All Webcast articles – Page 8

View all stories of the same content type.

  • genpact300x200
    Webcast

    Webcast: Why T&E audit is more than policy compliance

    2019-08-22T14:00:00Z Provided by

    Organizations are failing to solve the employee-spend challenge as travel and expense (T E) transactions continue to suffer from non-compliance and fraud. Companies also have unnecessarily high audit costs and inadequate risk coverage thanks to manual testing of T E transactions.

  • blackline 300x200
    Webcast

    Webcast: Getting the audit scores you want

    2019-08-20T14:00:00Z Provided by

    Many organizations today need to adhere to stringent audit and compliance rules to prove they’re following established guidelines and regulations. An automated compliance approach centralizes audit information, and provides easier access to key controls and status. Furthermore, automation can reduce labor intensive costs and non-value-added time often associated with manual ...

  • securelink 300x200
    Webcast

    Webcast: Key strategies to ensure third-party compliance

    2019-08-15T14:00:00Z Provided by

    Enterprises are now, more than ever, relying on a higher number of third-party, mission-critical technologies (along with their support and maintenance). As a result, enterprises are unintentionally opening themselves up to the largest source of data breaches. 

  • proofpoint300x200
    Webcast

    Webcast: Broker-Dealers on Social Media: Understanding the Risks

    Provided by

    Regulations put broker-dealers squarely in the spotlight of various risks and responsibilities. FINRA and the SEC govern marketing communications and advertising practices when communicating with the public. Additionally, the cybersecurity threat landscape is evolving and is one of the primary operational risk’s firms face today.

  • refinitiv 300x200
    Webcast

    Webcast: Anti-Bribery and Corruption Challenges, Trends and New Lines of Defense

    Provided by

    Experts from Refinitiv and ProcessUnity discuss the types of risks facing companies today; how to tackle third-party risks using data, technology, and automation; and best practices for implementing processes and procedures for integrated, ongoing due diligence.

  • dnb 300x200
    Webcast

    Webcast: Busting the 10 Myths of Third-Party Risk Management

    Provided by

    Managing third-party risk is vital to every business’ reputation and long-term success. But with growing regulatory requirements, compliance skills shortages and numerous potential sources of information, managing third-party risk as an organization can feel like a very painful process.

  • proofpoint300x200
    Webcast

    Webcast: Compliance trends and futures – how technology is driving change

    Provided by

    The compliance world is changing. Regulations are evolving and new technology addressing compliance challenges are becoming available. From international privacy regulations to new communication channels, how can organizations keep up with those changing regulations and how can they remain nimble.  

  • trulioo 300x200
    Webcast

    Webcast: How Modern Identity Networks Can Marry Convenience, Compliance and Privacy

    Provided by

    Identity lies at the very foundation of our day-to-day experience, yet, it’s the weakest link in the chain of interactions taking place in the online, borderless economy. While technology evolved at an exponential pace, the global identity infrastructure that we inherited still remains antiquated and has proven to be an ...

  • infor 300x200
    Webcast

    Webcast: Best Practices for Managing Risk in the Age of Digital Transformation

    Provided by

    Digital transformation is no longer optional. It has become mandatory for businesses to remain relevant and to compete in today’s digital economy. Now more than ever, an integrated approach to governance, risk, and compliance (GRC) is required to provide a wider view of changing organizational risk. 

  • trustarc 300x200
    Webcast

    How to Tackle CCPA Compliance – Expert Guidance and Benchmarking Insights

    Provided by

    Whether you’re starting from scratch or leveraging an existing privacy program, developing the processes required for California Consumer Privacy Act (CCPA) compliance can be challenging. From understanding the regulation and all of its nuances, to managing requirements including data inventories, risk assessments and consumer access requests, most companies need help ...

  • conduent 300x200
    Webcast

    Happy Birthday GDPR

    Provided by

    As General Data Protection Regulation (GDPR) completes one year and other global and national trends in data privacy regulations such as CCPA, NYSDFS are rolling out, a discussion with leading insurers is imperative. How are they charting the course with regulators, employees, consumers, subjects, and third parties, in an ...

  • hackerone 300x200
    Webcast

    Meet PCI DSS Requirements for Assessing Vulnerabilities with Crowdsourced Security Testing

    Provided by

    Today’s 21st century security teams are dealing with greater challenges in protecting customer data—growing attack surfaces, third-party integrations, agile development, and cloud infrastructure. Yet, many organizations are limited by traditional penetration tests and scanners that are ineffective for today’s 21st century cybersecurity concerns. A better approach is needed to discover ...

  • blackline 300x200
    Webcast

    How to Effectively Achieve Sustainable Compliance

    Provided by

    SOX has been in effect for more than 15 years, yet many companies still haven’t streamlined key elements of their compliance process. Spreadsheets and email remain the most common way to manage the data collection and affirmations that compliance requires. Software designed to manage compliance can provide strong controls that ...

  • trueoffice300x200
    Webcast

    5 Seismic Shifts In Compliance Training

    Provided by

    Compliance training is one of the most powerful tools a compliance team can use to empower employees to be their most ethical selves. With less than 1% violations resulting from actual malicious intent, this webinar will dig in to the critical shifts you can make to use this employee touchpoint ...

  • securelink 300x200
    Webcast

    Vendor remote access: How to protect your organization from data breaches

    Provided by

    Cybersecurity continues to be a significant area of concern, with a higher frequency of multi-million dollar, potentially deadly, security breaches, 63 percent of which can be attributed to a third party.

  • wolters kluwer 300x200
    Webcast

    Webcast: How Audit and ERM Work Together, A Combined Assurance Approach

    Provided by

    Internal audit is a profession that provides assurance that objectives are being met for the organizations that it serves. However, it is not the only assurance provider performing audits and requesting information and often organizations are fatigued by different departments requesting the same information and reporting the same results. Enterprise ...

  • onfido 300x200
    Webcast

    AI for Identity Verification: Going Beyond the Buzzwords

    Provided by

    The way we verify our identities is changing. With traditional enterprises evolving and taking their operations fully digital, and newer all-digital businesses are growing exponentially, it makes sense that identity verification and KYC move online too. But in a remote setting, it’s hard for businesses to scale up their user ...

  • acl 300x200
    Webcast

    Breaking down the barriers to effective internal control

    Provided by

    When implementing and maintaining an effective internal control framework challenges can often come from multiple angles - Process, Culture and Technology. These are amplified when working outside of the highly regulated industries such as Finance and Healthcare. In order to successfully plan and implement a control framework that delivers increased ...

  • pu
    Webcast

    Third-Party Risk: Best Practices for Due Diligence and Ongoing Assessments

    Provided by

    The ever-changing regulatory landscape and sheer volume of third parties requires organizations to rethink their processes around pre-contract due diligence and ongoing vendor assessment reviews. Today’s most successful programs rely less on tedious, manual processes while incorporating verified, up-to-date information on financial status, watchlist compliance and information security from trusted ...

  • ibm 300x200
    Webcast

    Forget Me Not: Business Challenges Over Rights to Erasure & Threats to AI

    Provided by

    Developments in Artificial intelligence (AI) and machine learning (ML) have brought about unprecedented insight and value to the modern enterprise. At the same time, the right to be forgotten is ensconced in the current and upcoming privacy regulations such as the GDPR and CCPA. In this webinar, experts will discuss ...