is intended to provide internal auditors with:
•Knowledge of investigative techniques
•The ability to recognize fraud or corruption indicators
•Tools to respond to red flags
Ann Butera, President of the Whole Person Project, Inc. and Ashley Hartley, Director at Protiviti
As a manager, you are likely adept at handling crises on the job. But how do you handle people in crisis? Whether positive or negative, any life-altering event can affect how your employees work, and as the boss, you may be the last person to know. What can you do to diagnose changes in employee performance before it’s too late?
Join Ann Butera, President of the Whole Person Project, Inc. and Protiviti in this webinar to discuss how to mitigate the effects of your employees‘ personal lives on their work lives. We will discuss how the inherent boss/employee relationship can lend itself to misunderstanding, how to recognize the symptoms and warning signs of employees’ crises, and how you can adjust your management style to deal with this.
The World has forever changed. eCommerce is no longer a nice to have…it is a necessity. We live in a very noisy world where technology has changed the way we buy. Time, context and attention are the new currency.
Join us for this webinar where Aaron Greenman, Protiviti Director, will explore how technology has had a significant impact on mobile commerce, the security implications involved and measures to consider.
Adam Brand, Associate Director, Protiviti; Magen Hughes, Consultant, Protiviti
Infosec is known for constantly telling IT to "patch your stuff" to prevent getting compromised. Scan reports with a bunch of red are kicked over the wall, and scary reports showing thousands of vulnerabilities are an all-to-frequent result of a vulnerability assessment. But these scan reports are often lying about the true severity of the vulnerabilities, which creates more work for everyone and leaves Infosec crying wolf more often than it should. In this talk, we take a closer look at the problem with vulnerability ratings and how to have IT fail less by having to patch less, while simultaneously being more secure.
Protiviti is a global business consulting and internal audit firm composed of experts specializing in risk, advisory and transaction services. Our firm includes leading experts in areas of finance and accounting, risk and compliance, technology effectiveness, litigation, investigations and financial restructuring. Our professionals have powerful insights on par with the largest consulting organizations in the world; however, we are more nimble and adept than these competitors in delivering value for our clients.
Protiviti is the leading company dedicated exclusively to risk consulting and internal audit. We help our clients seize new opportunities for growth and profitability while protecting them from their risks. We work with more than 25 percent of the FORTUNE 500®. Our 2,500 professionals in 60 offices worldwide bring powerful insights and proven delivery with a customized blend of competencies to every project.
Sony, Target and now Yahoo! -- you can't let this to happen to you or your business. Help your organization avoid being front page news due to a security breach.
Every organization large and small wants to avoid this all too common reality. From the unintentional sharing of data by employees through a rogue email, to losing data via a lost computer, to surviving hacker attacks, there's a lot to manage.
Join this webcast to learn the top 5 ways to protect your organization and make sure your company isn't the next one hacked.
This webcast is part of our Digital Security in the Modern World webcast series. Sign up for this session, or the entire series today!
This month’s webinar will focus on the mobile ransomware landscape including the evolution of the threat, where we’re seeing attacks occur, and how to protect your devices from this threat. We will also cover the threat statistics we gather from our Trend Micro™ Smart Protection Network™ and the top mobile ransomware threats observed.
The call from the auditor, like your dental cleaning and tax day, comes with dizzying regularity. For more than a decade, companies have been avoiding, eschewing or explicitly fibbing about their cloud use to step around the murky area of cloud compliance.
Why? Because the rules are ambiguous. Because the paperwork is unreal. Because cloud vendors are cagey. Because it was just easier.
And business continues to use the cloud, because it’s critical to growth, IT operations, agility and disaster protection. But you no longer have to pull a fast one on your audit team. Join iland's Director of Compliance to learn:
- What to look for in cloud reporting – in particular for HIPAA, SOC2 and ISO27001
- How your cloud vendor can support you
- What questions auditors typically ask
- How all this impacts your disaster recovery plans as well as your public cloud use
The Internet of Things (IoT) is already a huge deal and it's only going to get bigger
There are far more devices connected to the internet than there are people in the world and that number is projected to grow dramatically in the coming years. Whether you're an individual hobbyist or an enterprise developer, there's a great chance you'll find need for a cloud-based service to listen to the devices in your IoT solution, facilitate communication, and even communicate back to the devices telling them how to behave.
That's why there's Azure IoT. Azure IoT includes the dedicated IoT Hub service, IoT solution templates called IoT Suite, as well as many other general services for processing IoT data and turning them into real business insight. With a little time and learning, you’ll have a service designed to handle massive amounts of communication with devices, but also able to scale down to startup and even hobbyist scenarios.
Join this webcast to learn how to:
•Conceptualize why you might need a cloud-based hub solution
•Easily set up an IoT Hub in Azure
•Create simulated devices and communicate to your hub
In the 25 years since the first PC viruses appeared, how has the threat landscape changed?
- What are the most vulnerable areas that cybercriminals look to exploit?
Join us for our webinar to get the latest information you need to know about how cyberthreats are evolving. We'll cover the areas of cybercrime that are growing the fastest and how businesses can stay ahead of the threats that most affect their businesses.
90% - Organizations who have experienced some form of external threat in the past 12 months.
We'll cover everything from the rise of ransomware to the greatest mobile security threats, as well as taking your questions on the topics you are most concerned about.
With so many different cyber risk metrics being used, how can cyber insurance underwriters and risk managers know how likely a company is to experience a data breach?
Join Ira Scharf, GM of Worldwide Insurance at BitSight, and Dave Bradford President, Research and Editorial at Advisen as they discuss new correlations between BitSight Security Ratings and data breaches.
Attendees will learn:
- Why security ratings are a clear indicator of cyber risk
- How likely companies with BitSight ratings of 400 or below are to experience a data breach
- How underwriters, policyholders, and applicants can use BitSight Security Ratings to lower their cyber risk
The use of deception technologies to level the playing field against attackers sounds like a pretty compelling proposition for security teams. So why has adoption been limited to only the largest enterprises? What can security teams expect when deploying deception? What are the risks and what can be done to address them?
This presentation will provide attendees with an understanding of the challenges facing deception solutions to date, approaches for mitigating those challenges, and an introduction to vArmour’s deception solution: vArmour DSS Deception.
Is that activity you’re seeing a malicious user? Is it someone who made a mistake? Is it coming from an account whose credentials were compromised? Is it command and control traffic? How confident are you? As security programs are maturing, attention is turning to threats emanating from inside the network. Doug Copley will discuss seven profiles of highly risky users, outline how your organization can reduce insider risk, and present a real-world case study of how a software organization protected themselves.
Everybody is joining the microservices bandwagon and only some enterprises truly see the benefits of adopting microservices. The real challenge is not only cultural adoption but also a question of choosing the right technical tools to enable and secure your microservices.
In this webinar we'll provide practical guidance on building and deploying a microservice architecture for speed, scale and safety.
Join this webinar to learn:
- Key considerations of enabling microservices within your enterprise
- How DevOps fits in the microservices lifecycle and how to align team culture
- How to use an API gateway for securing and governing your microservice architecture
Every one of our PPM customers is pursuing the same end goal – how to deliver the highest value to the organization. Working with hundreds of customers, we have learned that the answer requires a comprehensive approach across multiple disciplines. To drive bigger results and achieve greater PPM maturity, organizations need to improve PPM leadership, governance, change management, product management, development, support and other disciplines.
Please join us for this presentation that discusses how to achieve PPM excellence by building competencies across disciplines in-house with the option of augmenting that approach with Application Managed Services for CA PPM.