Legal, Risk, Compliance, ediscovery, Financial Crime, Corporate Governance, Data Privacy
|
|
- Curtis Johns
- 8 years ago
- Views:
Transcription
1 Organizer Empress Room 3-5, Level 2 Legal, Risk, Compliance, ediscovery, Financial Crime, Corporate Governance, Data Privacy Format: Innoxcell Asia Symposium (IAS 2015) is a 1-day-conference focusing on variety of Legal, Regulatory, and Compliance, ediscovery, Litigation, and White Collar Crime topics. Path 1: White Collar Ethics & Corporate Legal Path 2: ediscovery, Data Breach, Investigation & Fraud Path 3: Regulatory Compliance for Financial Services The great diversity of Legal and Regulatory Compliance topics throughout the day encourages your team to attend sessions on different streams. Whether your objective is to learn the latest best legal and business practices, catch up with the latest regulatory updates,, establish networking with Asia s prominent professionals or simply to visit the legal technology and solutions exhibition, the IAS 2015 is definitely an event you cannot miss! Come and join us to explore your business opportunities at the Innoxcell Asia Symposium 2015 in Singapore! Who should attend? -- In-house Legal and Compliance Professionals -- CEO and CFO -- Head of Audit -- Internal Control Professional -- Audit Committee -- Company Secretary -- Corporate Risk Management Professionals -- Head Internal Investigation -- Corporate Computer Forensic Personnel -- IT Audit Professionals -- CIO, and COO -- Information Security Professionals -- Head of Technology Risk Title Sponsor Gold Sponsors Silver Sponsors Supporting Organizations Co-Host Media Partner To know more about this conference, please contact us at or us at Jeffrey.teh@innoxcell.net
2 Schedule-at-a Glance White Collar Ethics & Corporate Legal ediscovery, Data Breach, Investigation & Fraud Regulatory Compliance for Financial Services 08:30 09:00 Registration and Networking 09:00 09:50 Anti-Corruption Compliance (Part 1): International Anti-Corruption Compliance ediscovery Challenges: Internet of Things, Cloud and Mobile BYOD Anti-money Laundering (Part 1): KYC Threat - Transaction 09:50 10:00 Break 09:45 10:00 Break 09:45 10:00 Break 10:00 10:50 Anti-Corruption Compliance (Part 2): Designing a Winning Compliance Program Using TAR for Review of Investigation, Regulatory Responses and Discovery Requests Anti-money Laundering (Part 2) : Cross Border Risk Management 10:50 11:00 Break 10:45 11:00 Break 10:45 11:00 Break Internal Control and Data Analytics Technology Showcase: ONE SIZE FITS ALL Document Review (Myths or Facts?) Information Governance and Dark Data Management 11:45 12:00 Break Cross Border Data Flows and Cloud Computing Simulated Workshop: Cybersecurity Risk Oversight (for corporate IT professionals) Simulated Workshop: Cybersecurity Oversight for Financial Institutions Third Party Due Diligence and Case Studies Discussion 12:50 14:00 Asset misappropriation Investigation and Prevention plan Multi-Jurisdictional Investigations 14:45 15:00 Regulatory Compliance Enforcement & Management Malware & Botnets: Can Your Financial Service Companies Survive a Vicious Cyber Attack? 15:45 16:00 Grand Finale - Cross Border Data Breach Cases and Legal Complexity Cinematheque Experience: Popcorn and Margarita Grand Finale - Governance, Risk and Compliance
3 Full Agenda White Collar Ethics & Corporate Legal 09:00 09:50 Anti-Corruption Compliance (Part 1): International Anti-Corruption Compliance ediscovery, Data Breach, Investigation & Fraud ediscovery Challenges: Internet of Things, Cloud and Mobile BYOD Regulatory Compliance for Financial Services Anti-money Laundering (Part 1): KYC Threat - Transaction Examining multinational companies operating in developing countries and its local internal control regimes to avoid sanction, FCPA and UKBA violation. How to report, respond and react effectively internally to ensure your senior management are aware of corruption risks? What are the lessons that can be learnt from regional regulatory cases from the past 2 years? What is your current approach to anti-corruption compliance? Preventive measure and monitoring strategies for Asian companies can be very different compare to US or EU companies. What is best for my company? A Perspective on 21st Century Information Management How to manage corporate data in the 21st century workplace? Examine the risks and challenges of ediscovery in times where Internet of Things, Cloud and Mobile BYOD are increasingly popular Denny Husen, Senior Manager, Fraud Investigations & Dispute Services, EY Compliance with regulations concerning anti-money laundering, know-your-customer (KYC) and risk management imperatives has become a top priority for financial institutions as they struggle to anticipate and respond to known and emerging risks This session, the speakers will discuss how to use advanced analytic and information to manage AML risk. Frank Reppel, Managing Director, FICO TONBELLER Compliance Solutions, FICO Ghadeer Saed, Regional MLRO, Asia & EMAI, ANZ Neill Poole, Executive Director, AlixPartners Monica Puri, General Counsel, SE Asia, Jones Lang LaSalle Thiru Sethuraman, Director of Global Ethics and Compliance, Cummings Inc.. Andy Yeo, Partner, Allen & Gledhill LLP 09:50 10:00 Break 09:45 10:00 Break 09:45 10:00 Break 10:00 10:50 Anti-Corruption Compliance (Part 2): Designing a Winning Compliance Program Using TAR for Review of Investigation, Regulatory Responses and Discovery Requests Anti-money Laundering (Part 2) : Cross Border Risk Management Companies of all sizes must develop, implement, enforce and continually update their compliance programs. In this session, you will learn how to design a winning compliance program for your company. This session explores: How to engage your employees in the compliance programs? How to communicate policies effectively within the organization? How to draft a strategic plan for the compliance function to top management? How to effectively apply enterprise risk management to legal and regulatory compliance? Brent Carlson, Director, AlixPartners Judy Chang, Global Head Business Ethics & Compliance, PayPal Luca Probst, Regional Compliance and Ethics Manager, UPS Asia Pac Campbell Clark, General Counsel, Asia, Medtronic What exactly is Technology Assisted Review (TAR)? Discuss the defensibility and judicial acceptance of TAR Using TAR to increase the efficiency of review for investigations, regulatory responses and discovery requests Conor Crowley, ediscovery Counsel APAC, UBS AG Michael Lew, Director Singapore, Law in Order What are the AML risks embedded in cross border fund flows? How significant is it? To what extent are firms bounded by overseas regulations for cross border businesses? Discuss challenges to comply with cross border AML requirements for firms in Singapore and what should be the priorities? Marta Mihaly, MLRO, Eastspring Investments Erik Wilgenhof Plante, Chief Compliance Officer, itbit Pte 10:50 11:00 Break 10:45 11:00 Break 10:45 11:00 Break Internal Control and Data Analytics Within the legal, risk and compliance space, many companies have adopted the continuous monitoring and continuous auditing methods used to detect fraud and other risks within organization. Discuss the increasing role of legal department in enterprise risk management Examine reasons why traditional approaches to risk management are no longer effective Use of data analytics to help companies better understand the value and risks in their information assets Real-life examples of using analytics to detect emerging risks Benjamin Thong, Director, EY Suryanto Narmada, Head of Audit, Aviva Technology Showcase: ONE SIZE FITS ALL Document Review (Myths or Facts?) In the legal community, most people know that predictive coding and analysis technology, including disruptive technology, has the ability to dramatically reduce document review time and costs, as well as raise accuracy well beyond traditional linear review techniques. However, there is no such thing is ONE SIZE FITS ALL. This session, the speaker will showcase the understanding of which technology works best for which type of data and what information it needs to help direct its decision making about e- discovery tools. Anthony Ranansinghe, Manager, Business Development APAC, Kroll Ontrack Mari Ono, Case Manager APAC, Kroll Ontrack 11:45 12:00 Break Information Governance and Dark Data Management The amount of operational information both structured and unstructured that companies create and store are drastically increasing due to digitisation and mobility. Dark data management emerged as another challenge for corporate information governance. Under the increasing pressure from new regulatory regime and consumer expectation, corporate data must be well managed if companies wish to survive in today s information age. This session explores natures of corporate information legal risks in the context the Big Data and offers insights on information governance to transform data from a liability into an asset. Dr. Sonny Zulhuda, Assistant Professor and Cyber Law Course Coordinator, International Islamic University Malaysia White Collar Ethics & ediscovery, Data Breach, Regulatory Compliance for
4 Corporate Legal Investigation & Fraud Financial Services Cross Border Data Flows and Cloud Computing Simulated Workshop: Cybersecurity Risk Oversight (for corporate and non-banking professionals) Simulated Workshop: Cybersecurity Oversight for Financial Institutions The shift towards cloud has ushered in a whole new set of legal complexities that cannot be underestimated. It is important to understand the many benefits that come with cloud services including from a privacy and security standpoint. At the same time, lawyers need to understand and assess how and where information is collected, stored and used and the regulatory implications of data crossing borders. What are the risks associated with cloud services? What existing and emerging laws need to be considered, including in relation to cross-border data flows? What are the key questions every customer should be asking their cloud provider and what answers can you expect? Steven Howard, General Counsel APAC, Sony Mobile Communications John Galligan, Regional Director for Government Relations, Microsoft Asia Pacific & Japan In this session, you will: Discover the role management play in setting the right tone around protocol for cyber risk Learn the key questions senior executives should be asking themselves to prepare for a potential cyber breach. Obtain insights on how to collaborate with other companies, regulators and law enforcement to minimize vulnerabilities Learn what an effective incident response plan is and how to best secure core data. Jonathan Fairtlough, Managing Director, Cyber Security and Investigations Practice, Kroll Ajay Kumar Dhir, Group CIO & CHRO, Adhunik Group of Industries, India Kroll investigators who previously worked at international banks will guide attendees through a data breach scenario at a bank. In this session you will: Understand the potential access points for a data breach Identify the paralysis points that hold up Financial Institutions when responding to a data breach Understand and mitigate limitations of banking silos Some considerations when designing an incident response plan Recommendations to effectively secure core data Daniel Chong, Associate Managing Director, Cyber Security and Investigations Practice, Kroll Joseph Florendo, Managing Consultant, Cyber Security and Investigations Practice, Kroll Third Party Due Diligence and Case Studies Discussion The growing use of third parties has seen increased regulatory scrutiny of such practices, but are organisations keeping up with the latest developments and ensuring they act in an appropriate manner? Understanding the challenges faced, alongside the ever shifting regulatory boundaries, is crucial to getting this area of business right. This session will look at recent case studies, as well as some statistics based on recent reports, to underline where firms need to improve in their use of third parties, the due diligence processes involved, and the cost of getting it wrong. Sam Gibbins, General Manager (Asia), GRC Solutions 12:50 14:00 Asset misappropriation Investigation and Prevention plan Global statistics show that Companies lose 5% of their annual revenue to fraud. Asset misappropriation, one of the three categories of occupational fraud, is by far the most common. This session, the speaker will discuss about asset misappropriation and how you can mitigate the risk and respond to it. The speaker will also speak about her personal experience in investigating such frauds and preventive measures to address asset misappropriation. Stacy Chai, Director, Fraud Investigation & Dispute Services, EY 14:45 15:00 Exhibition and Networking Multi-Jurisdictional Investigations Planning for cross-border dispute resolution strategy and identifying key priorities Coordinating complex litigation and arbitration proceedings across multiple jurisdictions Common scenarios involving joint ventures, financial disputes and transnational projects Interplay between U.S., U.K., China, Hong Kong and various offshore jurisdictions Sidarth Khashu, Director, Fraud Investigation & Dispute Services, EY Wan Kwong Weng, Managing Director, Group General Counsel, Mapletree Investments Charles Ball, Partner, Reed Smith Stanley Park, Managing Director and Head of Legal Asia Pacific, Scotiabank Regulatory Compliance Enforcement & Management In this session, you will learn how to put in place processes to deal with formal requests and actions by financial regulators and law enforcement agency to deal with financial misconduct and market abuse. You will also learn how to strengthen the compliance culture and preventative aspects of mitigating against enforcement actions. Nizam Ismail, Advisory Board, RHT G.R.A.C.E. Robin Lee, Chief Executive Officer, RHT G.R.A.C.E. Malware & Botnets: Can Your Financial Service Companies Survive a Vicious Cyber Attack? Identification of cybercrime peculiar to financial service companies How organized cybercrime cause potential loss and risk to financial service companies How in-house cyber security professionals and management team may collaborate with outsourcing security companies and government agencies to combat cyber security Case studies of risk management to protect financial service companies from and combat cybercrime and cyber attack Value of Cloud in FSI for cybersecurity & data protection Kanny Lee, Executive Director, Forensic Technology and Disputes Services, EY Pierre Noel, Chief Security Officer, Asia, Microsoft Corporation Keshav Dhakad, Senior Attorney & Regional Director, Microsoft Digital Crimes Unit, Asia, Microsoft Corporation 15:45 16:00 Exhibition and Networking Grand Finale Cross Border Data Breach Cases and Legal Complexity Cinematheque Experience: Popcorn and Margarita This session, the facilitators will walk you through a movie segments that consist of cybercrime, data breach and investigation scenarios. Participants will be asked to spot any irregulars and criminal activities in the movies. Our facilitators will show case a series of problems as well as best practices corporation can use to prevent, detect, investigate and eliminate latest cyber crime activities This is a fun and interactive sessions to stimulate participants capable skills and ideas to fight white collar crime activities and comply with latest regulations while navigate legal complexity Darren Cerasi, Director, i-analysis Sannie Sng, Litigation and Investigation, UBS AG, Singapore Kyle Wombalt, Global Head Corporate Crime and Investigations, Herbert Smith Freehills Grand Finale Governance, Risk and Compliance What are the key industry pressures coming from regulators, both in Singapore and abroad? How has increased regulation affected KYC and on-boarding processes for financial services firms? How does changes in Outsourcing guidelines impact on financial services? How can compliance and legal best work in partnership to foster a good conduct risk? How is the changing nature or regulation impacting business objectives? Sam Gibbins, General Manager (Asia), GRC Solutions Daniel Furtwaengler, Head of Sales APAC, Signavio Delon Abrams, Assistant General Counsel, Regional Legal, Markets and Securities, Citi Maria van der Burgt, Regional Head of Global Compliance Assurance APAC, Barclays Compliance
5 REGISTRATION FORM Delegate Pricing Delegates with job titles listed on first page Law firms Solution and Service Providers SG$300 per day SG$700 per day SG$2,000 per day DELEGATE 1: DELEGATE 2: DELEGATE 3: Payment By Cheque: Please make cheque payable to InnoXcell Limited and post it to: Unit A, Level 10, Casey Building, 38 Lok Ku Road, Sheung Wan, HK By Credit Card: Please charge my AMEX / VISA / Mastercard No: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Amount HKD / USD Cardholder s Name of Cardholder: Expiry Date: / Sec. Code: Booking Terms & Conditions 1. Registrations are confirmed when we send a written Confirmation via or fax. If you have not received a booking confirmation prior to the commencement of the course, it is the delegate s responsibility to contact InnoXcell Limited to confirm their place. 2. Payment must be received, in full within 7 days of receiving the invoice. 3. InnoXcell Limited reserves the right to withhold entry to the conference if payment has not been received in full. 4. Cancellations must be received in writing. 30% of the conference fee will be charged if cancellation is received one month BEFORE the conference. 100% of the conference fee will be charged if cancellation is received WITHIN one month of the conference. 5. If you are unable to attend the conference, a substitute delegate is welcome at no extra charge. 6. No refunds will be given and no shows will also be charged in full. 7. The conditions are subject to change without prior notice. InnoXcell Limited Tel: Fax: enquiries@innoxcell.net Address: Unit A, Level 10, Casey Building, 38 Lok Ku Road, Sheung Wan, Hong Kong
DIGITAL FORENSICS. Cost-effective and Proactive Information Management for Emerging Legal and Technical Challenges
www.innoxcell.net e-discovery & DIGITAL FORENSICS Cost-effective and Proactive Information Management for Emerging Legal and Technical Challenges Event Highlight Pre-Arranged One-to-One Networking Meeting
More informationwww.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
More informationFraud, Corruption and Money Laundering: Prevention, Detection and Recovery
IN HOUSE Fraud, Corruption and Money Laundering: Prevention, Detection and Recovery An intensive 4-day programme covering the latest anti-fraud, anticorruption and anti-money laundering techniques including:
More informationFor Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services
For Private circulation only www.deloitte.com/in Creative. Clear. Focused. Forensic Services Do you conduct background checks on employees and vendors? Do you educate employees about the importance of
More informationIn Brief. Just the Facts
In Brief Just the Facts N ardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including the FCPA/UK Bribery Act and other corruption-related investigations,
More informationCorporate Compliance Australia. 5 Essential Elements of Compliance
Corporate Compliance Australia 5 Essential Elements of Compliance Today s multinational companies must contend with an ever-changing number of compliance requirements that seem to multiply daily. Australian
More informationProfessional Certificate in Ethics and Anti-Corruption Compliance
in partnership with Professional Certificate in Ethics and Anti-Corruption Compliance Maxwell Chambers, Singapore, November 18th & 19th 2015 Enhance & develop your understanding of Ethics & Compliance
More informationE-discovery and Legal Outsourcing New Trends and Services Offered in Litigation Support
E-discovery and Legal Outsourcing New Trends and Services Offered in Litigation Support www.connect-goal.com 28 Jan 2013 Speakers Michael Lew Director & Head - Digital Forensics Chio Lim Stone Forest Singapore
More informatione-discovery Exchange Platform
e-discovery Exchange Platform Yeong Zee Kin Senior Assistant Registrar Supreme Court of Singapore Chris Dale Founder & Consultant the e-disclosure Information Project Richard Kershaw Asia Managing Director
More informationBloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs
Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs *This is a sample course catalog. BBNA is in the process of moving all of our recorded content on to our new platform. Not all
More informationMASTER OF JURISPRUDENCE AND GRADUATE CERTIFICATE PROGRAMS COURSE DESCRIPTIONS
MASTER OF JURISPRUDENCE AND GRADUATE CERTIFICATE PROGRAMS COURSE DESCRIPTIONS MJ 726: AGENCY REGULATIONS Elective (2 credit hours) This course studies the law governing administrative agencies in the task
More information3 4 SEPTEMBER 2012 TAN SRI ABDUL KADIR YUSOF HALL ATTORNEY GENERAL S CHAMBERS LEVEL 3, NO. 45, LOT 4G7 PERSIARAN PERDANA, PRECINT 4 PUTRAJAYA
Providing the participants with the legal knowledge and information necessary to develop and implement programmes that will effectively prevent catastrophic losses brought on by recalls and product liability
More informationThe Importance of Privacy & Data Security in a Changing World
Cyber, PrivaCy & Data SeCurity 360 www.mpplaw.com about our PraCtiCe Data is the lifeblood of our global economy. Collected, stored and transmitted, digital data not only imparts great opportunities, but
More informationLaw Firm Cyber Risk Conference: Addressing the Issues from the Top Down
Program Organizer: Please join us for a NEW Invitation Only Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Role of Firm Leadership, IT, COO, General Counsel Data Breaches Identification
More informationAnti-Money Laundering controls in Mergers & Acquisitions
White Paper Anti-Money Laundering controls in Mergers & Acquisitions June 2014 Anti-Money Laundering controls in Mergers & Acquisitions Authors: Ana L. Pereira and Ana Maria H. de Alba Caveat emptor let
More informationGlobal Forum 2014. Tokyo EVENT REPORT
Baker & McKenzie Global Forum 2014 Personal Data Protection: Global personal data risk and management - Trends and perspectives from Asia, Europe, and the US EVENT REPORT Global Forum 2014 MARCH 2014 TOKYO
More informationTHOMSON REUTERS ACCELUS
THOMSON REUTERS ACCELUS ACCELUS Screening Resolution Service Executive Summary Thomson Reuters Accelus offers Screening Resolution Service (SRS): an outsourced screening service for Corporates and Financial
More informationHow to Deal with Troublemakers in Your Company
HK Law Society CPD course *Applying for accreditation is in progress. Professional Information for You How to Deal with Troublemakers in Your Company Hong Kong Friday, 14 September 2012 2:00pm - 5:30pm
More informationGlobal EY FIDS Forensic Data Analytics Survey 2014
Global EY FIDS Forensic Data Analytics Survey 2014 Big risks require big data thinking The Eighth International Pharmaceutical Compliance Congress Dubai, United Arab Emirates Vincent Walden Partner, EY
More informationINFORMATION GOVERNANCE AND EDISCOVERY SUMMIT
INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 TH - 18 TH JUNE 2014 SWISSOTEL SYDNEY CBD PLATINUM SPONSOR GOLD SPONSOR SILVER SPONSOR BRONZE SPONSOR SUPPORTING ORGANISATION SUPPORTING ASSOCIATION ABOUT
More informationGovernance, Risk & Compliance Management. Julian Hunn, Operations Manager Professional Standards
Governance, Risk & Compliance Management Julian Hunn, Operations Manager Professional Standards Session Plan GRC Governance, Risk & Compliance Management What is corporate governance? Directors duties
More informationOUTSOURCING REGULATIONS IN THE BANKING AND INSURANCE INDUSTRIES IN ASIA PACIFIC
OUTSOURCING REGULATIONS IN THE BANKING AND INSURANCE INDUSTRIES IN ASIA PACIFIC Bridging Borders Webinar Series 1 Welcome Welcome You are on mute A link to a recording of the webinar will be available
More informationForeign Corrupt Practices Act (FCPA)
Foreign Corrupt Practices Act (FCPA) FCPA Practice Team John J. Carney, Partner John J. Carney, a former Securities Fraud Chief, Assistant United States Attorney, U.S. Securities and Exchange Commission
More informationVolcker Rule Breakfast Briefing
Volcker Rule Breakfast Briefing Venue: Date: Pinners Hall, 105-108 Old Broad Street, London, EC2N IEX 7 April 2014 Volcker and cross-border bank resolution Speakers include: Barnabas Reynolds Head of the
More informationForensic Services. kpmg.hu
Forensic Services kpmg.hu We help you curb your losses. Our forensic team provides services designed to assist you in matters of a commercial or financial nature that may result in a legal or regulatory
More informationContinuing Legal Education Program Course Catalog
Continuing Legal Education Program Course Catalog The Continuing Legal Education CLE program was created to provide quality continuing education to our colleagues and clients in the legal and corporate
More informationEnhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use
Enhancing Safeguards Through Information Analysis: Business Analytics Tools IAEA, Vienna, 09/10/2014 Julian Midwinter - Business Unit Executive i2, Threat and Counter Fraud General Use 2014 IBM Corporation
More informationOctober 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
More informationCyber Risk and Insurance What companies need to know
Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the
More informationA FORUM FOR DEBATE, A CATALYST FOR CHANGE
7 March 2013 Renaissance Hong Kong Harbour View Hotel Hong Kong A FORUM FOR DEBATE, A CATALYST FOR CHANGE 2013 conference highlights: The impact of the increasing frequency and severity of natural catastrophes
More informationGLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS
GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS THE TEAM William Beer São Paulo William Beer brings over 25 years of diverse international consulting experience advising on and managing
More information2012 ACFE Asia-Pacific Fraud Conference. Fraud is a global problem. Be a part of the solution. KEYNOTE SPEAKERS. 4-6 November 2012 Hong Kong
Fraud is a global problem. Be a part of the solution. 2012 ACFE Asia-Pacific Fraud Conference 4-6 November 2012 Hong Kong KEYNOTE SPEAKERS Kevin Zervos, SC Director of Public Prosecutions, Hong Kong Department
More informationASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
More informationData Protection HEADLINE PART Developments: Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance
Data Protection HEADLINE PART Developments: 1 Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance Sub-headline Arial 18pt dark gray Optional Name Arial 13pt italic white Venue
More informationCorporations Take Control of E-Discovery
Guidance Software Whitepaper Corporations Take Control of E-Discovery Chris Dale edisclosure Information Project What Does Your In-House E-Discovery Look Like? 53% indicate a GROWING CASE LOAD 55 % review
More informationCyber crime risk management protecting your business 4 November 2015
Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC
More informationVENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
More informationediscovery2015 www.latouchetraining.ie info@latouchetraining.ie 01 8788 255 Earn up to 7 CPD Hours
ediscovery2015 Be the first to learn how best practice applied to your discovery project will reduce your workload, time and expense. 2nd Annual La Touche Training ediscovery Conference Friday 13 November
More informationC L A R I D E N 18 19 June 2014
C L A R I D E N 18 19 June 2014 Knowledge for the world business leaders Shangri-La Hotel Kuala Lumpur, Malaysia Handling Employment Disputes, Termination and Dismissal in Malaysia Faculty Director Trevor
More informatione-discovery Exchange Platform
e-discovery Exchange Platform Yeong Zee Kin Senior Assistant Registrar Supreme Court of Singapore Chris Dale Founder & Consultant the e-disclosure Information Project Richard Kershaw Asia Managing Director
More informationOgier Legal Services. ogier.com. An introduction to working with us
An introduction to working with us British Virgin Islands Cayman Islands Guernsey Hong Kong Jersey Luxembourg Shanghai Tokyo An introduction to Ogier provides legal advice on BVI, Cayman, Guernsey, Jersey
More informationMeeting the new regulatory requirements and preparing your business for the challenges ahead
To be used in top-left placement ALIGN WITH LEFT SIDE OF TYPE AREA OR MASTHEAD June 28-29, 2011, Singapore To be used in bottom-left Regulation placement Stress testing Oprisk thresholds Basel III ALIGN
More informationFostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
More informationThe Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
More information2015 CRCP Week II: Capstone
2015 CRCP Week II: Capstone Session Descriptions and Certified Regulatory and Compliance Professional (CRCP ) Program November 8-13, 2015 Session Agenda Day 1 Sunday 4: p.m. 6: p.m. Registration and Reception
More information8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT. 17 th - 18 th June 2014 Swissotel Sydney CBD
8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 th - 18 th June 2014 Swissotel Sydney CBD PLATINUM SPONSOR GOLD SPONSORS BRONZE SPONSOR ABOUT THE EVENT Lawyers are going to find them selves empowered
More informationMaritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015
Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine
More informationCourse Content Summary ITN 267 Legal Topics in Network Security (3 Credits)
Page 1 of 5 Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Conveys an in-depth
More informationData Management Session: Privacy, the Cloud and Data Breaches
Data Management Session: Privacy, the Cloud and Data Breaches Annelies Moens Head of Sales and Operations, IIS President, iappanz IACCM APAC Australia Sydney, 1 August 2012 Overview Changing privacy regulation
More informationNavigating to tomorrow: serving clients and creating value Global Private Banking and Wealth Management Report 2013
www.pwchk.com Navigating to tomorrow: serving clients and creating value Global Private Banking and Wealth Management Report 2013 Hong Kong Launch 6 September 2013 A unique vantage point on private banking
More informationAalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014
Aalborg Universitet Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication
More informationCross-Border EDiscovery
Cross-Border EDiscovery Machine translation use cases Given the increasing rate of globalization and risk of regulatory action, the likelihood that organizations will have to contend with cross-border
More informationUdyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise
Udyen Jain & Associates Quality and expertise that you deserve OCA, Organisation Conseil Audit Your vision, our expertise Mikaël Ouaniche Mikaël Ouaniche is a Chartered Accountant and Legal Auditor, Graduate
More informationDeloitte Forensic Fraud Risk Management
Deloitte Forensic Fraud Risk Management Introduction Organizations cannot afford to be unconcerned about the risk of fraud. Directors and management have a fiduciary obligation and a corporate responsibility
More informationThe compliance challenge
THE FUTURE OF COMPLIANCE A 2 DAY WORKSHOP Firms need to adapt to a new regulatory framework while dealing simultaneously with a vast range of other national and international regulatory reforms. Introduction
More informationThe proposed Fourth Money Laundering Directive
The proposed Fourth Money Laundering Directive What the proposed Directive means and how to keep your business safe USING IDENTITY INTELLIGENTLY Money Laundering Directive What the proposed Directive means
More informationINTERNATIONAL CONFERENCE ON ELECTRONIC LITIGATION 11 August 2011. Welcome Address of the Honourable Justice Lee Seiu Kin
INTERNATIONAL CONFERENCE ON ELECTRONIC LITIGATION 11 August 2011 Welcome Address of the Honourable Justice Lee Seiu Kin Chief Justice Chan Sek Keong, Lord Justice Rupert Jackson, Chief Justices and Fellow
More informationNavigate the regulatory maze
www.pwc.com.cy Navigate the regulatory maze Delivering Regulatory Compliance services to the Financial Services industry September 2014 As at July 2014 there were more than 40 licensed banking institutions
More informationThe Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
More informationBusiness Continuity & Resilience Conference
Business Continuity & Resilience Conference Venue: Date: The City, London (TBC) 9 September 2014 Building capacity for resilient growth and development Speakers include: Andrew Gracie Executive Director
More informationAddressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
More informationSecurity in the Cloud an end to end Problem
ID WORLD Abu Dhabi 18-19 March 2012 Cloud Computing & Mobile Applications Dr. Andrew Jones Programme Chair for Information Security Khalifa University of Science, Technology and Research, Abu Dhabi Security
More informationThe 4 th Annual Commercial Litigation Conference
LexisNexis Conference Series The 4 th Annual Commercial Litigation Conference Recent Developments and Best Practices for the Legal and Accounting Professions Thursday, April 3, 2008 The Grand Hotel Toronto,
More informationPerspectives on Cybersecurity and Its Legal Implications
Survey Results 2015 Perspectives on Cybersecurity and Its Legal Implications a 2015 survey of corporate executives The National Institute of Standards and Technology (NIST), a non-regulatory agency of
More informationTargeting the problem together
18 October, Marriott Grosvenor Square, London postevents.co.uk/fraud Targeting the problem together Associate Sponsor Media Partner Fraud 2012 has been accredited by the CII and can be included as part
More informationInternal Audit Landscape 2014
Internal Audit Landscape 2014 Agenda Examining the evolution of risk in today s digital world and the impact on traditional audit, security, risk, and compliance functions Emerging internal audit methodologies
More informationSTAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES WHISTLEBLOWING AFTER DODD-FRANK: A NEW WORLD
STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES WHISTLEBLOWING AFTER DODD-FRANK: A NEW WORLD The Dodd-Frank Wall Street Reform and Consumer Protection Act created incentives for whistleblowers to report
More information2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION
2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION April 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:
More informationCYBER SECURITY - CYBER RISK MANAGEMENT AND MITIGATION. Scott Thiel, Partner June 2015
CYBER SECURITY - CYBER RISK MANAGEMENT AND MITIGATIN Scott Thiel, Partner June 2015 Agenda 1. Current threat environment 2. Regulatory frameworks of countries in the Asia Pacific region 3. Key challenges
More informationDLA Piper Women s General Counsel Summit September 30, 2014 CLE Written Materials
DLA Piper Women s General Counsel Summit September 30, 2014 CLE Written Materials Moderator Elizabeth Bohannon, Vice President & Associate General Counsel, Williams Sonoma, Inc. Panelists Allyson Bouldon,
More informationIntegrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations. WMACCA September 16, 2014
Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations WMACCA September 16, 2014 Panel Moderator: Mary Ellen Callahan of Jenner & Block; (Former Chief
More informationA Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014
A Wake-Up Call? Fight Back Against Cybercrime Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 1 Coalfire Background Leading Information Security Consulting Firm Offices: Atlanta,
More informationCorporate Compliance Programs - Industry Best Practices. November 18, 2010 (Thursday) 8:00 a.m. to 12:00p.m.
The Healthcare Financial Management Association of Northeastern New York is pleased to present the following education session: Event Forum: Where: When: Corporate Compliance Programs - Industry Best Practices
More informationData Privacy and Cybersecurity Task Force
Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,
More informationPrivacy, the Cloud and Data Breaches
Privacy, the Cloud and Data Breaches Annelies Moens Head of Sales and Operations, Information Integrity Solutions Legalwise Seminars Sydney, 20 March 2013 About IIS Building trust and privacy through global
More informationTHE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
More informationA Best Practice Guide
A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals
More informationABUSE OF PAYMENT SYSTEMS IN FRAUD, MONEY LAUNDERING, AND OTHER FINANCIAL CRIMES
ABUSE OF PAYMENT SYSTEMS IN FRAUD, MONEY LAUNDERING, AND OTHER FINANCIAL CRIMES Financial criminals continue to abuse different payment systems by committing fraud, money laundering, and other crimes.
More informationSTRATEGIES FOR KEEPING A WHISTLEBLOWER IN-HOUSE. By Susan Goetz Markel
STRATEGIES FOR KEEPING A WHISTLEBLOWER IN-HOUSE By Susan Goetz Markel In 2012, the Securities and Exchange Commission issued its first whistleblower award under the new program ushered in by the Dodd-Frank
More informationRoadmap for new Cyber security education in ME
Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the
More informationKNOW YOUR THIRD PARTY
Thomson Reuters KNOW YOUR THIRD PARTY EXECUTIVE SUMMARY The drive to improve profitability and streamline operations motivates many organizations to collaborate with other businesses, increase outsourcing
More informationCyber Security & Managing KYC Data
SPECIAL REPORT Cyber Security & Managing KYC Data The views and opinions expressed in this paper are those of the author(s) and do not necessarily reflect the official policy or position of Thomson Reuters.
More informationCORPORATIONS TAKE CONTROL OF E-DISCOVERY
Whitepaper CORPORATIONS TAKE CONTROL OF E-DISCOVERY Chris Dale edisclosure Information Project What Does Your In-House E-Discovery Look Like? 53% indicate a GROWING CASE LOAD 55 % review MORE THAN HALF
More informationSCMP / HKUST NYU Stern: Global Finance Seminar Series Enrollment Form
SCMP / HKUST NYU Stern: Global Finance Seminar Series Enrollment Form Date: June 8, 2012 (Friday) Venue: HKUST Business School Central Time: 7:00-9:00pm Admission Fee: HK$500 per delegate Please E-MAIL
More informationINTEGRITY DUE DILIGENCE GUIDELINES FOR LENDING TRANSACTIONS
INTEGRITY DUE DILIGENCE GUIDELINES FOR LENDING TRANSACTIONS Introduction The Bank's mandate is to promote sustainable growth of its member countries by providing longterm financing to projects that strengthen
More informationCybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
More informationCompliance Management System 3.0
Klöckner & Co SE A Leading Multi Metal Distributor Corporate Compliance Office Release: October 2013 Agenda 01 02 Compliance Organisation 03 Reporting Line 2 01 Definition of Compliance The meaning of
More informationCybersecurity as a Risk Factor in doing business
Cybersecurity as a Risk Factor in doing business 1 Data is the new raw material of business Economist UK, 2013. In trying to defend everything he defended nothing Frederick the Great, Prussia 1712-86.
More informationThe Legal Pitfalls of Failing to Develop Secure Cloud Services
SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global
More informationPresident's Summary of Outcomes from the Experts Meeting on Corruption
President's Summary of Outcomes from the Experts Meeting on Corruption 12 October 2013 The Financial Action Task Force (FATF) and the G20 Anti-Corruption Working Group jointly convened an Experts Meeting
More informationDefending Against Cyber Security Threats to the Payment and Banking Systems
NYU Leonard N. Stern School of Business Master of Science Risk Management RISK MANAGEMENT SYMPOSIUM 2015 Defending Against Cyber Security Threats to the Payment and Banking Systems Andrew Koh Class of
More informationCYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
More informationCyber security: Are consumer companies up to the challenge?
Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies
More informationM&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015
M&A in 2015: Successor Liability Under the FCPA Norton Rose Fulbright US LLP Thursday, February 26, 2015 Speaker Marsha Z. Gerber Partner Norton Rose Fulbright US LLP Marsha Gerber is a partner in the
More informationThe way we do business.
a b The way we do business. Our Code of Conduct and Ethics. Our Code of Conduct and Ethics In this Code, the Board of Directors and the Group Executive Board set out the principles and practices that define
More informationHans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA
Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA HANS HENRIK BERTHING Married with Louise and dad for Dagmar and Johannes CPA, CRISC, CGEIT, CISA and CIA ISO 9000 Lead Auditor Partner and owner for Verifica
More informationMyUniversity. Discover why over 18,000 Asset Management Executives use RCA Curricula and Member Services.
Disclaimer PRACTICEDGE SERIES DELIVERED BY THE RCA, ITS ENDOWING ORGANIZATIONS AND AFFILIATE LAW SCHOOLS CONSTITUTE A PREVIEW OF A RESPECTIVE CLASS SESSION IN THE LAW & MASTERS CONCENTRATION OR MYUNIVERSITY.
More information4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, 2015. Agenda
Jim Reavis CEO, Cloud Security Alliance Agenda CSA History CloudCERT White House Legislative Announcements How is CSA addressing the issue of information sharing? Cloud CISC Pilot Demo Next Steps Questions?
More informationDeloitte Forensic Protecting your business in the Banking sector
Deloitte Forensic Protecting your business in the Banking sector For Private circulation only www.deloitte.com/in 2 Introduction Banks are facing an increasingly difficult scenario with increased fraud
More informationTreasury Department Proposes Anti-Money Laundering Regulations for Investment Advisers
CLIENT MEMORANDUM Treasury Department Proposes Anti-Money Laundering Regulations for Investment Advisers August 28, 2015 AUTHORS Benjamin J. Haskin Russell L. Smith Barbara Block On August 25, 2015, the
More information