Upcoming CPE Webcasts
Many companies are accelerating their digital transformation strategies and adoption of cloud computing, decommissioning data centers, and legacy applications. CCOs need to understand the implications for regulatory compliance obligations.
Organizations are facing both increased regulation and increased volumes of organizational data, making it ever more challenging to ensure they can stay compliant as new regulations take effect.
Authenticity is the key to a company’s ESG program. Churning out press releases with catchphrases and impressions and assurances that a business is “talking the talk” or “walking the walk” is unacceptable.
About our Webcasts
Compliance Week's free Webcasts are typically held either Tuesdays or Thursdays at 2 p.m. ET. These Webcasts offer CPE credit to attendees and feature select partners discussing key GRC issues. Webcast attendees may be contacted by sponsors. For information, please e-mail Doug Juenemann or call (888) 519-9200.
Live Webcasts (listed below) last one hour and must be viewed in their entirety in order for attendees to earn CPE credit. For questions, please e-mail Katie Klokner.
Subscribers can also browse our archive of previous webcasts (listed below) for more CPE credit and learning opportunities.
CPE Webcast Library
In their recent 2021 survey, Compliance Week and OpenText reveal the growing challenges of managing investigations, driven by an increasingly complex litigation and regulatory landscape.
Traditional, manual accounting is not sustainable, and it can have negative downstream effects for compliance and audit teams. To modernize the way companies work, organizations must automate the manual, mundane processes that are holding them back.
As parts of the world economy open up and overall business spend is on track to go back to pre-COVID-19 levels, organizations are more vulnerable to fraud, corruption, and regulatory violations.
Join ProcessUnity and Deloitte’s leading third-party risk practitioners as they explore key findings from Deloitte’s 2021 Global TPRM Survey. You will hear what organizations are doing in the wake of last year’s pandemic to make advancements in their approach to third-party risk.
Ransomware continues to dominate headlines with no sign of slowing down. What started more than 30 years ago has become one of the most prevalent and lucrative cyberattacks that does not discriminate by company size, industry, or geography.
Technology is changing every aspect of life and automation is reducing the effort required for even the most complex of business processes.
In the post-GDPR era, data privacy has taken center stage yet again due to digital transformation across the globe. Governments everywhere are enforcing more robust data protection guidelines to address new digital interactions between enterprises and consumers.
With the sheer volume of communications happening on more platforms than ever, a modern approach to compliance and archiving has become critical.
Today’s breach landscape is unprecedented and complex. Every organization is facing potential enforcement of many interconnected and overlapping laws in multiple jurisdictions, each with restrictive timelines. In this complex environment, it is not enough to have a response plan. Your organization needs a response system.
For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with? Answering that question is not so straightforward.
ESG and its role in third-party risk management have gained prominence this past year as the awareness for environmental and social issues continue to grow.
Compliance is a necessity for every business, but the best long-term strategies for any company depend on factors like portfolio size, internal expertise, available budget, and risk tolerance.
As the volumes and types of electronic data generated by organizations continues to grow, it becomes increasingly complex to correctly identify, capture, store, protect and make searchable hundreds of terabytes (or petabytes) of disparate data.
A popular saying among security, privacy and corporate compliance circles is “trust, but verify”. It’s a popular saying because it neatly captures so much of what compliance professionals have to do: collecting evidence to verify compliance.
Your organization might be using HITRUST to manage multiple compliance initiatives, including HIPAA, NIST and the ISOs. The framework sets up a good set of practices that lend well to various privacy regulations and standards, yet connecting all that data for fast reporting is where most organization’s hit a wall.
When FASB and IASB first announced the lease accounting standards ASC 842 and IFRS 16, respectively, companies scrambled to pull together their lease data and implement procedures and tools to generate the required disclosures.
Updating corporate policies to correspond with an ever-changing, ever-growing list of regulations is putting pressure on already stretched corporate compliance functions. And the flood of new regulations will likely only increase going forward. Will you be able to keep up?
With a constant influx of new and changing regulatory requirements with increased scrutiny and enforcement, organizations can quickly fall behind and be drawn into a churn of reactive activities that distract from business objectives and use up valuable resources.
Compliance investigations are fraught with challenges from start to finish—from the pre-planning stage through the presentation of the final report detailing the factual findings.
Third-party risk management has always been a challenging area for risk and compliance professionals, never more so than today. As the global economy rebounds, third-party risk has taken on new dimensions.
How do you encourage your line of business to own risk today? Having a clear understanding of risk to evaluate probability and impact has been a common barrier to developing risk programs beyond traditional second-line professionals.
Are you keeping up with your organization’s evolving risk landscape, or are those risks keeping you up at night? Fraud and restatements are happening every day, and it’s important to recognize that your company is consistently exposed to risk.
Organizations are adopting digital transformation and, as a result, increasing their reliance on third parties faster than they can scale their third-party cyber-risk management programs.
Get the covid-adjusted data on how peers around the world have experienced report volume, anonymous reporting, and investigation performance throughout 2020.
Are you confident that your sexual harassment policy and training are compliant with the nuances of numerous state and local laws, many of which have changed recently?
Third-party risk management doesn’t end when you sign the contract to onboard a new vendor or service.
As customer expectations for transparency and ethical approach to business soar, companies that aren’t addressing the environmental, social and governance (ESG) impact of their organizations will get left behind. And that applies to who they work with too.
Regulators around the world continuously release guidelines to evaluate the effectiveness of corporate compliance programs. Recent SEC rules now require publicly traded companies to disclose human capital information such as workforce cost, human capital ROI and turnover rate, among others.
In today’s data drive world, legal and compliance professionals must know their organization’s data, meaning the legal department must clearly understand how to quickly find and access data requested for litigation, audits and investigations, and how to protect data in compliance with privacy laws.
Learn what compliance leaders at some of the world’s most complex organizations are doing to build resilient compliance programs. You’d be correct if you guessed they’re implementing new processes and adding new technologies. But the biggest surprise has been around the role people play in this process.
Compliance leaders are always on the lookout for innovative ways to keep up with the dynamic risk and regulatory landscape. The eﬀorts revolve around a common theme—integrating technological breakthroughs to achieve intelligent automation and ensure future-readiness of their compliance program.
Today’s financial services industry operates in an environment characterized by significant regulatory scrutiny. To be compliant, organizations must be aware and adhere to regulations, guidelines, and industry standards as it relates to their vendors, suppliers and third parties.
Artificial Intelligence is no longer a SciFi concept. With increasing adoption across corporations for workflow automation, AI elicits a lot of reactions ranging from trepidation to excitement, along with deep discussions on risks and bias.
Threat Intelligence is normally used to enrich the process of security assessment, providing proof on the enforcement of security controls required to be secure and compliant.
In the wake of COVID-19, compliance professionals need to be aware that the pandemic made instances of fraud more likely. This reflects the astonishing pressure put on governments and global financial systems and service providers to respond and adapt to the crisis.
Join an expert panel for an interactive discussion on what registered investment adviser firms can expect this year in terms of requirements targeted to the financial services industry under the Biden administration.
Today’s breach landscape is unprecedented and complex. Every organization is facing potential enforcement of many interconnected and overlapping laws in multiple jurisdictions.
There’s no question that F&A teams have been disrupted by the ongoing pandemic. In fact, nearly half of respondents in a recent survey said that closing virtually with a distributed workforce impacts the audit and other third-party engagements.
This one-hour Webinar covers what coronavirus pandemic training and education are needed to safely re-enter the workplace.
With the global workplace in a fractious state in 2020, many companies transitioned employees to working from home. This created new challenges for compliance leaders from providing clear data security guidance to reinforcing HR policies like harassment prevention for the remote work environment.
For many companies, SOC 2 Compliance can be an unexpected requirement to work with a big new client. This complex, time-consuming compliance effort is often much more costly than business leaders expect, and can easily lead to more hiring, delayed product launches, and slow business growth.
With the pandemic lingering and the coronavirus vaccine shipping in the United States, we are hopefully beginning to turn the corner on the pandemic.
The complexity and pervasiveness of financial crime continues to challenge compliance functions. Machine learning can significantly bolster the efficiency and effectiveness of the function when implemented correctly, yet many financial institutions have had limited success in deploying it.
Join Deloitte’s leading practitioners in third party risk management for a one-hour webinar as they explore key findings from their fifth annual extended enterprise risk management (EERM) survey.
The invalidation of the EU-U.S. Privacy Shield has many U.S. companies wondering if they will ever be able to take possession of EU data again.
The California Consumer Privacy Act (CCPA) went into effect on January 1, 2020, and is currently the most comprehensive consumer data privacy law in the United States.
To say that 2020 was filled with change and challenges would be an understatement. As businesses adjust to new ways of working, many are reassessing the risk profiles of their third parties and re-evaluating their third-party risk management programs as they prepare for the new year.
Addressing data retention is the surest way to mitigate risks and costs of a data breach. With numerous regulations such as GDPR and California’s ballot initiative CCPRA requiring organizations to provide up-to-date and enforced retention schedules, it’s more important than ever that your organization maintains compliant practices to minimize damages.
Join this educational session as we outline best practices for developing and optimizing efficient processes within your third party risk management program.
Join Authentic8’s Jeff Phillips and Nick Finnberg, OSINT training lead and former financial crime analyst, as they discuss key takeaways from a financial crime survey of investigators from more than 150 organizations worldwide.
Do the EUs GDPR and California’s CCPA privacy regulations include the right of a data subject to have their personal information completely erased from all enterprise backups as well?
Accounts payable, procurement, and travel and expense-management processes are common channels to route frauds making organizations susceptible to regulatory penalties, reputational damage, financial loss, and even prosecution.
Today, many organizations find themselves stretched thin with limited resources and unable to put together a world-class vendor risk management program.
This one-hour Webinar covers what coronavirus pandemic training and education are needed to safely re-enter the workplace.
The updated DOJ guidance on the evaluation of compliance programs emphasizes the importance of obtaining, tracking, and acting on compliance-relevant data.
How deep do you need to go to uncover potential license compliance issues that could cause you problems now or when you least expect it? Have you considered snippet-level analysis? Should you?
Being deal-ready is a key part of modern governance. From the inception of a company and raising capital, to expanding into new territories and markets, all the way to your IPO.
Three recent major enforcement actions related to alleged domestic bribery activity, including a $200 million deferred prosecution agreement with a major utility, may signal a renewed focus by the Department of Justice into corruption corporate interests at the state and local levels in the U.S.
This webinar will discuss how companies are making changes to their onboarding processes and supply chain due diligence and how COVID-19 has shifted priorities and budgets going forward.
Managing third-party risk for your organization is increasingly becoming more urgent with today’s environmental and geopolitical challenges, business continuity issues and regulatory demands.
Compliance Week Editor in Chief Dave Lefort and data journalist Aly McDevitt host a 1-hour Webcast to discuss CW’s Carnival case study in addition to the behind-the-scenes making of the product.
In a world where most compliance solutions claim to be compliant with the latest DOJ guidance, let’s take a closer look at the framework designed for evaluating corporate compliance programs, how that has evolved over the years, and critical questions you should be asking.
COVID-19 has undoubtably presented new challenges for companies around the world. Most were required to rapidly shift to remote work environments, and some have even had to adjust their business models.
With the release of the DOD’s Cybersecurity Maturity Model Certification program in 2020, contractors are required for the first time to comply with a specific set of cybersecurity capabilities—and have that compliance certified by a third party.
As businesses continue to expand their digital footprint, security professionals are dealing with more data than ever before. The threat landscape continues grow, and teams across GRC functions have become highly specialized.
The long-standing theory of having an average of only six degrees of separation between any two people takes on an interesting twist when considered through a compliance and risk management lens.
As U.S.-based employers consider their return-to-work compliance policies, OSHA has emphasized that companies should provide workers with “up-to-date education and training on COVID-19 risk factors and protective behaviors.”