Browse by Category

  • Date Asc
  • Date Desc
  • Name
  • Media Type
IT

26 item(s) found
Building Best Practices into Your Cyber Incident Response Program
  • Wednesday, August 21
  • Webinar
Gary Deutsch

Learn how to build best practices into your cyber incident response program.

Vendor Management: Assessing API Security Risks
  • Friday, August 30
  • Webinar
Gary Deutsch

Learn insight into the new and evolving API economy as well as methods to establish a risk assessment of vendors APIs to assist with your vendor management responsibilities. 

BSA/AML Automated Systems Validation: Validation Insights
  • On-demand
Kenneth Agle

Validate your BSA/AML Automated System, maximize its effectiveness, minimize the resources expended, and stay ahead of regulatory expectations.

Disaster Recovery and Business Resumption: Being Ready Is Not by Chance
  • On-demand
Kenneth Agle

Learn the foundational elements of a Disaster Recovery and Business Resumption Plan and what aspects should be developed by an organization,as well as the process of conducting “table top” exercises.

Website Compliance: The Science and Art
  • On-demand
Coppelia Padgett

A comprehensive, detailed overview of the compliance issues associated with websites and the need for addressing the science and art of regulatory compliance as it relates to websites as a tool

Mobile Banking Risk Assessment: Meeting the Risk and Compliance Challenges
  • On-demand
Kenneth Agle

A comprehensive, detailed overview of the mobile banking issues today and expected in the future as technology expands and how financial institutions can gain and present a sound understanding of associated risks aimed at meeting regulatory expectations

Improve Your Cybersecurity Response Program: Using Version 1.1 of the Cybersecurity Assessment Tool
  • On-demand
Gary Deutsch

A critical discussion of the regulator’s cybersecurity preparedness process included in Version 1.1 of the FFIEC’s CAT

Business Continuity Planning: Conducting a Risk Assessment
  • On-demand
Gary Deutsch

Learn how to assess the adequacy of your institution’s Business Continuity Plan to not only meet regulatory requirements, but also to address the realities of developing, implementing, and maintaining cost-effective Business Continuity Planning

Conducting a Risk-based Audit of IT Security: Complying with FFIEC Guidance
  • On-demand
Gary Deutsch

A look at the Federal Financial Institutions Examination Council (FFIEC) revised Information Security booklet

Cybersecurity Training: Security Awareness
  • On-demand
Gary Deutsch

Learn how bankers can develop an effective cyber-risk training and awareness program to comply with regulatory cybersecurity guidance

Conducting a Risk-based Audit of Corporate and Risk Governance Processes
  • On-demand
Gary Deutsch

Guidance through conducting a risk-based audit of your institution’s corporate and risk governance program

Assessing Vendor Cybersecurity Risks: Which Approach Is Best?
  • On-demand

As the list of alternative vendor cybersecurity assessment methods grows, institutions need to determine what method or methods will provide the best insight into the adequacy of vendor cybersecurity controls. Please join Gary Deutsch, CPA, CIA, CBA, CMA, MBA for this important webinar which is focused on assisting vendor risk managers and auditors with understanding the benefits and pitfalls related to the growing list of cybersecurity risk assessment methods.

Mobile Remote Deposit Capture: Risks, Rewards, & Deposits
  • On-demand

Please join Ameerah Needham, AAP, APRP, for this informative session to learn more on the risks and rewards of Mobile Remote Deposit Capture.

Conducting an Internal Audit of Internet Banking
  • On-demand

During this important webinar, Gary Deutsch, CPA MBA will discuss the essential components of performing an internal audit of internet banking operations.

Vendor Management: Using SOC Reports to Oversee Third-Party Information Security and Cybersecurity Risks
  • On-demand
Gary Deutsch

Please join Gary Deutsch, CPA MBA, as he discusses how CPA prepared SOC 2® reports and reports on a service organization’s cybersecurity risk management program can be used to help management meet their regulatory requirements related to third-party relationships.

ACH Warranties & Indemnifications
  • On-demand
Ameerah Needham

Please join Ameerah Needham, AAP, APRP, for this informative session as we discuss ACH warranties and indemnifications.

Refine Search Results