Legal, Risk, Compliance, ediscovery, Financial Crime, Corporate Governance, Data Privacy

Size: px
Start display at page:

Download "Legal, Risk, Compliance, ediscovery, Financial Crime, Corporate Governance, Data Privacy"

Transcription

1 Organizer Empress Room 3-5, Level 2 Legal, Risk, Compliance, ediscovery, Financial Crime, Corporate Governance, Data Privacy Format: Innoxcell Asia Symposium (IAS 2015) is a 1-day-conference focusing on variety of Legal, Regulatory, and Compliance, ediscovery, Litigation, and White Collar Crime topics. Path 1: White Collar Ethics & Corporate Legal Path 2: ediscovery, Data Breach, Investigation & Fraud Path 3: Regulatory Compliance for Financial Services The great diversity of Legal and Regulatory Compliance topics throughout the day encourages your team to attend sessions on different streams. Whether your objective is to learn the latest best legal and business practices, catch up with the latest regulatory updates,, establish networking with Asia s prominent professionals or simply to visit the legal technology and solutions exhibition, the IAS 2015 is definitely an event you cannot miss! Come and join us to explore your business opportunities at the Innoxcell Asia Symposium 2015 in Singapore! Who should attend? -- In-house Legal and Compliance Professionals -- CEO and CFO -- Head of Audit -- Internal Control Professional -- Audit Committee -- Company Secretary -- Corporate Risk Management Professionals -- Head Internal Investigation -- Corporate Computer Forensic Personnel -- IT Audit Professionals -- CIO, and COO -- Information Security Professionals -- Head of Technology Risk Title Sponsor Gold Sponsors Silver Sponsors Supporting Organizations Co-Host Media Partner To know more about this conference, please contact us at or us at Jeffrey.teh@innoxcell.net

2 Schedule-at-a Glance White Collar Ethics & Corporate Legal ediscovery, Data Breach, Investigation & Fraud Regulatory Compliance for Financial Services 08:30 09:00 Registration and Networking 09:00 09:50 Anti-Corruption Compliance (Part 1): International Anti-Corruption Compliance ediscovery Challenges: Internet of Things, Cloud and Mobile BYOD Anti-money Laundering (Part 1): KYC Threat - Transaction 09:50 10:00 Break 09:45 10:00 Break 09:45 10:00 Break 10:00 10:50 Anti-Corruption Compliance (Part 2): Designing a Winning Compliance Program Using TAR for Review of Investigation, Regulatory Responses and Discovery Requests Anti-money Laundering (Part 2) : Cross Border Risk Management 10:50 11:00 Break 10:45 11:00 Break 10:45 11:00 Break Internal Control and Data Analytics Technology Showcase: ONE SIZE FITS ALL Document Review (Myths or Facts?) Information Governance and Dark Data Management 11:45 12:00 Break Cross Border Data Flows and Cloud Computing Simulated Workshop: Cybersecurity Risk Oversight (for corporate IT professionals) Simulated Workshop: Cybersecurity Oversight for Financial Institutions Third Party Due Diligence and Case Studies Discussion 12:50 14:00 Asset misappropriation Investigation and Prevention plan Multi-Jurisdictional Investigations 14:45 15:00 Regulatory Compliance Enforcement & Management Malware & Botnets: Can Your Financial Service Companies Survive a Vicious Cyber Attack? 15:45 16:00 Grand Finale - Cross Border Data Breach Cases and Legal Complexity Cinematheque Experience: Popcorn and Margarita Grand Finale - Governance, Risk and Compliance

3 Full Agenda White Collar Ethics & Corporate Legal 09:00 09:50 Anti-Corruption Compliance (Part 1): International Anti-Corruption Compliance ediscovery, Data Breach, Investigation & Fraud ediscovery Challenges: Internet of Things, Cloud and Mobile BYOD Regulatory Compliance for Financial Services Anti-money Laundering (Part 1): KYC Threat - Transaction Examining multinational companies operating in developing countries and its local internal control regimes to avoid sanction, FCPA and UKBA violation. How to report, respond and react effectively internally to ensure your senior management are aware of corruption risks? What are the lessons that can be learnt from regional regulatory cases from the past 2 years? What is your current approach to anti-corruption compliance? Preventive measure and monitoring strategies for Asian companies can be very different compare to US or EU companies. What is best for my company? A Perspective on 21st Century Information Management How to manage corporate data in the 21st century workplace? Examine the risks and challenges of ediscovery in times where Internet of Things, Cloud and Mobile BYOD are increasingly popular Denny Husen, Senior Manager, Fraud Investigations & Dispute Services, EY Compliance with regulations concerning anti-money laundering, know-your-customer (KYC) and risk management imperatives has become a top priority for financial institutions as they struggle to anticipate and respond to known and emerging risks This session, the speakers will discuss how to use advanced analytic and information to manage AML risk. Frank Reppel, Managing Director, FICO TONBELLER Compliance Solutions, FICO Ghadeer Saed, Regional MLRO, Asia & EMAI, ANZ Neill Poole, Executive Director, AlixPartners Monica Puri, General Counsel, SE Asia, Jones Lang LaSalle Thiru Sethuraman, Director of Global Ethics and Compliance, Cummings Inc.. Andy Yeo, Partner, Allen & Gledhill LLP 09:50 10:00 Break 09:45 10:00 Break 09:45 10:00 Break 10:00 10:50 Anti-Corruption Compliance (Part 2): Designing a Winning Compliance Program Using TAR for Review of Investigation, Regulatory Responses and Discovery Requests Anti-money Laundering (Part 2) : Cross Border Risk Management Companies of all sizes must develop, implement, enforce and continually update their compliance programs. In this session, you will learn how to design a winning compliance program for your company. This session explores: How to engage your employees in the compliance programs? How to communicate policies effectively within the organization? How to draft a strategic plan for the compliance function to top management? How to effectively apply enterprise risk management to legal and regulatory compliance? Brent Carlson, Director, AlixPartners Judy Chang, Global Head Business Ethics & Compliance, PayPal Luca Probst, Regional Compliance and Ethics Manager, UPS Asia Pac Campbell Clark, General Counsel, Asia, Medtronic What exactly is Technology Assisted Review (TAR)? Discuss the defensibility and judicial acceptance of TAR Using TAR to increase the efficiency of review for investigations, regulatory responses and discovery requests Conor Crowley, ediscovery Counsel APAC, UBS AG Michael Lew, Director Singapore, Law in Order What are the AML risks embedded in cross border fund flows? How significant is it? To what extent are firms bounded by overseas regulations for cross border businesses? Discuss challenges to comply with cross border AML requirements for firms in Singapore and what should be the priorities? Marta Mihaly, MLRO, Eastspring Investments Erik Wilgenhof Plante, Chief Compliance Officer, itbit Pte 10:50 11:00 Break 10:45 11:00 Break 10:45 11:00 Break Internal Control and Data Analytics Within the legal, risk and compliance space, many companies have adopted the continuous monitoring and continuous auditing methods used to detect fraud and other risks within organization. Discuss the increasing role of legal department in enterprise risk management Examine reasons why traditional approaches to risk management are no longer effective Use of data analytics to help companies better understand the value and risks in their information assets Real-life examples of using analytics to detect emerging risks Benjamin Thong, Director, EY Suryanto Narmada, Head of Audit, Aviva Technology Showcase: ONE SIZE FITS ALL Document Review (Myths or Facts?) In the legal community, most people know that predictive coding and analysis technology, including disruptive technology, has the ability to dramatically reduce document review time and costs, as well as raise accuracy well beyond traditional linear review techniques. However, there is no such thing is ONE SIZE FITS ALL. This session, the speaker will showcase the understanding of which technology works best for which type of data and what information it needs to help direct its decision making about e- discovery tools. Anthony Ranansinghe, Manager, Business Development APAC, Kroll Ontrack Mari Ono, Case Manager APAC, Kroll Ontrack 11:45 12:00 Break Information Governance and Dark Data Management The amount of operational information both structured and unstructured that companies create and store are drastically increasing due to digitisation and mobility. Dark data management emerged as another challenge for corporate information governance. Under the increasing pressure from new regulatory regime and consumer expectation, corporate data must be well managed if companies wish to survive in today s information age. This session explores natures of corporate information legal risks in the context the Big Data and offers insights on information governance to transform data from a liability into an asset. Dr. Sonny Zulhuda, Assistant Professor and Cyber Law Course Coordinator, International Islamic University Malaysia White Collar Ethics & ediscovery, Data Breach, Regulatory Compliance for

4 Corporate Legal Investigation & Fraud Financial Services Cross Border Data Flows and Cloud Computing Simulated Workshop: Cybersecurity Risk Oversight (for corporate and non-banking professionals) Simulated Workshop: Cybersecurity Oversight for Financial Institutions The shift towards cloud has ushered in a whole new set of legal complexities that cannot be underestimated. It is important to understand the many benefits that come with cloud services including from a privacy and security standpoint. At the same time, lawyers need to understand and assess how and where information is collected, stored and used and the regulatory implications of data crossing borders. What are the risks associated with cloud services? What existing and emerging laws need to be considered, including in relation to cross-border data flows? What are the key questions every customer should be asking their cloud provider and what answers can you expect? Steven Howard, General Counsel APAC, Sony Mobile Communications John Galligan, Regional Director for Government Relations, Microsoft Asia Pacific & Japan In this session, you will: Discover the role management play in setting the right tone around protocol for cyber risk Learn the key questions senior executives should be asking themselves to prepare for a potential cyber breach. Obtain insights on how to collaborate with other companies, regulators and law enforcement to minimize vulnerabilities Learn what an effective incident response plan is and how to best secure core data. Jonathan Fairtlough, Managing Director, Cyber Security and Investigations Practice, Kroll Ajay Kumar Dhir, Group CIO & CHRO, Adhunik Group of Industries, India Kroll investigators who previously worked at international banks will guide attendees through a data breach scenario at a bank. In this session you will: Understand the potential access points for a data breach Identify the paralysis points that hold up Financial Institutions when responding to a data breach Understand and mitigate limitations of banking silos Some considerations when designing an incident response plan Recommendations to effectively secure core data Daniel Chong, Associate Managing Director, Cyber Security and Investigations Practice, Kroll Joseph Florendo, Managing Consultant, Cyber Security and Investigations Practice, Kroll Third Party Due Diligence and Case Studies Discussion The growing use of third parties has seen increased regulatory scrutiny of such practices, but are organisations keeping up with the latest developments and ensuring they act in an appropriate manner? Understanding the challenges faced, alongside the ever shifting regulatory boundaries, is crucial to getting this area of business right. This session will look at recent case studies, as well as some statistics based on recent reports, to underline where firms need to improve in their use of third parties, the due diligence processes involved, and the cost of getting it wrong. Sam Gibbins, General Manager (Asia), GRC Solutions 12:50 14:00 Asset misappropriation Investigation and Prevention plan Global statistics show that Companies lose 5% of their annual revenue to fraud. Asset misappropriation, one of the three categories of occupational fraud, is by far the most common. This session, the speaker will discuss about asset misappropriation and how you can mitigate the risk and respond to it. The speaker will also speak about her personal experience in investigating such frauds and preventive measures to address asset misappropriation. Stacy Chai, Director, Fraud Investigation & Dispute Services, EY 14:45 15:00 Exhibition and Networking Multi-Jurisdictional Investigations Planning for cross-border dispute resolution strategy and identifying key priorities Coordinating complex litigation and arbitration proceedings across multiple jurisdictions Common scenarios involving joint ventures, financial disputes and transnational projects Interplay between U.S., U.K., China, Hong Kong and various offshore jurisdictions Sidarth Khashu, Director, Fraud Investigation & Dispute Services, EY Wan Kwong Weng, Managing Director, Group General Counsel, Mapletree Investments Charles Ball, Partner, Reed Smith Stanley Park, Managing Director and Head of Legal Asia Pacific, Scotiabank Regulatory Compliance Enforcement & Management In this session, you will learn how to put in place processes to deal with formal requests and actions by financial regulators and law enforcement agency to deal with financial misconduct and market abuse. You will also learn how to strengthen the compliance culture and preventative aspects of mitigating against enforcement actions. Nizam Ismail, Advisory Board, RHT G.R.A.C.E. Robin Lee, Chief Executive Officer, RHT G.R.A.C.E. Malware & Botnets: Can Your Financial Service Companies Survive a Vicious Cyber Attack? Identification of cybercrime peculiar to financial service companies How organized cybercrime cause potential loss and risk to financial service companies How in-house cyber security professionals and management team may collaborate with outsourcing security companies and government agencies to combat cyber security Case studies of risk management to protect financial service companies from and combat cybercrime and cyber attack Value of Cloud in FSI for cybersecurity & data protection Kanny Lee, Executive Director, Forensic Technology and Disputes Services, EY Pierre Noel, Chief Security Officer, Asia, Microsoft Corporation Keshav Dhakad, Senior Attorney & Regional Director, Microsoft Digital Crimes Unit, Asia, Microsoft Corporation 15:45 16:00 Exhibition and Networking Grand Finale Cross Border Data Breach Cases and Legal Complexity Cinematheque Experience: Popcorn and Margarita This session, the facilitators will walk you through a movie segments that consist of cybercrime, data breach and investigation scenarios. Participants will be asked to spot any irregulars and criminal activities in the movies. Our facilitators will show case a series of problems as well as best practices corporation can use to prevent, detect, investigate and eliminate latest cyber crime activities This is a fun and interactive sessions to stimulate participants capable skills and ideas to fight white collar crime activities and comply with latest regulations while navigate legal complexity Darren Cerasi, Director, i-analysis Sannie Sng, Litigation and Investigation, UBS AG, Singapore Kyle Wombalt, Global Head Corporate Crime and Investigations, Herbert Smith Freehills Grand Finale Governance, Risk and Compliance What are the key industry pressures coming from regulators, both in Singapore and abroad? How has increased regulation affected KYC and on-boarding processes for financial services firms? How does changes in Outsourcing guidelines impact on financial services? How can compliance and legal best work in partnership to foster a good conduct risk? How is the changing nature or regulation impacting business objectives? Sam Gibbins, General Manager (Asia), GRC Solutions Daniel Furtwaengler, Head of Sales APAC, Signavio Delon Abrams, Assistant General Counsel, Regional Legal, Markets and Securities, Citi Maria van der Burgt, Regional Head of Global Compliance Assurance APAC, Barclays Compliance

5 REGISTRATION FORM Delegate Pricing Delegates with job titles listed on first page Law firms Solution and Service Providers SG$300 per day SG$700 per day SG$2,000 per day DELEGATE 1: DELEGATE 2: DELEGATE 3: Payment By Cheque: Please make cheque payable to InnoXcell Limited and post it to: Unit A, Level 10, Casey Building, 38 Lok Ku Road, Sheung Wan, HK By Credit Card: Please charge my AMEX / VISA / Mastercard No: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Amount HKD / USD Cardholder s Name of Cardholder: Expiry Date: / Sec. Code: Booking Terms & Conditions 1. Registrations are confirmed when we send a written Confirmation via or fax. If you have not received a booking confirmation prior to the commencement of the course, it is the delegate s responsibility to contact InnoXcell Limited to confirm their place. 2. Payment must be received, in full within 7 days of receiving the invoice. 3. InnoXcell Limited reserves the right to withhold entry to the conference if payment has not been received in full. 4. Cancellations must be received in writing. 30% of the conference fee will be charged if cancellation is received one month BEFORE the conference. 100% of the conference fee will be charged if cancellation is received WITHIN one month of the conference. 5. If you are unable to attend the conference, a substitute delegate is welcome at no extra charge. 6. No refunds will be given and no shows will also be charged in full. 7. The conditions are subject to change without prior notice. InnoXcell Limited Tel: Fax: enquiries@innoxcell.net Address: Unit A, Level 10, Casey Building, 38 Lok Ku Road, Sheung Wan, Hong Kong

DIGITAL FORENSICS. Cost-effective and Proactive Information Management for Emerging Legal and Technical Challenges

DIGITAL FORENSICS. Cost-effective and Proactive Information Management for Emerging Legal and Technical Challenges www.innoxcell.net e-discovery & DIGITAL FORENSICS Cost-effective and Proactive Information Management for Emerging Legal and Technical Challenges Event Highlight Pre-Arranged One-to-One Networking Meeting

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

Fraud, Corruption and Money Laundering: Prevention, Detection and Recovery

Fraud, Corruption and Money Laundering: Prevention, Detection and Recovery IN HOUSE Fraud, Corruption and Money Laundering: Prevention, Detection and Recovery An intensive 4-day programme covering the latest anti-fraud, anticorruption and anti-money laundering techniques including:

More information

For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services

For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services For Private circulation only www.deloitte.com/in Creative. Clear. Focused. Forensic Services Do you conduct background checks on employees and vendors? Do you educate employees about the importance of

More information

In Brief. Just the Facts

In Brief. Just the Facts In Brief Just the Facts N ardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including the FCPA/UK Bribery Act and other corruption-related investigations,

More information

Corporate Compliance Australia. 5 Essential Elements of Compliance

Corporate Compliance Australia. 5 Essential Elements of Compliance Corporate Compliance Australia 5 Essential Elements of Compliance Today s multinational companies must contend with an ever-changing number of compliance requirements that seem to multiply daily. Australian

More information

Professional Certificate in Ethics and Anti-Corruption Compliance

Professional Certificate in Ethics and Anti-Corruption Compliance in partnership with Professional Certificate in Ethics and Anti-Corruption Compliance Maxwell Chambers, Singapore, November 18th & 19th 2015 Enhance & develop your understanding of Ethics & Compliance

More information

E-discovery and Legal Outsourcing New Trends and Services Offered in Litigation Support

E-discovery and Legal Outsourcing New Trends and Services Offered in Litigation Support E-discovery and Legal Outsourcing New Trends and Services Offered in Litigation Support www.connect-goal.com 28 Jan 2013 Speakers Michael Lew Director & Head - Digital Forensics Chio Lim Stone Forest Singapore

More information

e-discovery Exchange Platform

e-discovery Exchange Platform e-discovery Exchange Platform Yeong Zee Kin Senior Assistant Registrar Supreme Court of Singapore Chris Dale Founder & Consultant the e-disclosure Information Project Richard Kershaw Asia Managing Director

More information

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs *This is a sample course catalog. BBNA is in the process of moving all of our recorded content on to our new platform. Not all

More information

MASTER OF JURISPRUDENCE AND GRADUATE CERTIFICATE PROGRAMS COURSE DESCRIPTIONS

MASTER OF JURISPRUDENCE AND GRADUATE CERTIFICATE PROGRAMS COURSE DESCRIPTIONS MASTER OF JURISPRUDENCE AND GRADUATE CERTIFICATE PROGRAMS COURSE DESCRIPTIONS MJ 726: AGENCY REGULATIONS Elective (2 credit hours) This course studies the law governing administrative agencies in the task

More information

3 4 SEPTEMBER 2012 TAN SRI ABDUL KADIR YUSOF HALL ATTORNEY GENERAL S CHAMBERS LEVEL 3, NO. 45, LOT 4G7 PERSIARAN PERDANA, PRECINT 4 PUTRAJAYA

3 4 SEPTEMBER 2012 TAN SRI ABDUL KADIR YUSOF HALL ATTORNEY GENERAL S CHAMBERS LEVEL 3, NO. 45, LOT 4G7 PERSIARAN PERDANA, PRECINT 4 PUTRAJAYA Providing the participants with the legal knowledge and information necessary to develop and implement programmes that will effectively prevent catastrophic losses brought on by recalls and product liability

More information

The Importance of Privacy & Data Security in a Changing World

The Importance of Privacy & Data Security in a Changing World Cyber, PrivaCy & Data SeCurity 360 www.mpplaw.com about our PraCtiCe Data is the lifeblood of our global economy. Collected, stored and transmitted, digital data not only imparts great opportunities, but

More information

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Program Organizer: Please join us for a NEW Invitation Only Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Role of Firm Leadership, IT, COO, General Counsel Data Breaches Identification

More information

Anti-Money Laundering controls in Mergers & Acquisitions

Anti-Money Laundering controls in Mergers & Acquisitions White Paper Anti-Money Laundering controls in Mergers & Acquisitions June 2014 Anti-Money Laundering controls in Mergers & Acquisitions Authors: Ana L. Pereira and Ana Maria H. de Alba Caveat emptor let

More information

Global Forum 2014. Tokyo EVENT REPORT

Global Forum 2014. Tokyo EVENT REPORT Baker & McKenzie Global Forum 2014 Personal Data Protection: Global personal data risk and management - Trends and perspectives from Asia, Europe, and the US EVENT REPORT Global Forum 2014 MARCH 2014 TOKYO

More information

THOMSON REUTERS ACCELUS

THOMSON REUTERS ACCELUS THOMSON REUTERS ACCELUS ACCELUS Screening Resolution Service Executive Summary Thomson Reuters Accelus offers Screening Resolution Service (SRS): an outsourced screening service for Corporates and Financial

More information

How to Deal with Troublemakers in Your Company

How to Deal with Troublemakers in Your Company HK Law Society CPD course *Applying for accreditation is in progress. Professional Information for You How to Deal with Troublemakers in Your Company Hong Kong Friday, 14 September 2012 2:00pm - 5:30pm

More information

Global EY FIDS Forensic Data Analytics Survey 2014

Global EY FIDS Forensic Data Analytics Survey 2014 Global EY FIDS Forensic Data Analytics Survey 2014 Big risks require big data thinking The Eighth International Pharmaceutical Compliance Congress Dubai, United Arab Emirates Vincent Walden Partner, EY

More information

INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT

INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 TH - 18 TH JUNE 2014 SWISSOTEL SYDNEY CBD PLATINUM SPONSOR GOLD SPONSOR SILVER SPONSOR BRONZE SPONSOR SUPPORTING ORGANISATION SUPPORTING ASSOCIATION ABOUT

More information

Governance, Risk & Compliance Management. Julian Hunn, Operations Manager Professional Standards

Governance, Risk & Compliance Management. Julian Hunn, Operations Manager Professional Standards Governance, Risk & Compliance Management Julian Hunn, Operations Manager Professional Standards Session Plan GRC Governance, Risk & Compliance Management What is corporate governance? Directors duties

More information

OUTSOURCING REGULATIONS IN THE BANKING AND INSURANCE INDUSTRIES IN ASIA PACIFIC

OUTSOURCING REGULATIONS IN THE BANKING AND INSURANCE INDUSTRIES IN ASIA PACIFIC OUTSOURCING REGULATIONS IN THE BANKING AND INSURANCE INDUSTRIES IN ASIA PACIFIC Bridging Borders Webinar Series 1 Welcome Welcome You are on mute A link to a recording of the webinar will be available

More information

Foreign Corrupt Practices Act (FCPA)

Foreign Corrupt Practices Act (FCPA) Foreign Corrupt Practices Act (FCPA) FCPA Practice Team John J. Carney, Partner John J. Carney, a former Securities Fraud Chief, Assistant United States Attorney, U.S. Securities and Exchange Commission

More information

Volcker Rule Breakfast Briefing

Volcker Rule Breakfast Briefing Volcker Rule Breakfast Briefing Venue: Date: Pinners Hall, 105-108 Old Broad Street, London, EC2N IEX 7 April 2014 Volcker and cross-border bank resolution Speakers include: Barnabas Reynolds Head of the

More information

Forensic Services. kpmg.hu

Forensic Services. kpmg.hu Forensic Services kpmg.hu We help you curb your losses. Our forensic team provides services designed to assist you in matters of a commercial or financial nature that may result in a legal or regulatory

More information

Continuing Legal Education Program Course Catalog

Continuing Legal Education Program Course Catalog Continuing Legal Education Program Course Catalog The Continuing Legal Education CLE program was created to provide quality continuing education to our colleagues and clients in the legal and corporate

More information

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use Enhancing Safeguards Through Information Analysis: Business Analytics Tools IAEA, Vienna, 09/10/2014 Julian Midwinter - Business Unit Executive i2, Threat and Counter Fraud General Use 2014 IBM Corporation

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

A FORUM FOR DEBATE, A CATALYST FOR CHANGE

A FORUM FOR DEBATE, A CATALYST FOR CHANGE 7 March 2013 Renaissance Hong Kong Harbour View Hotel Hong Kong A FORUM FOR DEBATE, A CATALYST FOR CHANGE 2013 conference highlights: The impact of the increasing frequency and severity of natural catastrophes

More information

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS THE TEAM William Beer São Paulo William Beer brings over 25 years of diverse international consulting experience advising on and managing

More information

2012 ACFE Asia-Pacific Fraud Conference. Fraud is a global problem. Be a part of the solution. KEYNOTE SPEAKERS. 4-6 November 2012 Hong Kong

2012 ACFE Asia-Pacific Fraud Conference. Fraud is a global problem. Be a part of the solution. KEYNOTE SPEAKERS. 4-6 November 2012 Hong Kong Fraud is a global problem. Be a part of the solution. 2012 ACFE Asia-Pacific Fraud Conference 4-6 November 2012 Hong Kong KEYNOTE SPEAKERS Kevin Zervos, SC Director of Public Prosecutions, Hong Kong Department

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Data Protection HEADLINE PART Developments: Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance

Data Protection HEADLINE PART Developments: Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance Data Protection HEADLINE PART Developments: 1 Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance Sub-headline Arial 18pt dark gray Optional Name Arial 13pt italic white Venue

More information

Corporations Take Control of E-Discovery

Corporations Take Control of E-Discovery Guidance Software Whitepaper Corporations Take Control of E-Discovery Chris Dale edisclosure Information Project What Does Your In-House E-Discovery Look Like? 53% indicate a GROWING CASE LOAD 55 % review

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management

More information

ediscovery2015 www.latouchetraining.ie info@latouchetraining.ie 01 8788 255 Earn up to 7 CPD Hours

ediscovery2015 www.latouchetraining.ie info@latouchetraining.ie 01 8788 255 Earn up to 7 CPD Hours ediscovery2015 Be the first to learn how best practice applied to your discovery project will reduce your workload, time and expense. 2nd Annual La Touche Training ediscovery Conference Friday 13 November

More information

C L A R I D E N 18 19 June 2014

C L A R I D E N 18 19 June 2014 C L A R I D E N 18 19 June 2014 Knowledge for the world business leaders Shangri-La Hotel Kuala Lumpur, Malaysia Handling Employment Disputes, Termination and Dismissal in Malaysia Faculty Director Trevor

More information

e-discovery Exchange Platform

e-discovery Exchange Platform e-discovery Exchange Platform Yeong Zee Kin Senior Assistant Registrar Supreme Court of Singapore Chris Dale Founder & Consultant the e-disclosure Information Project Richard Kershaw Asia Managing Director

More information

Ogier Legal Services. ogier.com. An introduction to working with us

Ogier Legal Services. ogier.com. An introduction to working with us An introduction to working with us British Virgin Islands Cayman Islands Guernsey Hong Kong Jersey Luxembourg Shanghai Tokyo An introduction to Ogier provides legal advice on BVI, Cayman, Guernsey, Jersey

More information

Meeting the new regulatory requirements and preparing your business for the challenges ahead

Meeting the new regulatory requirements and preparing your business for the challenges ahead To be used in top-left placement ALIGN WITH LEFT SIDE OF TYPE AREA OR MASTHEAD June 28-29, 2011, Singapore To be used in bottom-left Regulation placement Stress testing Oprisk thresholds Basel III ALIGN

More information

Fostering Incident Response and Digital Forensics Research

Fostering Incident Response and Digital Forensics Research Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

2015 CRCP Week II: Capstone

2015 CRCP Week II: Capstone 2015 CRCP Week II: Capstone Session Descriptions and Certified Regulatory and Compliance Professional (CRCP ) Program November 8-13, 2015 Session Agenda Day 1 Sunday 4: p.m. 6: p.m. Registration and Reception

More information

8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT. 17 th - 18 th June 2014 Swissotel Sydney CBD

8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT. 17 th - 18 th June 2014 Swissotel Sydney CBD 8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 th - 18 th June 2014 Swissotel Sydney CBD PLATINUM SPONSOR GOLD SPONSORS BRONZE SPONSOR ABOUT THE EVENT Lawyers are going to find them selves empowered

More information

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015 Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine

More information

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) Page 1 of 5 Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Conveys an in-depth

More information

Data Management Session: Privacy, the Cloud and Data Breaches

Data Management Session: Privacy, the Cloud and Data Breaches Data Management Session: Privacy, the Cloud and Data Breaches Annelies Moens Head of Sales and Operations, IIS President, iappanz IACCM APAC Australia Sydney, 1 August 2012 Overview Changing privacy regulation

More information

Navigating to tomorrow: serving clients and creating value Global Private Banking and Wealth Management Report 2013

Navigating to tomorrow: serving clients and creating value Global Private Banking and Wealth Management Report 2013 www.pwchk.com Navigating to tomorrow: serving clients and creating value Global Private Banking and Wealth Management Report 2013 Hong Kong Launch 6 September 2013 A unique vantage point on private banking

More information

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014 Aalborg Universitet Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication

More information

Cross-Border EDiscovery

Cross-Border EDiscovery Cross-Border EDiscovery Machine translation use cases Given the increasing rate of globalization and risk of regulatory action, the likelihood that organizations will have to contend with cross-border

More information

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise Udyen Jain & Associates Quality and expertise that you deserve OCA, Organisation Conseil Audit Your vision, our expertise Mikaël Ouaniche Mikaël Ouaniche is a Chartered Accountant and Legal Auditor, Graduate

More information

Deloitte Forensic Fraud Risk Management

Deloitte Forensic Fraud Risk Management Deloitte Forensic Fraud Risk Management Introduction Organizations cannot afford to be unconcerned about the risk of fraud. Directors and management have a fiduciary obligation and a corporate responsibility

More information

The compliance challenge

The compliance challenge THE FUTURE OF COMPLIANCE A 2 DAY WORKSHOP Firms need to adapt to a new regulatory framework while dealing simultaneously with a vast range of other national and international regulatory reforms. Introduction

More information

The proposed Fourth Money Laundering Directive

The proposed Fourth Money Laundering Directive The proposed Fourth Money Laundering Directive What the proposed Directive means and how to keep your business safe USING IDENTITY INTELLIGENTLY Money Laundering Directive What the proposed Directive means

More information

INTERNATIONAL CONFERENCE ON ELECTRONIC LITIGATION 11 August 2011. Welcome Address of the Honourable Justice Lee Seiu Kin

INTERNATIONAL CONFERENCE ON ELECTRONIC LITIGATION 11 August 2011. Welcome Address of the Honourable Justice Lee Seiu Kin INTERNATIONAL CONFERENCE ON ELECTRONIC LITIGATION 11 August 2011 Welcome Address of the Honourable Justice Lee Seiu Kin Chief Justice Chan Sek Keong, Lord Justice Rupert Jackson, Chief Justices and Fellow

More information

Navigate the regulatory maze

Navigate the regulatory maze www.pwc.com.cy Navigate the regulatory maze Delivering Regulatory Compliance services to the Financial Services industry September 2014 As at July 2014 there were more than 40 licensed banking institutions

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information

Business Continuity & Resilience Conference

Business Continuity & Resilience Conference Business Continuity & Resilience Conference Venue: Date: The City, London (TBC) 9 September 2014 Building capacity for resilient growth and development Speakers include: Andrew Gracie Executive Director

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

Security in the Cloud an end to end Problem

Security in the Cloud an end to end Problem ID WORLD Abu Dhabi 18-19 March 2012 Cloud Computing & Mobile Applications Dr. Andrew Jones Programme Chair for Information Security Khalifa University of Science, Technology and Research, Abu Dhabi Security

More information

The 4 th Annual Commercial Litigation Conference

The 4 th Annual Commercial Litigation Conference LexisNexis Conference Series The 4 th Annual Commercial Litigation Conference Recent Developments and Best Practices for the Legal and Accounting Professions Thursday, April 3, 2008 The Grand Hotel Toronto,

More information

Perspectives on Cybersecurity and Its Legal Implications

Perspectives on Cybersecurity and Its Legal Implications Survey Results 2015 Perspectives on Cybersecurity and Its Legal Implications a 2015 survey of corporate executives The National Institute of Standards and Technology (NIST), a non-regulatory agency of

More information

Targeting the problem together

Targeting the problem together 18 October, Marriott Grosvenor Square, London postevents.co.uk/fraud Targeting the problem together Associate Sponsor Media Partner Fraud 2012 has been accredited by the CII and can be included as part

More information

Internal Audit Landscape 2014

Internal Audit Landscape 2014 Internal Audit Landscape 2014 Agenda Examining the evolution of risk in today s digital world and the impact on traditional audit, security, risk, and compliance functions Emerging internal audit methodologies

More information

STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES WHISTLEBLOWING AFTER DODD-FRANK: A NEW WORLD

STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES WHISTLEBLOWING AFTER DODD-FRANK: A NEW WORLD STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES WHISTLEBLOWING AFTER DODD-FRANK: A NEW WORLD The Dodd-Frank Wall Street Reform and Consumer Protection Act created incentives for whistleblowers to report

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION April 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:

More information

CYBER SECURITY - CYBER RISK MANAGEMENT AND MITIGATION. Scott Thiel, Partner June 2015

CYBER SECURITY - CYBER RISK MANAGEMENT AND MITIGATION. Scott Thiel, Partner June 2015 CYBER SECURITY - CYBER RISK MANAGEMENT AND MITIGATIN Scott Thiel, Partner June 2015 Agenda 1. Current threat environment 2. Regulatory frameworks of countries in the Asia Pacific region 3. Key challenges

More information

DLA Piper Women s General Counsel Summit September 30, 2014 CLE Written Materials

DLA Piper Women s General Counsel Summit September 30, 2014 CLE Written Materials DLA Piper Women s General Counsel Summit September 30, 2014 CLE Written Materials Moderator Elizabeth Bohannon, Vice President & Associate General Counsel, Williams Sonoma, Inc. Panelists Allyson Bouldon,

More information

Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations. WMACCA September 16, 2014

Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations. WMACCA September 16, 2014 Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations WMACCA September 16, 2014 Panel Moderator: Mary Ellen Callahan of Jenner & Block; (Former Chief

More information

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 A Wake-Up Call? Fight Back Against Cybercrime Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 1 Coalfire Background Leading Information Security Consulting Firm Offices: Atlanta,

More information

Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m.

Corporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m. The Healthcare Financial Management Association of Northeastern New York is pleased to present the following education session: Event Forum: Where: When: Corporate Compliance Programs - Industry Best Practices

More information

Data Privacy and Cybersecurity Task Force

Data Privacy and Cybersecurity Task Force Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,

More information

Privacy, the Cloud and Data Breaches

Privacy, the Cloud and Data Breaches Privacy, the Cloud and Data Breaches Annelies Moens Head of Sales and Operations, Information Integrity Solutions Legalwise Seminars Sydney, 20 March 2013 About IIS Building trust and privacy through global

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

A Best Practice Guide

A Best Practice Guide A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals

More information

ABUSE OF PAYMENT SYSTEMS IN FRAUD, MONEY LAUNDERING, AND OTHER FINANCIAL CRIMES

ABUSE OF PAYMENT SYSTEMS IN FRAUD, MONEY LAUNDERING, AND OTHER FINANCIAL CRIMES ABUSE OF PAYMENT SYSTEMS IN FRAUD, MONEY LAUNDERING, AND OTHER FINANCIAL CRIMES Financial criminals continue to abuse different payment systems by committing fraud, money laundering, and other crimes.

More information

STRATEGIES FOR KEEPING A WHISTLEBLOWER IN-HOUSE. By Susan Goetz Markel

STRATEGIES FOR KEEPING A WHISTLEBLOWER IN-HOUSE. By Susan Goetz Markel STRATEGIES FOR KEEPING A WHISTLEBLOWER IN-HOUSE By Susan Goetz Markel In 2012, the Securities and Exchange Commission issued its first whistleblower award under the new program ushered in by the Dodd-Frank

More information

Roadmap for new Cyber security education in ME

Roadmap for new Cyber security education in ME Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the

More information

KNOW YOUR THIRD PARTY

KNOW YOUR THIRD PARTY Thomson Reuters KNOW YOUR THIRD PARTY EXECUTIVE SUMMARY The drive to improve profitability and streamline operations motivates many organizations to collaborate with other businesses, increase outsourcing

More information

Cyber Security & Managing KYC Data

Cyber Security & Managing KYC Data SPECIAL REPORT Cyber Security & Managing KYC Data The views and opinions expressed in this paper are those of the author(s) and do not necessarily reflect the official policy or position of Thomson Reuters.

More information

CORPORATIONS TAKE CONTROL OF E-DISCOVERY

CORPORATIONS TAKE CONTROL OF E-DISCOVERY Whitepaper CORPORATIONS TAKE CONTROL OF E-DISCOVERY Chris Dale edisclosure Information Project What Does Your In-House E-Discovery Look Like? 53% indicate a GROWING CASE LOAD 55 % review MORE THAN HALF

More information

SCMP / HKUST NYU Stern: Global Finance Seminar Series Enrollment Form

SCMP / HKUST NYU Stern: Global Finance Seminar Series Enrollment Form SCMP / HKUST NYU Stern: Global Finance Seminar Series Enrollment Form Date: June 8, 2012 (Friday) Venue: HKUST Business School Central Time: 7:00-9:00pm Admission Fee: HK$500 per delegate Please E-MAIL

More information

INTEGRITY DUE DILIGENCE GUIDELINES FOR LENDING TRANSACTIONS

INTEGRITY DUE DILIGENCE GUIDELINES FOR LENDING TRANSACTIONS INTEGRITY DUE DILIGENCE GUIDELINES FOR LENDING TRANSACTIONS Introduction The Bank's mandate is to promote sustainable growth of its member countries by providing longterm financing to projects that strengthen

More information

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015 Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas

More information

Compliance Management System 3.0

Compliance Management System 3.0 Klöckner & Co SE A Leading Multi Metal Distributor Corporate Compliance Office Release: October 2013 Agenda 01 02 Compliance Organisation 03 Reporting Line 2 01 Definition of Compliance The meaning of

More information

Cybersecurity as a Risk Factor in doing business

Cybersecurity as a Risk Factor in doing business Cybersecurity as a Risk Factor in doing business 1 Data is the new raw material of business Economist UK, 2013. In trying to defend everything he defended nothing Frederick the Great, Prussia 1712-86.

More information

The Legal Pitfalls of Failing to Develop Secure Cloud Services

The Legal Pitfalls of Failing to Develop Secure Cloud Services SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global

More information

President's Summary of Outcomes from the Experts Meeting on Corruption

President's Summary of Outcomes from the Experts Meeting on Corruption President's Summary of Outcomes from the Experts Meeting on Corruption 12 October 2013 The Financial Action Task Force (FATF) and the G20 Anti-Corruption Working Group jointly convened an Experts Meeting

More information

Defending Against Cyber Security Threats to the Payment and Banking Systems

Defending Against Cyber Security Threats to the Payment and Banking Systems NYU Leonard N. Stern School of Business Master of Science Risk Management RISK MANAGEMENT SYMPOSIUM 2015 Defending Against Cyber Security Threats to the Payment and Banking Systems Andrew Koh Class of

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Cyber security: Are consumer companies up to the challenge?

Cyber security: Are consumer companies up to the challenge? Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies

More information

M&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015

M&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015 M&A in 2015: Successor Liability Under the FCPA Norton Rose Fulbright US LLP Thursday, February 26, 2015 Speaker Marsha Z. Gerber Partner Norton Rose Fulbright US LLP Marsha Gerber is a partner in the

More information

The way we do business.

The way we do business. a b The way we do business. Our Code of Conduct and Ethics. Our Code of Conduct and Ethics In this Code, the Board of Directors and the Group Executive Board set out the principles and practices that define

More information

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA HANS HENRIK BERTHING Married with Louise and dad for Dagmar and Johannes CPA, CRISC, CGEIT, CISA and CIA ISO 9000 Lead Auditor Partner and owner for Verifica

More information

MyUniversity. Discover why over 18,000 Asset Management Executives use RCA Curricula and Member Services.

MyUniversity. Discover why over 18,000 Asset Management Executives use RCA Curricula and Member Services. Disclaimer PRACTICEDGE SERIES DELIVERED BY THE RCA, ITS ENDOWING ORGANIZATIONS AND AFFILIATE LAW SCHOOLS CONSTITUTE A PREVIEW OF A RESPECTIVE CLASS SESSION IN THE LAW & MASTERS CONCENTRATION OR MYUNIVERSITY.

More information

4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, 2015. Agenda

4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, 2015. Agenda Jim Reavis CEO, Cloud Security Alliance Agenda CSA History CloudCERT White House Legislative Announcements How is CSA addressing the issue of information sharing? Cloud CISC Pilot Demo Next Steps Questions?

More information

Deloitte Forensic Protecting your business in the Banking sector

Deloitte Forensic Protecting your business in the Banking sector Deloitte Forensic Protecting your business in the Banking sector For Private circulation only www.deloitte.com/in 2 Introduction Banks are facing an increasingly difficult scenario with increased fraud

More information

Treasury Department Proposes Anti-Money Laundering Regulations for Investment Advisers

Treasury Department Proposes Anti-Money Laundering Regulations for Investment Advisers CLIENT MEMORANDUM Treasury Department Proposes Anti-Money Laundering Regulations for Investment Advisers August 28, 2015 AUTHORS Benjamin J. Haskin Russell L. Smith Barbara Block On August 25, 2015, the

More information