Hi [[ session.user.profile.firstName ]]
Sort by:
    • DOL's New Conflict of Interest Regs: Game Changer for Retirement Advisers DOL's New Conflict of Interest Regs: Game Changer for Retirement Advisers Brad Bondi, Michael Wheatley Recorded: Jul 14 2016 5:00 pm UTC 54 mins
    • In April 2016, the Department of Labor issued final regulations expanding the definition of “fiduciary” for advisers to retirement plans, including advisers to IRAs and ERISA plans. Some advisers and financial institutions who previously were not considered fiduciaries now will be required to meet a fiduciary standard of care and, unless an exemption applies, may not engage in so-called “prohibited transactions” that create potential conflicts of interest (e.g., receiving compensation from third parties in connection with a transaction involving an IRA or an ERISA plan).

      The DOL also created a key exemption known as the Best Interest Contract Exemption (“BIC Exemption”). In general, the BIC Exemption allows advisers to engage in otherwise “prohibited transactions” as long as certain criteria are met. The new regulations will be phased in over time. The new definition of “fiduciary” will apply on April 10, 2017. The entire regulatory package will apply on January 1, 2018.

      In this Webcast, Brad Bondi (a partner at Cahill Gordon & Reindel LLP who leads the securities enforcement and regulatory practices) and Michael Wheatley (an associate at Cahill) will address issues concerning the new regulations, its impact on the financial services industry, best practices for financial services firms and lawyers to prepare for this new regulatory scheme, and pitfalls to avoid.

      Read more >
    • In-depth Analysis Behind the Syrian Conflict's Digital Front Lines In-depth Analysis Behind the Syrian Conflict's Digital Front Lines Nart Villeneuve (FireEye), Daniel Regalado (FireEye), John Scott-Railton (The Citizen Lab) Recorded: Feb 25 2015 4:00 am UTC 60 mins
    • FireEye recently released a new report “Behind the Syrian Conflict’s Digital Frontlines” that documents a well-executed hacking operation that successfully breached the Syrian opposition.

      Between at least November 2013 and January 2014, the hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions. This data belonged to the men fighting against Syrian President Bashar al-Assad’s forces as well as media activists, humanitarian aid workers, and others within the opposition located in Syria, the region and beyond.

      We have only limited indications about the origins of this threat activity. Our research revealed multiple references to Lebanon both in the course of examining the malware and in the avatar’s social media use. While we do not know who conducted this hacking operation, if this data was acquired by Assad’s forces or their allies it could confer a distinct battlefield advantage.

      Join us for a roundtable discussion with subject matter experts where we’ll talk about the details of the report and explore surrounding topics, to include:

      • An overview of the conflict in Syria and why cyber-espionage is an increasingly important factor
      • An in-depth analysis of a critical breach of the Syrian opposition including an overview of the tools and techniques used by the threat actors

      Find out more and learn from this Syrian report how you can defend yourself against these cyber attackers

      Read more >
    • Behind the Syrian Conflict's Digital Front Lines Behind the Syrian Conflict's Digital Front Lines Nart Villeneuve (FireEye), Daniel Regalado (FireEye), John Scott-Railton (The Citizen Lab) Recorded: Feb 19 2015 4:00 pm UTC 59 mins
    • FireEye recently released a new report “Behind the Syrian Conflict’s Digital Frontlines” that documents a well-executed hacking operation that successfully breached the Syrian opposition.

      Between at least November 2013 and January 2014, the hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions. This data belonged to the men fighting against Syrian President Bashar al-Assad’s forces as well as media activists, humanitarian aid workers, and others within the opposition located in Syria, the region and beyond.

      We have only limited indications about the origins of this threat activity. Our research revealed multiple references to Lebanon both in the course of examining the malware and in the avatar’s social media use. While we do not know who conducted this hacking operation, if this data was acquired by Assad’s forces or their allies it could confer a distinct battlefield advantage.

      Join us for a roundtable discussion with subject matter experts where we’ll talk about the details of the report and explore surrounding topics, to include:

      • An overview of the conflict in Syria and why cyber-espionage is an increasingly important factor
      • An in-depth analysis of a critical breach of the Syrian opposition including an overview of the tools and techniques used by the threat actors

      All webinar attendees will receive a free copy of the new Syrian report. Register today!

      Read more >
    • Be better at managing conflict under stress Be better at managing conflict under stress Dr. Ralph H. Kilmann Recorded: Jun 5 2013 2:30 pm UTC 60 mins
    • The co-author of the TKI assessment will provide a deep understanding of how the increasing levels of stress experienced in the workplace can not only prevent people from using the best conflict mode in a given situation (competing, collaborating, compromising, avoiding, or accommodating), but can also push people to react blindly to conflicts with fight, flight, or freeze.

      Join Dr Ralph Kilmann on 5 June to find out how you can help people maintain moderate stress (neither high nor low), enabling them to manage their conflicts mindfully and thus successfully.

      Read more >
    • Combining the TKI and MBTI® Assessment Tools Combining the TKI and MBTI® Assessment Tools Dr. Ralph Kilmann Recorded: Sep 19 2012 2:30 pm UTC 61 mins
    • For four decades, Dr. Ralph Kilmann has been using the MBTI and TKI tools to help organizations identify and then resolve their most troublesome problems.

      His approach starts by bringing recurring and unresolved differences between people out into the open, using four MBTI type groups (based on the functional pairs ST, NT, SF and NF). Once these differences have been identified, the TKI’s five conflict modes are used to develop an effective resolution for all concerned.

      In this one-hour webinar, Dr. Kilmann will describe how the combined TKI and MBTI assessments offer a powerful toolkit for solving complex problems and conflicts.

      Read more >
    • Inherent Conflicts - U.S. Investigations & E.U. Data Privacy Laws Inherent Conflicts - U.S. Investigations & E.U. Data Privacy Laws FTI Consulting and Main Justice Recorded: May 5 2011 5:00 pm UTC 61 mins
    • From whistle blower allegations, government inquiries and subpoenas, to corporate due diligence, Foreign Corrupt Practices Act (“FCPA”) violations, and financial fraud – corporate counsel must collect and produce greater amounts of data from around the globe. Besides basic logistical issues, various tiers of data privacy restrictions complicate the process, requiring an in-depth knowledge of data storage technology and practices, multinational data transfer regulations, and general e-discovery best practices. For example, if data is required in response to a regulatory request in the United States, yet the custodians are based in France and Germany, how can the data be collected and reviewed in a defensible manner in compliance with EU as well as French and German data privacy laws? This program will outline the key considerations and best practices for collecting and assessing data in a defensible and secure manner.

      Read more >
    • From RAM to Reality From RAM to Reality Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks Recorded: Mar 8 2016 2:00 pm UTC 56 mins
    • Observations of Geopolitical Conflicts Transitioning to Cyberattacks

      Geopolitical conflicts are more publicly transitioning into the cyber realm. With current conflicts, a cyber-component is almost always included – and the outcome can be observed in the physical world. What is the impact of these events? Can it expose trade secrets? Shut down financial markets? Or worse?

      During this interactive webinar, Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks, will cover known events, discuss the actors behind them and generally talk about the potential impacts from these threats.

      In addition you will:

      - Understand the relationship between specific geopolitical events and cyberattacks
      - Learn about the actors behind these cyberattacks and the impact to your businesses
      - Get insight into the latest attack trends
      - Receive recommendations on security solutions and threat intelligence to help protect your network

      Read more >
    • From RAM to Reality From RAM to Reality Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks Recorded: Mar 8 2016 7:00 pm UTC 55 mins
    • Observations of Geopolitical Conflicts Transitioning to Cyberattacks

      Geopolitical conflicts are more publicly transitioning into the cyber realm. With current conflicts, a cyber-component is almost always included – and the outcome can be observed in the physical world. What is the impact of these events? Can it expose trade secrets? Shut down financial markets? Or worse?

      During this interactive webinar, Tom Finney and Matthew Webster, Counter Threat UnitTM security researchers at Dell SecureWorks, will cover known events, discuss the actors behind them and generally talk about the potential impacts from these threats.

      In addition you will:

      - Understand the relationship between specific geopolitical events and cyberattacks
      - Learn about the actors behind these cyberattacks and the impact to your businesses
      - Get insight into the latest attack trends
      - Receive recommendations on security solutions and threat intelligence to help protect your network

      Read more >
    • Getting Comfortable with Difficult Conversations Getting Comfortable with Difficult Conversations Bev Holden & Kate Hargreaves from The Clear Thinking Partnership Recorded: Oct 8 2015 10:00 am UTC 63 mins
    • “Teams that trust one another are not afraid to engage in passionate dialogue around issues and decisions that are key to the organisations success”
      - Patrick Lencioni
      Conflict is inevitable in the workplace and our instinctive reaction is that it’s bad for business, but this is not always true. Differences of opinion, alternative perspectives and passionate exchanges, harnessed in the right way, are essential elements of organisational business success.
      Our inner dialogue can be relied on to tell us when we need to have a difficult conversation with someone—the kind of conversation that, if it took place, would improve life at work for ourselves or for people in our team. This sensible advice is often drowned out by our fear – fear of getting it wrong, making it worse or looking a fool, and we put that conversation off, allowing that individual to continue to miss deadlines, engage in interpersonal conflicts, produce poor work or exhibit toxic behaviour.

      In this one hour webinar……
      •you’ll learn how to engage in and encourage positive conflict within your team and understand the benefits that this can bring
      •you’ll explore a powerful structure to guide you through any difficult conversation with grace and confidence
      •you’ll discover some simple and practical approaches for harnessing positive conflict and having difficult conversations that will have immediate implications for you in your work and life
      •we’ll answer some of your burning questions about getting comfortable with difficult conversations

      Read more >