How to De£use the Fraud and Mone¥ Laundering Tim€ Bomb Ticking in Tran$lation

"History teaches us that when things go seriously wrong in the legal and financial world the effects can take Nations to the edge of the abyss and spell personal and economic disaster for citizens and organisations not protected. The scandals of sub-prime mortgages, Libor and Payment Protection Insurance (PPI) provide a sobering reminder of what happens when professionals don’t follow the rules. This presentation exposes a risk that is often unseen – translation.

In his presentation, David will:

• Discuss the factors that contributed to recent financial scandals;

• Ask why scandals such as PPI went undetected for so long despite being identified a decade earlier.

• Highlight the nature of threat society faces from financial crime; and the new tougher enforcement approach being adopted by regulators."
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Cybersecurity in a Changed World: 2021 Trends and 2022 Predictions

If 2020 seemed like an anomaly, 2021 proved to us that it’s time to get comfortable with the transformed reality. Remote work, intended as a temporary response to COVID-19, is now an increasingly standardized way to operate. With face-to-face operations no longer the norm, numerous organizations have shifted to a technology-driven strategy. We’ve seen a rise in initiatives like self-service or online purchases, as well as an upturn in remote events, with many new or established conferences choosing to go virtual. Businesses are also investing in technology more than ever, growing their IT infrastructure with new software and IoT devices. However, as can be expected, new or enhanced cybersecurity threats went hand and hand with this unexpected digital renaissance.
Watch Now

Industrial Cybersecurity: Is Your Facility Protected?

Just last year, cybercriminals attempted to poison the water supply in Florida by hacking into a city’s system. An airplane manufacturer’s confidential customer data files were breached and leaked on the Internet. A major gas pipeline was shut down by a ransomware attack. A major meat producer was forced to close down all its plants. Hackers are now targeting industrial and infrastructure. At the same time, more and more facilities are going to connected operations to empower new efficiencies. How do we keep our facilities protected amid these growing dangers and opportunities?
Watch Now

On Demand Utilizing Data to Eradicate Threats With Splunk & Zscaler

Modern zero trust requires the right architecture, analytics, dynamic policy, and risk visibility in order to reduce the attack surface, prevent lateral movement, and make real-time threat determinations with each transaction. Zscaler and Splunk tightly integrate best-of-breed cloud security and security analytics platforms to
Watch Now

Supply Chain Cybersecurity: How to Mitigate Third-Party Risks?

With supply chain transparency and digital transformation being among the top organizational priorities, cyber-related issues have become one of the top risks to businesses. Most companies don't consider their supply chain vulnerability when thinking about cybersecurity. Yet, supply chain risks could include multiple functions across the flow of information, products and services – needing the attention of all entities involved. Supply chain security is every company's responsibility.
Watch Now