Timely webcasts and updates for lawyers and other professionals
Timely webcasts, analysis, updates and presentations about securities litigation, SEC enforcement and white collar issues. This channel allows listeners to learn about cutting-edge issues from the leading attorneys, consultants, and other professionals in the securities litigation industry.
Although data breaches are inevitable, companies should still take important and thoughtful preemptive measures to meet their compliance obligations and to help prepare themselves to respond.
This webcast focuses on preemptive steps that GCs, CFOs and CCOs should implement today to not only insure adequate preparation for the latest forms of data breaches, but also to assure adequate compliance amid increasing regulatory scrutiny.
In this annual webcast, our panel will analyze key developments in SEC enforcement and notable events from 2015, and will discuss what to look for in 2016. Among other items, the panel will address:
•Results of litigation and current issues arising from SEC administrative proceedings;
•Actions involving financial fraud, gatekeepers, market structure, and investment management;
•The impact of the Whistleblower Program, use of technology, and requiring admissions in settlements;
•Significant “first ever” cases in a broad range of areas; and much more
A data breach responder is like a high-tech plumber. Just like a plumber does when a house’s basement floods, data breach responders identify the cause of a breach; combine forces to contain its damage; and collaborate on remediation.
But while a plumber can provide reasonable assurances that the basement will not flood again, a data breach responder cannot promise the same about a future data breach. In fact, another breach is not only possible, it’s likely. That is why data breaches don’t define victim companies – how they respond to data breaches does.
Yet while today’s news outlets provide an endless stream of data breach reports, rarely is an actual incident response ever discussed. Understanding data breach response workflow not only helps a company prepare for a breach, it also helps a company manage cybersecurity risk overall. This webcast covers the most typical workflows that companies must undertake amid the incident response of a data breach.
The word is out—the SEC has made good on its promise to pay millions of dollars in awards to those who come forward with evidence of securities law violations and employees are taking notice. For the fourth consecutive year, 2015 saw the number of tips flowing into the SEC Office of the Whistleblower reach a record high, including a new high for complaints of FCPA violations. Indeed, SEC FCPA Unit Chief Kara Brockmeyer recently described Dodd-Frank’s whistleblower incentive provisions as a “game-changer” for FCPA enforcement. Meanwhile, the SEC’s Division of Enforcement brought an unprecedented enforcement action to discourage what it views as overly restrictive employee confidentiality agreements. And federal courts across the nation continue to reach disparate conclusions concerning the scope of Dodd-Frank’s whistleblower retaliation provisions. These trends, coupled with dynamic developments in FCPA enforcement, provide the perfect storm for keeping in-house counsel and compliance professionals up at night.
Featuring an experienced panel of plaintiff- and defense-side whistleblower and anti-corruption practitioners, including counsel to the whistleblower who received the largest award in Dodd-Frank’s history, this webcast will detail Dodd-Frank’s statutory and regulatory framework, discuss its early and recent interpretations by the SEC Office of the Whistleblower and federal courts, analyze the statute’s intersection with the FCPA, and provide the participant with practical tips for navigating the minefield of whistleblower complaints.
In this webcast, panelists from the economic consulting firm Nathan Associates will evaluate the market trends in securities class actions by analyzing aggregate investor losses stemming from alleged violations of the federal securities laws on all Rule 10b-5 cases that have been filed since the Halliburton decision. As part of this webcast, Nathan Associates will report regression-based monthly market capitalization losses, monthly aggregate Rule 10b-5 losses, average artificial stock price inflation for all public companies facing impeding litigation, and the RMC ratio (Rule 10b-5 Market Capitalization Loss Percentage).
Please join panelists Professor Stephen E. Christophe, Ph.D., a recognized authority on securities, and Nessim Mezrahi, principal, financial litigation, at Nathan. They will be prepared to comment on the trends and potential losses on all Rule 10b-5 cases that have been filed since the Halliburton ruling last summer.
This webcast will cover fundamental concepts of accounting, focusing on issues that lawyers often encounter. Our panel of accounting experts will cover the three financial statements–balance sheet, income statement, and cash flows–and describe the components that are used to create them. In addition, our panel will cover how to derive meaningful conclusions from the data through ratio and trend analysis.
In addition to understanding financial statements, this webcast will cover common Generally Accepted Accounting Principles and International Financial Reporting Standards.
On the eve of the fifth anniversary of the Bribery Act, our panelists will take a look back at the Bribery Act’s pre-school years and what the future looks like.
A lot of water has passed under the bridge since the Bribery Act was passed in the last days of the last Labour government in the UK. Two general elections later and another change of government, the political and legal landscape looks a lot different:
This webinar will cover:
--Deferred Prosecution Agreements: now or never?
--The Bribery Act: How long until a corporate prosecution?
--Failure to prevent fraud offence: Will this new law be passed?
--Penalties: Jail time and fines
The risk for public companies and senior management becoming the subject of a financial fraud investigation by the Securities and Exchange Commission has never been greater. Mary Jo White, the SEC’s Chair, and the SEC’s Director of Enforcement, Andrew Ceresney, have publicly stated that financial fraud cases are a programmatic priority for the Commission. Indeed, the Commission has formed a Fraud and Audit Task Force to proactively identify potential schemes. Moreover, the Commission officials have routinely touted the Commission’s data analytic capabilities for detecting anomalies and red flags and have encouraged collaboration internally within the Commission and with other regulators.
This webcast will provide insights to all those in the financial reporting process including attorneys, accountants and other professionals preparing or auditing financial statements, investigating allegations of accounting misstatements or defending targets of investigations and lawsuits. Senior management, audit committee members and independent auditors are especially at risk given that the Commission has signaled a desire to bring enforcement action against gatekeepers. Consequently, it is important to understand what the Commission will be examining and how to respond when the Enforcement Division comes knocking.
The webcast will focus on the sources of the government’s investigations, hot accounting topics, process for investigating financial fraud allegations and the government’s expectations for responding to allegations of financial fraud. You will get insights on how to manage expectations of the board of directors and independent auditors as well as strategies for defending companies and individuals. Additionally, this webcast will cover cross border considerations, lessons from recent enforcement cases, and related class action lawsuits.
While the market for cyber insurance continues to grow dramatically, there still is no standardized form of cyber insurance policy language, and the actuarial challenges of measuring and gauging the impact of a cyber-attack make it difficult to match a cyber insurance policy with the unique risk profiles of today’s public and private companies.
This webcast presents detailed, practical means of managing this challenge by analyzing and scrutinizing the typical cyber-incident response workflow that follows most cyber-attacks. The webcast will examine -- before any cyber-attack occurs -- which workflow costs will trigger coverage, which workflow costs will be outside of coverage, and which workflow costs might be uninsurable.