Hi {{ session.user.profile.firstName }}

The Volcker Rule - a webinar by Protiviti and Morrison & Foerster LLP

Manage webcast
Charles M. Horn and Dwight C. Smith (Partners, Morrison & Foerster LLP), David Johnson (Managing Director, Protiviti)
A Discussion of Implications of the Volcker Rule for Financial Institutions

The federal financial regulatory agencies have agreed to publish proposed rules that implement the proprietary trading and private fund sponsorship and investment prohibitions of the Dodd-Frank Act's Volcker Rule. Several of the participating agencies have already published the proposed rules for public comment.

In addition to applying the basic restrictions of the Volcker Rule to covered banking entities, the proposed rules would create a number of significant regulatory compliance, corporate governance and reporting obligations for affected financial institutions.

Topics include:
• Proprietary trading
o What is proprietary trading?
o Dealing, underwriting and market-making activities
o Trading in exempted financial instruments
o Impact on derivatives, securitizations and structured finance activities
o Permitted hedging and customer trading activities
• Exempted and prohibited private equity and hedge fund activities
• Impact on foreign bank trading and private equity/hedge fund activities
• Conflicts of interest and "high risk" activities
• Compliance, governance and reporting requirements
Dec 14 2011
80 mins
The Volcker Rule - a webinar by Protiviti and Morrison & Foerster LLP
More from this community:

IT Governance, Risk and Compliance

  • Date
  • Rating
  • Views
  • Knowing what IT assets you have and how to protect them is increasingly a challenge as globalization, virtualization and mobile assets create new endpoints and new opportunities for hackers to infiltrate. Now you can move beyond traditional scanner-based approaches to strengthen endpoint security with a free solution from Qualys.

    Discover how the Qualys AssetView gives you a fast, actionable view of all IT assets while helping to:

    > Gain comprehensive, scalable and always up-to-date view of endpoints — with continuously updated inventory of asset details, scaling to millions of assets

    > Deliver fast, accurate and actionable data — with a new layer of intelligence into the current state of endpoints, including details about services, file systems and registries as well as information to manage and secure systems

    > Minimize impact on systems and networks — by keeping itself lightweight and up-to-date to eliminate the need to reboot

    > Handle virtualized environments with ease — by keeping track of the constant proliferation of images inside and outside of the environment
  • Traditionally, most organizations have used email for sending files to colleagues or clients. However, as files increase in size and email attachment limits are an issue, employees are forced to either use old-fashioned FTP or circumvent company regulations by turning to insecure consumer-grade applications. 72% of the people we surveyed do! Let us tell you about a better way.

    Join us to learn 4 key best practices:
    1) Don’t mess with what users know – continue to use Microsoft Outlook to drive file transfers (just don’t leave it to Outlook to deliver them)
    2) Don’t leave it to users to decide when something is too big or too sensitive to send by email
    3) Do make the experience better and faster for users (as opposed to more complicated and slower)
    4) Have a policy (and protection) that covers email-based sharing even when mobile

    With Workshare, employees can email links to files, eliminating the need for attachments, while continuing to us the familiar Outlook to do it. Policy-enforcement means companies can secure, track, and expire file access and activity beyond the corporate firewall.

    Workshare also uses its customizable policy engine to ensure that the content that is shared is secured and removed of any sensitive information before it is shared.
    Intelligently scan and secure documents too large or too important to send by email. IT can set policies to determine when a file is too large to send, or critically when to block or clean a file if it contains sensitive hidden data that would expose the company to risk.
  • Our dependencies are clear. Organisations have become virtual, and all of this progress relies on systems and infrastructure that no one organisation maintains, and there is no turning back. Significant time and resources are being dedicated to coping with mistakes and oversights, while remediation time following system or data compromise is steadily getting longer.
    Industry has been cornered into a reactionary position addressing incidents as they occur.

    Such concerns are set to dominate discussions at the 2nd Annual (ISC)² Security Congress EMEA, October 20-21 in Munich, Germany.

    Join (ISC)², Infosecurity Magazine and two of the several top notch (ISC)² Security Congress EMEA speakers to examine our progress, how to challenge our reactionary position, and what is required to look forward to the future.

    Moderator: Michael Hine, Deputy Editor, Infosecurity Magazine
    Panellists: Adrian Davis, Managing Director, (ISC)² EMEA; Yiannis Pavlosoglou, Director of IT Risk, UBS; Georg Freundorfer, Director Security EMEA, Oracle

    WIN A FREE TICKET TO CONGRESS!
    (ISC)² is giving away 3 delegate passes for the 2015 (ISC)² Security Congress EMEA, to delegates who view the webinar for a minimum of 50 minutes. Winners will be announced live at the end of the webinar and subsequently emailed with information on how to redeem their prizes. The free pass is valid for all sessions including pre-conference workshops and networking opportunities. For further details on the prize draw and full T&C’s, please copy and paste the following link to your browser: http://bit.do/isc2emeacongressprize
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • Get the answers to four common questions about using data standards to grow your business.
  • Learn how to improve workflows and increase efficiency through use of data standards.
  • For oil and gas operators, the need to achieve operational excellence and stay competitive through quality information has never been greater. Meeting the demand for increased profitability, better well performance and regulatory reporting cannot be accomplished without clean, trusted data.
    Informatica Data Quality is a market proven, industry leading solution to address these challenges that oil and gas companies are facing today. For the well lifecycle, Informatica Data Quality offers out-of-the-box PPDM rules to cleanse and harmonize the well data to increase your confidence in well lifecycle information, so better decisions can be made toward achieving operational efficiency, and continued innovations.
    In this webinar, we will demonstrate how Informatica Data Quality can help oil and gas companies to:
    •Understand the patterns and identify the anomalies in your well data
    •Leverage out-of-the-box PPDM rules to cleanse and standardize the well data quickly and effectively
    •Proactively monitor the data quality process to address operational issues
  • Join cloud security expert Tricia Pattee on August 27 for a quick, cut-to-the-chase analysis on where to get the most bang for your security buck. The interactive, hour-long discussion will include:

    -The five most common security mistakes
    -Top six areas of security spend
    -How to maximize budget – and minimize risk
    -Hidden cloud security costs

    The presentation will include a Q & A to answer your specific questions about security budgeting and cost management.

    Register today.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Volcker Rule - a webinar by Protiviti and Morrison & Foerster LLP
  • Live at: Dec 14 2011 6:00 pm
  • Presented by: Charles M. Horn and Dwight C. Smith (Partners, Morrison & Foerster LLP), David Johnson (Managing Director, Protiviti)
  • From:
Your email has been sent.
or close
You must be logged in to email this