Oracle, Yelp, and Protiviti will discuss a roadmap to complete a successful IPO or M&A transaction, including key strategic considerations from processes to people and technology. You will have an opportunity to hear from an IPO perspective from Yelp’s CFO, Rob Krolik and corporate buyer side from Oracle’s SVP of Finance, Eric Ball.
RecordedAug 15 201366 mins
Your place is confirmed, we'll send you email reminders
You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?
Please submit top-of-mind questions during the webinar registration process.
CPE credits will be provided to qualifying attendees.
Protiviti has conducted the second-annual Executive Perspectives on Top Risks Survey. We obtained the views of more than 370 board members and C-suite executives about risks that are likely to affect their organisation in 2014.
Join Managing Director, Mike Purvis and Director, Dirk Verwohlt for a discussion of the report findings.
Internal auditors play a vital role in their organisation’s strategies and daily activities. Your department’s audit plan should be a well-balanced examination that covers regulatory requirements and aligns key risk areas within the organisation.
Join Protiviti's Mark Harrison & Adam Christou, as they help internal audit professionals identify hot topics & emerging trends in 2014 to better execute the department’s strategic focus on risk throughout the year.
Neville Thomas, Head of Internal Audit Group at AMP, Chris Grant, & Ewen Ferguson, Protiviti
IT audit is a dynamic area with high personnel turnover, rapidly changing environments and shifting risk profiles. Protiviti's third-annual IT Audit Benchmarking Survey Report analyses the underlying IT audit trends facing our profession today.
Attend this webinar discussing key findings such as:
• Data security is of paramount concern
• Significant gaps in IT auditing
• Lack of IT audit risk assessments
• Strengthening IT governance practices
Protiviti's Tim Long, Scott Jones, John Atkinson, Steven Stachowicz, Nicole Weber
With nearly 40 percent of the Dodd-Frank Act yet to be implemented, numerous new consumer protection requirements taking effect this year, and the continued strong focus on anti-money laundering and sanctions compliance, regulatory compliance will remain a major challenge for the financial services industry in 2014.
Join Protiviti's Tim Long, Scott Jones, John Atkinson, Steven Stachowicz and Nicole Weber on Wednesday January 29, as they help compliance, risk and internal audit professionals identify some of the important regulatory issues and developments for 2014 that will need to be included in internal audit and compliance programs.
Topics will include:
• Consumer Financial Lending and Deposits Products
• Anti-Money Laundering and Sanctions
• Broker-Dealers and Investment Advisers
• The impact of the Current Environment on Compliance and Internal Audit organizations
CPE credits will be provided to qualifying attendees.
We look forward to having you join us. If you have any questions, contact Esther Veenhuizen at 212.708.6350 or firstname.lastname@example.org.
Brian Christensen, David Brand and Keith Keller, Protiviti
Internal auditors play a vital role in their organization’s strategies and daily activities. Your department’s audit plan should be a well-balanced examination that covers regulatory requirements and aligns key risk areas within the organization. However, in today’s fast changing environment, plans change and the needs of the organization may evolve rapidly. Has your support of the organization kept pace with those changes? Should you make changes to your audit plan to ensure coverage of new risks? Also, do you know what new elements should be included in your 2014 plan?
The objective of this presentation is to help internal audit professionals identify emerging trends in need of attention so that auditors can better execute the department’s strategic focus on risk.
Scott Moritz, Managing Director, Protiviti and Pam Verick, Director, Protiviti
Internal Auditors are often the first line of defense in a company’s fight against fraud and corruption. Indeed, Internal Auditors are often called upon to “pivot” when a routine internal audit unearths red flags that may be indicators of fraud, corruption or misconduct.
This presentation is intended to provide internal auditors with:
•Knowledge of investigative techniques
•The ability to recognize fraud or corruption indicators
•Tools to respond to red flags
Ann Butera, President of the Whole Person Project, Inc. and Ashley Hartley, Director at Protiviti
As a manager, you are likely adept at handling crises on the job. But how do you handle people in crisis? Whether positive or negative, any life-altering event can affect how your employees work, and as the boss, you may be the last person to know. What can you do to diagnose changes in employee performance before it’s too late?
Join Ann Butera, President of the Whole Person Project, Inc. and Protiviti in this webinar to discuss how to mitigate the effects of your employees‘ personal lives on their work lives. We will discuss how the inherent boss/employee relationship can lend itself to misunderstanding, how to recognize the symptoms and warning signs of employees’ crises, and how you can adjust your management style to deal with this.
The World has forever changed. eCommerce is no longer a nice to have…it is a necessity. We live in a very noisy world where technology has changed the way we buy. Time, context and attention are the new currency.
Join us for this webinar where Aaron Greenman, Protiviti Director, will explore how technology has had a significant impact on mobile commerce, the security implications involved and measures to consider.
Adam Brand, Associate Director, Protiviti; Magen Hughes, Consultant, Protiviti
Infosec is known for constantly telling IT to "patch your stuff" to prevent getting compromised. Scan reports with a bunch of red are kicked over the wall, and scary reports showing thousands of vulnerabilities are an all-to-frequent result of a vulnerability assessment. But these scan reports are often lying about the true severity of the vulnerabilities, which creates more work for everyone and leaves Infosec crying wolf more often than it should. In this talk, we take a closer look at the problem with vulnerability ratings and how to have IT fail less by having to patch less, while simultaneously being more secure.
Protiviti is a global business consulting and internal audit firm composed of experts specializing in risk, advisory and transaction services. Our firm includes leading experts in areas of finance and accounting, risk and compliance, technology effectiveness, litigation, investigations and financial restructuring. Our professionals have powerful insights on par with the largest consulting organizations in the world; however, we are more nimble and adept than these competitors in delivering value for our clients.
Protiviti is the leading company dedicated exclusively to risk consulting and internal audit. We help our clients seize new opportunities for growth and profitability while protecting them from their risks. We work with more than 25 percent of the FORTUNE 500®. Our 2,500 professionals in 60 offices worldwide bring powerful insights and proven delivery with a customized blend of competencies to every project.
The continuously evolving cyber threat landscape and increased regulation with the new European data laws, have led many organisations to re-think their enterprise risk management strategy and review security investment. As companies seek more dynamic ‘virtualised’ environments and service delivery efficiencies from Cloud, the increased complexity in security can outweigh the benefits. While recent attacks on Hilton, JP Morgan Chase, Target, Anthem, Home Depot, Sony and others have each been different, they all have one characteristic in common that once inside the data center perimeter, the attacks were able to expand laterally and to the target source of data. Join (ISC)² EMEA and VMware as we discuss security procedures and best practice that organisations need to adopt to comply with the GDPR plus how to mimimise risk while optimizing their CapEx and Opex.
Complex Cyber attacks affect hundreds or even thousands of companies. Predicting a cyber attack requires sophisticated analytics similar to those that predict hurricane and typhoon damage!
In the face of such uncertainty, it’s hard to know where to begin.
You need help to protect your Critical Infrastructure to keep your business going. Not just with physical on-site networks, but also cloud and mobile storage. How do you plan against attacks from multiple sources when you are using a disjointed set of security solutions from many vendors? However wide the problem, we can help you keep the threats out.
This webinar looks at preparing your business for the threats of tomorrow. When time and information are critical, you need an intelligent solution that is ahead of the curve. With our data security insights, you’ll be well armed when the next attack comes.
Over the next three months, we’ll be holding a series of 4 webinars tackling threat and information protection.
1) €20 million reasons to embrace the new EU GDPR (21st April 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195977
2) The Cloud: Eliminate risks, Gain Control; release benefits (11th May 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195987
3) How are you managing the security skills shortage? (2nd June 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195991
4) Clouds, hurricanes and cyber-attacks… (29th June 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195993
Outsourcing is a critical strategy for supporting user productivity and business growth. Remote third-party access to an organization’s internal systems is an inherent requirement for outsourced services, maintenance, and support.
Many companies overlook this remote vendor access as an area that requires tight security controls. But the fact is, 63% of attacks are caused by security vulnerabilities introduced by a third party.
Join CyberArk and (ISC)2 on Jun 29, 2016 at 2:00p.m. (Singapore Time) for a Security Briefing that you will learn more about this hidden security weak spot – and discover 5 ways to mitigate risk of attack through remote third-party access.
Financial firms of all shapes and sizes are facing advanced threats on a daily basis – rarely a day goes by without seeing another headline about a cyberattack or data breach. Cybercriminals are going after the most sensitive data knowing how and where to find it.
With compliance standards and audit regulations becoming more stringent, and the rising prevalence of cyber threats, the need to protect vulnerable critical information has never been more important. During this webinar, CounterTack and Proficio will discuss the growing need for financial institutions to have next-generation endpoint security solutions combined with 24x7 security monitoring and alerting.
During this session you learn:
• Why endpoints have become the focus for attackers
• What you can do to secure endpoints in today’s threat landscape
• Best practices for meeting security regulation and compliance standards
• The role of security monitoring and alerting in keeping critical assets safe
Your identity and governance practices are well established, but they might not be as comprehensive as they need to be. Going beyond the basics is critical to greatly reduce security risk and improve efficiencies.
Join CA Technologies security expert, John Hawley, to examine how to broaden the scope of governance to include privileged users, contractors, and business partners, as well as controlling access to physical assets. You’ll also learn the important role of identity performance analytics in a governance deployment.
Excited about the new Windows 10 features? We are, too! Join this session to learn about how Microsoft Intune and System Center Configuration Manager are going to support and enhance new features in Windows 10 that unlock new scenarios and management options which weren't previously possible. Plus, explore improvements for deployment and upgrade in System Center Configuration Manager, Microsoft Intune, and Windows 10. Learn how Microsoft is gearing up to make the deployment and upgrade of Windows 10 using Configuration Manager or Intune the easiest yet.
Discover the Anatomy of Multivendor Security Orchestration
Multivendor integration can improve operational efficiencies, accelerate threat response, boost security ROI and greatly improve a company’s network security and compliance posture. In this webinar, Ms. Geisler breaks down the anatomy of security orchestration. In addition, you’ll learn how ForeScout is extending the visibility and control capabilities of ForeScout CounterACT® to its partners’ security management products, as well as:
- The role ForeScout ControlFabric® Architecture and ForeScout Extended Modules play in achieving rapid security orchestration
- Real-world security orchestration use cases
- Specific examples of how ForeScout helps leading security management vendors share information and automate security workflows and response
Jennifer Geisler , Vice President of Marketing, ForeScout Technologies
With 20 years of industry experience, Jennifer drives ForeScout’s corporate branding, content marketing and sales enablement initiatives. Prior to joining ForeScout, Jennifer held senior marketing positions at Packeteer (acquired by Blue Coat Systems), Cisco and Intel Security. Jennifer holds a bachelor’s degree in business from Wright State University.
Our Mandiant consultants have responded to and investigated many of 2015's biggest security incidents. The insights gained from these consultancies provide us with a unique vantage point when it comes to understanding the ever-evolving cyber threat landscape.
This webinar will discuss key trends, statistics, and case studies to illustrate the evolution of the advanced threat actors over the last year in EMEA.
Register for the webinar and join Mandiant's VP for Security Consulting Services, Bill Hau as he delivers the top findings from this report and explains how to prepare and respond to a breach when it occurs.
The panel will be discussing:
- Brexit's impact on the technology industry
- What IT and information security can do to prepare for Brexit
- Who else we should work with in our organisation to prepare
- Any legal angles (e.g. storing data in the cloud in Ireland) we need to investigate
- Legal obligations, such as GDPR, we may still have to prepare to meet.
Moderator: Adrian Davis, Managing Director (ISC)² EMEA
David Evans, Membership Director at BCS
Lars Davies, Founder & CEO at Kalypton Group Limited
Louisa-Jayne O'Neill, Vice Chairman, Information Assurance Advisory Council (IAAC)
Open Banking is set to disrupt the financial services value chain. Across the world, this disruption can already be seen with a number of innovative initiatives emerging and with pressure from regulation, such as PSD2 in Europe, beginning to impact institutes.
With the foundations starting to build, what are the common approaches to Open Banking and how can you avoid the pitfalls?
Hear from MuleSoft Banking API specialist Danny Healy and industry veteran Paul Rohan, author of "PSD2 in Plain English", for a unique business and technical insight from the leaders in API-led connectivity.
Will you simply survive? Or change to thrive, in an Open Banking world?