Register today for these complimentary Enterprise Risk Management Webinars.

Current Updates on 2012 Regulatory Compliance Requirements for Financial Institutions
May 30, 2012
2:00pm -3:00pm (EASTERN)
This complimentary Webinar provides financial institutions with a comprehensive review of NEW and UPDATED financial and data privacy compliance regulations. It offers your organization an efficient source to get an all inclusive perspective on some of the most pressing compliance requirements you are facing today. We will also discuss how regulatory compliance fits into your Enterprise Risk Management practices.
Pulling the Pieces Together
Wednesday, April 13, 2011
2:00 PM - 3:00 PM EST
Pulling together and integrating your organization's risk management efforts is essential to the success of your Enterprise Risk Management program. During this Webinar we will talk about the steps necessary for an effective top-down risk management approach and the necessary elements for your integrated risk management program.
Applying Risk Assessment Activities to Business Processes
Wednesday, March 30, 2011
2:00 PM - 3:00 PM EST
A critical step for a financial institution in developing an Enterprise Risk Management Program is to effectively apply its risk assessment activities to its different business areas. During this Webinar we will use the lending business function as an example to demonstrate how to successfully implement your risk management program to a particular business process.
Identifying and Classifying Critical Data Risks
Wednesday, March 16, 2011
2:00 PM - 3:00 PM EST
Data risk management is the foundation of an effective Enterprise Risk Management program. Do you know what your data is critical to your institution? Do you know where this data is located and in what form (electronic, paper or physical) it resides? During this Webinar we will outline how financial institutions should go about identifying their critical data and establishing a means for classifying this data. We will share data protection best practices and identify specific technologies that can help manage your data risks. You will get an update on the most current regulatory compliance requirements and how they can impact your institution.
A Guide to IT Risk Assessment
Wednesday, March 2, 2011
2:00 PM - 3:00 PM EST
IT Risk Assessment is a critical area that every financial institution must address in their Enterprise Risk Management program and is the focus of this complimentary Webinar. We will delve into the details of what should be included in an IT Risk Assessment, the ideal timing to perform your assessment and who needs to be involved in the process. During this session we will also share effective audit techniques that can make a huge impact on your institution’s ability to maximize the benefits realized from your efforts.
Building an Enterprise Risk Management Program
Wednesday, February 16, 2011
2:00 PM - 3:00 PM EST
As financial institutions continue to encounter uncertain economic times and volatile market conditions, they also face heightened pressure from regulators to establish proactive risk management functions. However, the mere thought of having to build an Enterprise Risk Management program can be paralyzing. So where do you start? During this complimentary Webinar we will provide a practical guide on how you can identify your institution’s greatest areas of risk, assess its risk appetite and build a formal program with clearly defined risk management activities and functions.


Are Your Mobile Device and Social Media Programs Compliant?

Wednesday, December 7, 2011
2:00 PM - 3:00 PM (EASTERN)
Mobile device use continues to grow exponentially, accelerated by the corresponding explosion in social media. Have your compliance programs evolved to address these mediums? The impact of non-compliance can mean additional risks, stiff penalties, and damage to your reputation.

In the previous two webinars of this series we have learned that many firms are vulnerable to data privacy compliance infractions and risks in their Records Information Management (RIM) practices. During this complimentary Webinar, we will outline the critical components of implementing an effective and secure Mobile Device and Social Media Program.

Learning Objectives:

- Understanding the risks and liabilities of mobile devices and social media.
- Mitigating risks associated with data breaches.
- Mobile devices and social media best practices.
- ePolicy Health Check

Who should attend:

Managing Partners, Practice Directors, CFO's, CIOs, Compliance Officers, Corporate Counsel, Data Privacy Officers, Risk Management Directors, Information Security Directors and Records Managers

Building an Effective & Compliant Records Management Program

Wednesday, November 16, 2011
2:00 PM - 3:00 PM (EASTERN)
Many firms are vulnerable to data privacy compliance infractions in their Records Information Management (RIM) practices. The impact of non-compliance can mean stiff penalties and damage to your reputation. During this complimentary Webinar, we will outline the critical components of an effective RIM program. We will also discuss emerging trends in data privacy and security regulations and outline the current compliance requirements for your program.

Attendees will learn:

- Records Management Best Practices
- Mitigating Risks Associated with Data Breaches
- Auditing Techniques and Technologies that Overcome Common Hurdles
- RIM Data Privacy Compliance Checklist

Data Privacy Compliance-A Deep Dive Into Understanding the Requirements
Wednesday, November 2, 2011
2:00 PM - 3:00 PM (EASTERN)
Well publicized data breach incidents have placed greater regulatory compliance pressures on U.S. based companies. During this complimentary Webinar, we will take a detailed look at emerging trends in data privacy and security regulations and outline the current compliance requirements. We will also offer practical advice and effective strategies on developing and managing your data privacy protection programs.

Attendees will learn:

- Federal Privacy Requirements including GLBA, HIPPA, HITECH ACT, PCI, Red Flags
- State Data Privacy Regulatory Requirements
- Impact of Noncompliance
- Technologies that can help manage and monitor data privacy and security
- How to perform a "health check" of your incident response program