All Webcast articles – Page 6
View all stories of the same content type.
-
Webcast
CPE Webcast: Emerging trends from Deloitte’s global TPRM survey 2021
Join ProcessUnity and Deloitte’s leading third-party risk practitioners as they explore key findings from Deloitte’s 2021 Global TPRM Survey. You will hear what organizations are doing in the wake of last year’s pandemic to make advancements in their approach to third-party risk.
-
Webcast
CPE Webcast: Defending yourself from ransomware third-party risks
Ransomware continues to dominate headlines with no sign of slowing down. What started more than 30 years ago has become one of the most prevalent and lucrative cyberattacks that does not discriminate by company size, industry, or geography.
-
Webcast
CPE Webcast: Automation in compliance training: How to start and where it can take you
Technology is changing every aspect of life and automation is reducing the effort required for even the most complex of business processes.
-
Webcast
CPE Webcast: Data privacy isn’t a compliance checkbox but a competitive advantage
In the post-GDPR era, data privacy has taken center stage yet again due to digital transformation across the globe. Governments everywhere are enforcing more robust data protection guidelines to address new digital interactions between enterprises and consumers.
-
Webcast
Webcast: Mitigate risk and improve litigation readiness
With the sheer volume of communications happening on more platforms than ever, a modern approach to compliance and archiving has become critical.
-
Webcast
CPE Webcast: Incident and breach management 101
Today’s breach landscape is unprecedented and complex. Every organization is facing potential enforcement of many interconnected and overlapping laws in multiple jurisdictions, each with restrictive timelines. In this complex environment, it is not enough to have a response plan. Your organization needs a response system.
-
Webcast
CPE Webcast: Identifying risky vendors: 7 warning signs
For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with? Answering that question is not so straightforward.
-
Webcast
CPE Webcast: The rise of ESG in third-party risk management
ESG and its role in third-party risk management have gained prominence this past year as the awareness for environmental and social issues continue to grow.
-
Webcast
CPE Webcast: Cost-effective business license, permit, and registration compliance
Compliance is a necessity for every business, but the best long-term strategies for any company depend on factors like portfolio size, internal expertise, available budget, and risk tolerance.
-
Webcast
CPE Webcast: Long-term data retention and archiving strategies for regulatory compliance
As the volumes and types of electronic data generated by organizations continues to grow, it becomes increasingly complex to correctly identify, capture, store, protect and make searchable hundreds of terabytes (or petabytes) of disparate data.
-
Webcast
CPE Webcast: How Motorola is transforming evidence collection for data protection compliance
A popular saying among security, privacy and corporate compliance circles is “trust, but verify”. It’s a popular saying because it neatly captures so much of what compliance professionals have to do: collecting evidence to verify compliance.
-
Webcast
CPE Webcast: Streamlining HIPAA & HITRUST compliance with an alternative reporting approach
Your organization might be using HITRUST to manage multiple compliance initiatives, including HIPAA, NIST and the ISOs. The framework sets up a good set of practices that lend well to various privacy regulations and standards, yet connecting all that data for fast reporting is where most organization’s hit a wall. ...
-
Webcast
CPE Webcast: Sustainable lease accounting: Maintaining compliance through Day 2 and beyond
When FASB and IASB first announced the lease accounting standards ASC 842 and IFRS 16, respectively, companies scrambled to pull together their lease data and implement procedures and tools to generate the required disclosures.
-
Webcast
CPE Webcast: Managing policy updates in a sea of regulatory change
Updating corporate policies to correspond with an ever-changing, ever-growing list of regulations is putting pressure on already stretched corporate compliance functions. And the flood of new regulations will likely only increase going forward. Will you be able to keep up?
-
Webcast
CPE Webcast: Riding the waves of regulatory change
With a constant influx of new and changing regulatory requirements with increased scrutiny and enforcement, organizations can quickly fall behind and be drawn into a churn of reactive activities that distract from business objectives and use up valuable resources.
-
Webcast
CPE Webcast: Managing true challenges in a compliance investigation
Compliance investigations are fraught with challenges from start to finish—from the pre-planning stage through the presentation of the final report detailing the factual findings.
-
Webcast
CPE Webcast: Continuous monitoring — the key to effective TPRM
Third-party risk management has always been a challenging area for risk and compliance professionals, never more so than today. As the global economy rebounds, third-party risk has taken on new dimensions.
-
Webcast
CPE Webcast: Working across your three lines of defense to manage risk
How do you encourage your line of business to own risk today? Having a clear understanding of risk to evaluate probability and impact has been a common barrier to developing risk programs beyond traditional second-line professionals.
-
Webcast
CPE Webcast: Understanding risks & compliance
Are you keeping up with your organization’s evolving risk landscape, or are those risks keeping you up at night? Fraud and restatements are happening every day, and it’s important to recognize that your company is consistently exposed to risk.
-
Webcast
CPE Webcast: TPCRM best practices that reduce supply chain risk
Organizations are adopting digital transformation and, as a result, increasing their reliance on third parties faster than they can scale their third-party cyber-risk management programs.