This presentation was delivered at the ISO 37001 & Anti-Bribery PECB Insights Conference by Ralph Haddad, Global Compliance Leader at Anti-Corruption at CAE Inc.
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...PECB
This presentation was delivered by John Boscariol, Partner in the Litigation Group at McCarthy Tétrault, at the ISO 37001 & Anti-Bribery PECB Insights Conference.
This presentation was delivered at the ISO 37001 & Anti-Bribery PECB Insights Conference by Serge Barbeau, Senior Advisor and Project Director at Gestion Jean Bourdeau Inc. in
Canada.
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsPECB
This presentation was delivered at the ISO 37001 & Anti-Bribery PECB Insights Conference by William Marquardt, Director at Berkeley Research Group LLC in Florida
ISO Standards support for Anti-Bribery investigations and audits in the cyber...PECB
This presentation was delivered by Anders Carlstedt, CEO at Parabellum Cybersecurity Services at The ISO 27001 & Anti-Bribery PECB Insights Conference.
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...PECB
This presentation was delivered by John Boscariol, Partner in the Litigation Group at McCarthy Tétrault, at the ISO 37001 & Anti-Bribery PECB Insights Conference.
This presentation was delivered at the ISO 37001 & Anti-Bribery PECB Insights Conference by Serge Barbeau, Senior Advisor and Project Director at Gestion Jean Bourdeau Inc. in
Canada.
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsPECB
This presentation was delivered at the ISO 37001 & Anti-Bribery PECB Insights Conference by William Marquardt, Director at Berkeley Research Group LLC in Florida
ISO Standards support for Anti-Bribery investigations and audits in the cyber...PECB
This presentation was delivered by Anders Carlstedt, CEO at Parabellum Cybersecurity Services at The ISO 27001 & Anti-Bribery PECB Insights Conference.
Compliance Officer update: What you should know about your Business Partner -...vivacidade
Compliance Officer update: This presentation shows why and how Compliance questionnaires are used in the context of the Third Party Compliance Due Diligence process. A proposal is made on key data and compliance information that should be obtained from the prospective Business Partner via self-questionnaire. It is the starting point for further analysis and background checks before a contractual obligation is concluded. The due diligence process should be designed to enable the identification of red flags.
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...PECB
This presentation was delivered by Douglas Small, Director of the Berkeley Research Group’s Global Investigations, at the ISO 27001 & Anti-Bribery PECB Insights Conference.
Legal Governance, Risk Management and ComplianceEffacts
The key for corporate legal departments in minimizing risks lies in identifying relevant risks, creating and aligning controls, and monitoring them to ensure compliance.
Financial crime hot topics: DPA's and Correspondent BankingBovill
At our February briefing in London, we looked at the evolution of and practical approaches to two current hot topics, Deferred Prosecution Agreements (DPAs) and Correspondent Banking.
Another year has gone by and the FCA’s combined Business Plan and Risk Outlook has been released… So what’s new and what does it mean for your firm?
Our briefing walked through the key messages of the document and took a look back at 2015’s release. We also explored what you might need to be doing differently in the year ahead.
The European Banking Authority are proposing to change fundamentally the prudential landscape for investment firms. In this briefing we looked at these proposals for strategic context around the update to your 2016 ICAAP.
Join us for the 5th Middle East Summit on Anti-Corruption and take part in the region’s only event that addresses your company’s local bribery risks and provides a detailed look at the anti-bribery landscape in countries including the UAE, Saudi Arabia, Egypt, Qatar, Iraq and other jurisdictions crucial to your operations in the Middle East.
Presentation: Cross-Border Anti-Corruption Programs
By Leas Bachatene, Chief Executive Officer, ethiXbase
Kicking off 2017 which calls for a renewed and intensified focus on compliance, ethiXbase participated in discussions at the Asian Compliance and Anti-Corruption Summit hosted by the European University Viadrina Frankfurt (Oder) and German-Southeast Asian Center of Excellence for Public Policy and Good Governance (CPG) in Bangkok on January 11th and 12th. Devoted to the theme of “Compliance Across Asia”, the summit featured experts who discussed anti-corruption and compliance in Asia.
Speaking on cross-border anti-corruption programs, Leas Bachatene, Chief Executive Officer of ethiXbase, was joined by other experts from the Organisation for Economic Co-operation and Development (OECD), UNDP Regional Asia Pacific Office, National Anti-Corruption Commission of Thailand, among others.
View slides from Leas Bachatene’s presentation on cross-border anti-corruption programs here, which outlines various elements of an effective cross-border anti-corruption program. Enjoy!
OFAC Name Matching and False-Positive Reduction TechniquesCognizant
Exploration of Office of Foreign Asset Control (OFAC) compliance and strategies to avoid false positives (and negatives), covering watch lists such as specially designated nationals (SDN), customer due diligence,data mining, probabilistic techniques and anti-money-laundering (AML) software.
Countering Financial Crime - The Importance of Effective TrainingAperio Intelligence
We are a corporate intelligence and financial crime advisory firm based in the City of London. We specialise in: conducting enhanced due diligence on high risk customers and third parties; integrity due diligence on critical acquisitions and investments; market entry and political risk analysis; and investigations. We provide tailored training and advisory services relating to financial crime, in particular anti-money laundering and sanctions compliance. Our clients include some of the world’s leading regulated financial institutions and corporations. Our team has decades of collective experience in advising clients on financial crime and intelligence gathering, helping them to manage risk and maximise potential.
Contact us today for further information on how we can help you.
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...SHAUN HASSETT
Update on current OFAC Screening Requirements and How to Improve the Screening Processes as part of your overall Customer Due Diligence Program.
For more information about this topic, please contact SHAUN HASSETT at due_diligence@att.net
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"NICSA
The wait is finally over, after years of waiting we now have the final Customer Due Diligence Rule. This new rule will require financial institutions to enhance their AML programs to further scrutinize entity accounts and their beneficial owners. The panel will detail key requirements and dates while comparing the CDD rule to the EU 3rd directive.
Exploring Relationship Between Risk & ComplianceComplianceTrack
• How to identify compliance risks in the business
• How to involve risk management in compliance management
• Integrating compliance risks with useful management tools
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...PECB
This presentation was delivered by Loic Bernard, Expert in cyber investigation & digital forensics at Enquêtes Forensik, at the ISO 37001 & Anti-Bribery PECB Insights Conference.
Compliance Officer update: What you should know about your Business Partner -...vivacidade
Compliance Officer update: This presentation shows why and how Compliance questionnaires are used in the context of the Third Party Compliance Due Diligence process. A proposal is made on key data and compliance information that should be obtained from the prospective Business Partner via self-questionnaire. It is the starting point for further analysis and background checks before a contractual obligation is concluded. The due diligence process should be designed to enable the identification of red flags.
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...PECB
This presentation was delivered by Douglas Small, Director of the Berkeley Research Group’s Global Investigations, at the ISO 27001 & Anti-Bribery PECB Insights Conference.
Legal Governance, Risk Management and ComplianceEffacts
The key for corporate legal departments in minimizing risks lies in identifying relevant risks, creating and aligning controls, and monitoring them to ensure compliance.
Financial crime hot topics: DPA's and Correspondent BankingBovill
At our February briefing in London, we looked at the evolution of and practical approaches to two current hot topics, Deferred Prosecution Agreements (DPAs) and Correspondent Banking.
Another year has gone by and the FCA’s combined Business Plan and Risk Outlook has been released… So what’s new and what does it mean for your firm?
Our briefing walked through the key messages of the document and took a look back at 2015’s release. We also explored what you might need to be doing differently in the year ahead.
The European Banking Authority are proposing to change fundamentally the prudential landscape for investment firms. In this briefing we looked at these proposals for strategic context around the update to your 2016 ICAAP.
Join us for the 5th Middle East Summit on Anti-Corruption and take part in the region’s only event that addresses your company’s local bribery risks and provides a detailed look at the anti-bribery landscape in countries including the UAE, Saudi Arabia, Egypt, Qatar, Iraq and other jurisdictions crucial to your operations in the Middle East.
Presentation: Cross-Border Anti-Corruption Programs
By Leas Bachatene, Chief Executive Officer, ethiXbase
Kicking off 2017 which calls for a renewed and intensified focus on compliance, ethiXbase participated in discussions at the Asian Compliance and Anti-Corruption Summit hosted by the European University Viadrina Frankfurt (Oder) and German-Southeast Asian Center of Excellence for Public Policy and Good Governance (CPG) in Bangkok on January 11th and 12th. Devoted to the theme of “Compliance Across Asia”, the summit featured experts who discussed anti-corruption and compliance in Asia.
Speaking on cross-border anti-corruption programs, Leas Bachatene, Chief Executive Officer of ethiXbase, was joined by other experts from the Organisation for Economic Co-operation and Development (OECD), UNDP Regional Asia Pacific Office, National Anti-Corruption Commission of Thailand, among others.
View slides from Leas Bachatene’s presentation on cross-border anti-corruption programs here, which outlines various elements of an effective cross-border anti-corruption program. Enjoy!
OFAC Name Matching and False-Positive Reduction TechniquesCognizant
Exploration of Office of Foreign Asset Control (OFAC) compliance and strategies to avoid false positives (and negatives), covering watch lists such as specially designated nationals (SDN), customer due diligence,data mining, probabilistic techniques and anti-money-laundering (AML) software.
Countering Financial Crime - The Importance of Effective TrainingAperio Intelligence
We are a corporate intelligence and financial crime advisory firm based in the City of London. We specialise in: conducting enhanced due diligence on high risk customers and third parties; integrity due diligence on critical acquisitions and investments; market entry and political risk analysis; and investigations. We provide tailored training and advisory services relating to financial crime, in particular anti-money laundering and sanctions compliance. Our clients include some of the world’s leading regulated financial institutions and corporations. Our team has decades of collective experience in advising clients on financial crime and intelligence gathering, helping them to manage risk and maximise potential.
Contact us today for further information on how we can help you.
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...SHAUN HASSETT
Update on current OFAC Screening Requirements and How to Improve the Screening Processes as part of your overall Customer Due Diligence Program.
For more information about this topic, please contact SHAUN HASSETT at due_diligence@att.net
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"NICSA
The wait is finally over, after years of waiting we now have the final Customer Due Diligence Rule. This new rule will require financial institutions to enhance their AML programs to further scrutinize entity accounts and their beneficial owners. The panel will detail key requirements and dates while comparing the CDD rule to the EU 3rd directive.
Exploring Relationship Between Risk & ComplianceComplianceTrack
• How to identify compliance risks in the business
• How to involve risk management in compliance management
• Integrating compliance risks with useful management tools
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...PECB
This presentation was delivered by Loic Bernard, Expert in cyber investigation & digital forensics at Enquêtes Forensik, at the ISO 37001 & Anti-Bribery PECB Insights Conference.
Comprendre le contexte de la corruption - La façon d’atteindre l’objectifPECB
This presentation was delivered at the ISO 37001 & Anti-Bribery PECB Insights Conference by Sylvain Viau, Founder, President & CSO International Innovations and Services (IIS) in Canada
Anti-bribery, digital investigation and privacyPECB
This presentation was delivered at the ISO 37001 & Anti-Bribery PECB Insights Conference by Sylvain Desharnais, Digital investigation at CFIJ in Canada
ICC ethics and compliance training handbook chapter 13 resisting solicitationiohann Le Frapper
I have contributed to the chapter on the topic of solicitation and how to resist solicitation of the ICC Ethics and Compliance Training Handbook released on December 9th by the International Chamber of Commerce. It can be purchased on-line at http://iccbooks.com/Product/ProductInfo.aspx?id=698
On Tuesday, 23 September, MCRB hosted a half-day workshop on “Anti-Corruption Programmes” for Myanmar businesses in Yangon. The workshop, held in collaboration with Spectrum – a Yangon-based sustainable development knowledge network - was the first in a series of events to follow-up on the Transparency in Myanmar Enterprises (TiME) report and build business capacity in the area of anti-corruption and human rights.
10 Ways To Reduce The Risk of Bribery and Corruption.pdfWajidKhanMP
Corruption affects all nations, causing instability, inequality, poverty, and eroding national wealth. But there are ways to minimize the risk to your business. Despite strict anti-corruption laws, corruption remains a significant risk. Wajid khan Mp Shares According to PwC's Global Economic Crime Survey, nearly half of the world's businesses have faced fraud, including bribery and corruption, in the last 24 months.
How to reduce bribery and corruption
Learn ten simple and effective strategies to reduce the risk of bribery and corruption in your company.
1. Updated Anti-Bribery and Anti-Corruption Policy
Most UK companies have an anti-corruption policy, but it depends on how they implement it. Ensure employees understand the company's policies and expectations regarding bribery and corruption. We need to know what is and is not acceptable regarding gifts, entertainment, donations, sponsorships, and political contributions. Regular training on crime should be provided to maintain awareness.
10 Ways To Reduce The Risk of Bribery and Corruption.pdfWajid Khan MP
10 Ways To Reduce The Risk of Bribery and Corruption
Corruption affects all nations, causing instability, inequality, poverty, and eroding national wealth. But there are ways to minimize the risk to your business. Despite strict anti-corruption laws, corruption remains a significant risk. Wajid khan Mp Shares According to PwC's Global Economic Crime Survey, nearly half of the world's businesses have faced fraud, including bribery and corruption, in the last 24 months.
How to reduce bribery and corruption
Learn ten simple and effective strategies to reduce the risk of bribery and corruption in your company.
1. Updated Anti-Bribery and Anti-Corruption Policy
Most UK companies have an anti-corruption policy, but it depends on how they implement it. Ensure employees understand the company's policies and expectations regarding bribery and corruption. We need to know what is and is not acceptable regarding gifts, entertainment, donations, sponsorships, and political contributions. Regular training on crime should be provided to maintain awareness.
Alongside your training, establish a process to help you remember the dos and don'ts, such as B. Checklists and Travel Guidelines. Employees should understand that any gift or entertainment received must have a legitimate business purpose, be appropriate, and be listed on the company's gift and entertainment register. Wajid khan suggests Clarifying what you mean by "justified" and "deserved." Please don't leave it up to interpretation.
2. Sound from directly above
Employee awareness of anti-corruption policies is only half the story. Building an anti-bribery culture requires clear and consistent messaging from the top down.
Boards, business owners, and all members of the compliance function must be clear that bribery and corruption are intolerable and that anyone found guilty faces the most severe penalties.
But most importantly, those at the top live their preaching and believe in the importance of anti-corruption policies. Otherwise, employees will not embrace that culture, and dialogue about anti-bribery training will not be taken seriously.
3. Integrate ABAC principles into corporate culture
See Anti-Bribery (ABAC) in company manuals, reports, and training. By including his ABAC clause in all supplier contracts, he establishes ground rules in advance and sets up appropriate termination clauses in case of suspected violations.
Canadian politician Wajid khan discusses Finally, communicate to employees how important they are to prevent bribery and empower them to do their part in maintaining compliance
Video business continuity planning and disaster recoveryClive Bonny
7 minute summary with video link to assist business sustainability
https://youtu.be/DfZNCH30UqI
https://www.youtube.com/watch?v=HKD2qotq4WA#action=share
Key Take aways -
» To successfully develop and implement an anti-corruption framework, an organization must have an excellent tone at the top.
» An anti-corruption framework must have a robust, clear, and comprehensive de nition section for any employee or vendor to refer to.
» Assess your organization’s culture with adequate risk assessments and take steps to mitigate problem areas.
» The degree of con dentiality and mechanism of reporting offered to employees will inform the level of trust those
employees maintain.
» Investigation procedures and disciplinary actions that an employee might face are indicators of an organization’s tolerance and intolerance toward misconduct.
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
The global implications of DORA and NIS 2 Directive are significant, extending beyond the European Union.
Amongst others, the webinar covers:
• DORA and its Implications
• Nis 2 Directive and its Implications
• How to leverage directive and regulation as a marketing tool and competitive advantage
• How to use new compliance framework to request additional budget
Presenters:
Christophe Mazzola - Senior Cyber Governance Consultant
Armed with endless Excel files, a meme catalog worthy of the best X'os (formerly twittos), and a risk register to make your favorite risk manager jealous, I swapped my computer scientist cape a few years ago for that of a (cyber) threat hunter with the honorary title of CISO.
Ah, and I am also a quadruple senior certified ISO27001/2/5, Pas mal non ? C'est francais.
Malcolm Xavier
Malcolm Xavier has been working in the Digital Industry for over 18 Years now. He has worked with Global Clients in South Africa, United States and United Kingdom. He has achieved Many Professional Certifications Like CISSP, Google Cloud Practitioner, TOGAF, Azure Cloud, ITIL v3 etc.
His core competencies include IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management.
Date: April 25, 2024
Tags: Information Security, Digital Operational Resilience Act (DORA)
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: Digital Operational Resilience Act (DORA) - EN | PECB
NIS 2 Directive - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
In an era where digital transformation is inevitable, the landscape of cybersecurity is constantly evolving.
Amongst others, the webinar covers:
• DORA and its Implications
• ISO/IEC 27005: Risk Management in Information Security
• Leveraging Artificial Intelligence for Enhanced Cybersecurity
Presenters:
Geoffrey L. Taylor - Director of Cybersecurity
Geoffrey Taylor brings a wealth of experience from multiple roles within various industries throughout his career. As a Certified ISO 27001 Implementer and Auditor, as well as certified ISO 27005, CISM and CRISC, he brings a unique perspective on cybersecurity strategy, risk management and the implementation of an Information Security Management System, having helped multiple organizations in aligning their strategy based on their threat landscape.
Martin Tully - Senior Cyber Governance Consultant
Martin is a Senior Consultant at CRMG with over twenty years of experience, and has previously been employed at two of the ‘Big Four’ professional services firms. Martin has worked across most industry sectors in the development of the best practice guidance and risk analysis methodologies. Martin is also accomplished at: leading the implementation of an ISMS; delivering a number of information risk assessments; reviewing information security policies; assessing security requirements across the supply chain; and updating a complete framework of supporting standards. Prior to the ISF, Martin’s roles have included delivering operational risk reporting, running research projects and benchmarking information security investments for major clients. Martin holds a Bachelors degree from Royal Holloway University of London.
Date: March 27, 2024
Tags: ISO, ISO/IEC 27005, ISO/IEC 42001, Artificial Intelligence, Information Security, Digital Operational Resilience Act (DORA)
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27005 Information Security Risk Management - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/ffX-Xbw7XUk
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
In today’s rapidly evolving world, where Artificial Intelligence (AI) not only drives innovation but also presents unique challenges and opportunities, staying ahead means being informed.
Amongst others, the webinar covers:
• ISO/IEC 27001 and ISO/IEC 42001 and their key components
• Latest trends in AI Governance
• Ethical AI practices
• Benefits of Certification
Presenters:
Jeffrey Bankard - Cybersecurity & AI Leader, AI Management Systems: ISO/IEC 42001
Jeffrey provides executive leadership for AI product creation through the product incubation unit (PIU). Ensures the timely delivery of AI consulting engagements through cross-functional teams comprised of senior information and network security leaders to establish strategic goals for improving the security architecture and risk posture for clients. Consults with business leaders to define key performance indicators and service levels. Fosters employee development through mentoring and coaching. Decides how to achieve results within the organization’s strategic plans, policies, and guidelines. Develops new products and secures those products through current AI security guidelines (ISO 42001).
Adrian Resag - Experienced in Risk and Control - ISO/IEC 27001 and ISO/IEC 42001
Adrian believes a stimulating career can span many disciplines and that leading organizations value versatile professionals. He has enjoyed managing teams spanning the globe by working in world-leading organizations as Chief Audit Executive, Head of Risk Management, Information Systems Auditor, Head of Internal Control, as a consultant, a statutory auditor and an accountant. To allow such a diverse career, his approach has been to pursue certifications in many fields (making him one of the most qualified and certified in some of them). He has written books and created professional certifications in audit & assurance and compliance & ethics, and teaches in subjects from information security to risk management. With a passion for education, Adrian founded an educational institution and has taught tens of thousands of students and professionals online, in companies, universities and in governmental organizations.
Date: February 28, 2024
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/DujXaxBhhRk
The importance of a robust cybersecurity strategy cannot be overstated. Learning on the effective measures to be taken and tools needed to navigate the evolving cybersecurity landscape successfully is essential.
Amongst others, the webinar covers:
• ISO/IEC 27002 and ISO/IEC 27032 and their key components
• Key Components of a Resilient Cybersecurity Strategy
• CMMC Frameworks
Presenters:
Dr. Oz Erdem
Governance, Risk and Compliance (GRC) consultant, trainer, auditor, and speaker
Dr. Erdem has over 25 years of experience in information security, trade compliance, data privacy, and risk management. He took leadership roles in governance and compliance at various Fortune 100-500 companies and SMBs, including Siemens Corporation, Siemens Industry, Linqs, Texas Instruments, Rtrust, ICEsoft Technologies, NATO C3A, and BILGEM. In addition, successfully managed software development (i.e., embedded, cloud, and SaaS) and digital product projects involving information security, mobile networks, and IoT networks. Further, Dr. Erdem led several non-profit organizations, such as National Association of District Export Councils (NADEC), Government Contractors Council (GovConCouncil), and Central-North Florida District Export Council as the Chairman of the Board.
Peter Geelen
Peter Geelen is the director and managing consultant at CyberMinute and Owner of Quest for Security, Belgium. Over more than 20 years, Peter has built strong experience in enterprise security & architecture, Identity & Access management, but also privacy, information & data protection, cyber- and cloud security. Last few years, the focus is on ISO/IEC 27001 and other ISO certification mechanisms. Peter is accredited Lead Auditor for ISO/IEC 27001, ISO 9001, PECB Trainer and Fellow in Privacy. Committed to continuous learning, Peter holds renowned security certificates as certified ISO/IEC 27701 lead implementer and lead auditor, ISO/IEC 27001 Master, Sr. Lead Cybersecurity Manager, ISO/IEC 27002 lead manager, ISO/IEC 27701 Lead Implementer, cDPO, Risk management, Lead Incident Mgr., Disaster Recovery, and many more.
George Usi - CEO of Omnistruct
An internet pioneer and award-winning leader in internet governance with over 25 years of experience, George Usi knows that getting hacked is not a matter of ‘if’ but, ‘when’ and the fiscal and reputational effects that has on a business, the executives, and the board. George is the Co-Founder of Omnistruct, a cyber risk company. Omnistruct protects and expands revenue creation, reputation, and customer retention through cyber risk transference, governance, and compliance. We ensure that security and privacy programs work.
Date: January 24, 2024
YouTube Video: https://youtu.be/9i5p5WFExT4
Website: https://bit.ly/3SjovIP
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
As we approach the new year, the importance of a robust cybersecurity strategy cannot be overstated. Learning on the effective measures to be taken and tools needed to navigate the evolving cybersecurity landscape successfully is essential.
Amongst others, the webinar covers:
• ISO/IEC 27001 and ISO/IEC 27035 and their key components
• Key Components of a Resilient Cybersecurity Strategy
• Best practices for building a resilient cybersecurity strategy in 2024
Presenters:
Rinske Geerlings
Rinske is an internationally known consultant, speaker and certified Business Continuity, Information Security & Risk Management trainer.
She was awarded Alumnus of the Year 2012 of Delft University, Australian Business Woman of the Year 2010-13 by BPW, Risk Consultant of the Year 2017 (RMIA/Australasia) and Outstanding Security Consultant 2019 Finalist (OSPAs)
Rinske has consulted to the Department of Prime Minister & Cabinet, 15 Central Banks, APEC, BBC, Shell, Fuji Xerox, NIB Health Funds, ASIC, Departments of Defense, Immigration, Health, Industry, Education, Foreign Affairs and 100s of other public and private organizations across 5 continents.
She has been changing the way organizations ‘plan for the unexpected’. Her facilitation skills enable organizations to achieve their own results and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCM, Security, and Risk.
Her 'alter ego' includes being a lead singer in SophieG Music and contributing to the global charity playing for Change, which provides music education to children in disadvantaged regions.
Loris Mansiamina
A Senior GRC Professional consultant for Small, Medium and large companies. Over 10 years, Loris has been assisting clients in both public and private sectors about various matters relating to Gouvernance, Risk Management and Compliance (GRC), Digital transformation, cyber security program management, ISO 27k & ISO 20k implementation, COBIT & ITIL implementation, etc.
Date: December 19, 2023
Tags: ISO, ISO/IEC 27001, ISO/IEC 27035, Cybersecurity, Information Security
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
ISO/IEC 27035 Information Security Incident Management - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/yT8gxRZD_4c
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
In today's rapidly evolving digital landscape, the integration of artificial intelligence (AI) in business processes is becoming increasingly essential. Hence, it is crucial to stay informed and prepared.
Amongst others, the webinar covers:
• ISO/IEC 27005 and ISO/IEC 27001 and their key components
• The standard’s alignment
• Identifying AI risks and vulnerabilities
• Implementing effective risk management strategies
Presenters:
Sabrina Feddal
With more than 16 years of background in operational security, telco as engineer and project manager for major international companies. I have founded Probe I.T in 2016 to provide my customers (both national and international) with GRC services. Winner of the 2020 award, the CEFCYS – Main French Women in cybersecurity association - jury's favorite, she remains committed on a daily basis to maintaining diversity and gender diversity in her teams.
Passionate about Law, History & Cybersecurity. She has several professional certifications acquired over the course of her career: Prince2, CISSP, Lead Implementer ISO27001, Risk Manager, University degree in Cybercrime and Digital Investigation.
Her values: excellence, discretion, professionalism.
Mike Boutwell
Mike Boutwell is a Senior Information Security Specialist with over 15 years of experience in security and 10 years of risk management experience, primarily focused on financial services. He excels in collaborating with CISOs and other executive leadership to build and implement security frameworks aligned with business objectives and developing enterprise-wide security requirements. Mike has a strong track record of securing assets worth over $1 quadrillion and delivering $100M+ projects.
Mike is a certified CISSP, CISA, CGEIT, ISO 27001 Senior Lead Implementer, ISO 27001 Senior Lead Auditor, ISO 38500 Senior Lead IT Governance Manager, ISO 27032 Senior Lead Cyber Security Manager, and Certified Non-Executive Director.
Date: November 22, 2023
Tags: ISO, ISO/IEC 27001, ISO/IEC 27005, Cybersecurity, Information Security
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
ISO/IEC 27005 Information Security Risk Management - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/TtnY1vzHzns
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
In today's digital age, cybersecurity is more critical than ever. Hence, it is crucial to stay informed and prepared.
Amongst others, the webinar covers:
• ISO/IEC 27032:2023 and ISO/IEC 27701 and their key components
• The standard’s alignment
• Emerging Cybersecurity Threats
• What is new to the ISO/IEC 27032:2023
Presenters:
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Jeffrey Crump
Mr. Jeffrey Crump is the Principal Consultant at Arizona-based Cyber Security Training and Consulting LLC and a graduate of the Certified NIS 2 Directive Lead Implementer course. He is a Certified CMMC Assessor, Certified CMMC Professional, and Instructor. Mr. Crump is also the author of Cyber Crisis Management Planning: How to reduce cyber risk and increase organizational resilience. His book has been expanded into a triad of certification courses on cyber crisis planning, exercises, and leadership.
Date: October 25, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/a21uasr8aLs
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
Cybersecurity is an ongoing journey. The regular update and improvement of security measures is essential to stay ahead of evolving threats.
Amongst others, the webinar covers:
• Benefits of Compliance
• Digital Transformation: Why
• ISO/IEC 27001 and ISO/IEC 27032
• ISO/IEC 27001: Information Security Management System (ISMS)
• ISO/IEC 27032: Cybersecurity Framework
Presenters:
Douglas Brush
Douglas Brush is a federally court-appointed Special Master, and Court Appointed Neutral expert in high-profile litigation matters involving privacy, security, and eDiscovery.
He is an information security executive with over 30 years of entrepreneurship and professional technology experience. He is a globally recognized expert in cybersecurity, incident response, digital forensics, and information governance. In addition to serving as a CISO and leading enterprise security assessments, he has conducted hundreds of investigations involving hacking, data breaches, trade secret theft, employee malfeasance, and various other legal and compliance issues.
He is the founder and host of Cyber Security Interviews, a popular information security podcast.
Douglas is also committed to raising awareness about mental health, self-care, neurodiversity, diversity, equity, and inclusion, in the information security industry.
Malcolm Xavier
Malcolm Xavier has been working in the Digital Industry for over 18 Years now. He has worked with Global Clients in South Africa, United States and United Kingdom. He has achieved Many Professional Certifications Like CISSP, Google Cloud Practitioner, TOGAF, Azure Cloud, ITIL v3 etc.
His core competencies include IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management.
Carole Njoya
Founder in 2018 of Alcees, a Paris-based management consulting fabric specialized in cybersecurity, data privacy governance and digital trust, Carole Njoya provides independent, tailored and expert advisory to companies doing business in European markets and serving both B2B and B2C customers. With more than 100 cybersecurity projects delivered, she assists entities in preparing, implementing and maintaining the right best practices under the ISO 27001 compliance framework and GDPR article 25 obligation (Privacy by design) for their vendors. Carole Njoya featured in the « Women Know Cybersecurity » 2019 Twitter list edited by Cybercrime Magazine. Carole Njoya is committed in science and engineering since pre-teen period.
Date: September 27, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
YouTube video: https://youtu.be/U7tyzUrh8aI
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
The management of AI systems is a shared responsibility. By implementing the ISO 31000 Framework and complying with emerging regulations like the EU ACT, we can jointly create a more reliable, secure, and trustworthy AI ecosystem.
Amongst others, the webinar covers:
• Understanding AI and the regulatory landscape
• AI and the threat landscape
• A risk driven approach to AI assurance - based on ISO 31000 principles
• Stress testing to evaluate risk exposure
Presenters:
Chris Jefferson
Chris is the Co-Founder and CTO at Advai. As the Co-Founder of Advai, Chris is working on the application of defensive techniques to help protect AI and Machine Learning applications from being exploited. This involves work in DevOps and MLOps to create robust and consistent products that support multiple platforms, such as cloud, local, and edge.
Nick Frost
Nick Frost is Co-founder and Lead Consultant at CRMG. Nick’s career in cyber security spanning nearly 20 years. Most recently Nick has held leadership roles at PwC as Group Head of Information Risk and at the Information Security Forum (ISF) as Principal Consultant. In particular Nick was Group Head of Information Risk for PwC designing and implementing best practice solutions that made good business sense that prioritized key risks to the organisation and helped minimize disruption to ongoing operations. Whilst at the ISF Nick led their information risk projects and delivered many of the consultancy engagements to help organisations implement leading thinking in information risk management.
Nicks combined experience as a cyber risk researcher and practitioner designing and implementing risk based solutions places him as a leading cyber risk expert. Prior to cyber security and after graduating from UCNW and Oxford Brookes Nick was a geophysicist in the Oil and Gas Industry.
Date: August 24, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-31000
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/MXnHC6AvjXc
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
Generative AI offers great opportunities for innovation in various industries. Hence, by adopting ISO/IEC 27032, you can enhance your cybersecurity resilience and efficiently address the risks associated with generative AI.
Amongst others, the webinar covers:
• AI & Privacy
• Generative AI, Models & Cybersecurity
• AI & ISO/IEC 27032
Presenters:
Christian Grafenauer
Anonymization expert, privacy engineer, data protection officer, LegalTech researcher (GDPR, Blockchain, AI) Christian Grafenauer is an accomplished privacy engineer, anonymization expert, and computer science specialist, currently serving as the project lead for anonymity assessments at techgdpr. With an extensive background as a senior architect in Blockchain for IBM and years of research in the field since 2013, Christian co-founded privacy by Blockchain design to explore the potential of Blockchain technology in revolutionizing privacy and internet infrastructure. As a dedicated advocate for integrating legal and computer science disciplines, Christian’s expertise in anonymization and GDPR compliance enables innovative AI applications, ensuring a seamless fusion of technology and governance, particularly in the realm of smart contracts. In his role at techgdpr, he supports technical compliance, Blockchain, and AI initiatives, along with anonymity assessments. Christian also represents consumer interests as a member of the national Blockchain and DTL standardization committee at din (German standardization institute) in ISO/TC 307.
Akin Johnson
Akin J. Johnson is a renowned Cybersecurity Expert, known for his expertise in protecting digital systems from potential threats. With over a decade of experience in the field, Akin has developed a deep understanding of the ever-evolving cyber landscape.
Akin is an advocate for cybersecurity awareness and frequently shares his knowledge through speaking engagements, workshops, and publications. He firmly believes in the importance of educating individuals and organizations on the best practices for safeguarding their digital assets.
Lucas Falivene
Lucas is a highly experienced cybersecurity professional with a solid base in business, information systems, information security, and cybersecurity policy-making. A former Fulbright scholar with a Master of Science degree in Information Security Policy and Management at Carnegie Mellon University (Highest distinction) and a Master's degree in Information Security at the University of Buenos Aires (Class rank 1st). Lucas has participated in several trainings conducted by the FBI, INTERPOL, OAS, and SEI/CERT as well as in the development of 4 cyber ISO national standards.
Date: July 26, 2023
YouTube Link: https://youtu.be/QPDcROniUcc
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
By embracing the importance of GDPR and leveraging ISO/IEC 27701, you can enhance your data protection practices, achieve compliance, and minimize the risk of penalties.
Amongst others, the webinar covers:
Importance of Data Protection
Understanding Data Collection and Challenges
Introduction to GDPR
Key Principles of GDPR
Who does GDPR Apply to and Its Global Implications
Introduction to ISO/IEC 27701
Implementing ISO/IEC 27701
Privacy by Design
Dealing with IT on a Daily Basis
Building Awareness and Training
Audit, Data Discovery, and Risk Assessments
Presenters:
Mike Boutwell
Mike Boutwell is a Senior Information Security Specialist with over 15 years of experience in security and 10 years of risk management experience, primarily focused on financial services. He excels in collaborating with CISOs and other executive leadership to build and implement security frameworks aligned with business objectives and developing enterprise-wide security requirements. Mike has a strong track record of securing assets worth over $1 quadrillion and delivering $100M+ projects.
Mike is a certified CISSP, CISA, CGEIT, ISO 27001 Senior Lead Implementer, ISO 27001 Senior Lead Auditor, ISO 38500 Senior Lead IT Governance Manager, ISO 27032 Senior Lead Cyber Security Manager, and Certified Non-Executive Director.
Lisa Goldsmith
Lisa Goldsmith is the founder of LJ Digital and Data Consultancy. Lisa has over 23 years’ experience of supporting leadership teams in membership, charity, and wider not-for-profit organisations to simplify their IT and digital strategy that allows them to sleep soundly at night, knowing their systems and processes are fit for purpose, GDPR compliant, secure and that they deliver value to staff, members, and stakeholders.
Prior to starting her own consultancy, Lisa gained extensive experience working for membership organisations and has knowledge and expertise at all levels of operations from working within careers and qualifications teams, as Membership Manager, as Head of Digital & IT for delivering large-scale digital, IT and GDPR compliance projects and serving on several Senior Leadership Teams. Lisa is also currently a Trustee of the BCLA and Groundwork East.
Date: June 27, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/lfJrSLaGDtc
Website: https://bit.ly/437GOnG
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
The EU has implemented a range of regulations aimed at strengthening its cybersecurity posture. In this context, the ISO/IEC 27001 standard offers a comprehensive framework for managing and safeguarding sensitive information, such as personal data.
Amongst others, the webinar covers:
• Quick recap on the ISO/IEC 27001:2013 & 2022
• ISO/IEC 27001 vs legislation
• The EU Cyber Legislation landscape
• Some considerations and consequences
• How to stay on top of the ever changing context
Presenters:
Peter Geelen
Peter Geelen is the director and managing consultant at CyberMinute and Owner of Quest for Security, Belgium. Over more than 20 years, Peter has built strong experience in enterprise security & architecture, Identity & Access management, but also privacy, information & data protection, cyber- and cloud security. Last few years, the focus is on ISO/IEC 27001 and other ISO certification mechanisms. Peter is accredited Lead Auditor for ISO/IEC 27001, ISO 9001, PECB Trainer and Fellow in Privacy. Committed to continuous learning, Peter holds renowned security certificates as certified ISO/IEC 27701 lead implementer and lead auditor, ISO/IEC 27001 Master, Sr. Lead Cybersecurity Manager, ISO/IEC 27002 lead manager, ISO/IEC 27701 Lead Implementer, cDPO, Risk management, Lead Incident Mgr., Disaster Recovery, and many more.
Jean-Luc Peters
Jean-Luc Peters brings 25 years of IT technology, information and cybersecurity expertise to boards, executives, and employees. Since the younger age he has held management positions in the private and government sector. He is currently the Head of the Cyber Emergency Response team for the National Cybersecurity Authority in Belgium. In addition to this, he is also a trainer, coach and trusted advisor focusing on enhancing cyber resilience.
Jean-Luc has helped in the technical implementation of the NIS 1 (Network and Information Security) Directive transposition in Belgium, defining the Baseline Security Guidelines governmental ISMS framework and many other projects. He holds several certifications, including ISO/IEC 27001 Lead Implementer, ISO/IEC 27005 Auditor, CISSP, GISP, Prince 2 Practitioner, ITIL etc.
Date: May 31, 2023
Tags: ISO, ISO/IEC 27001, Information Security, Cybersecurity
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/rsjwwF5zlK8
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
To protect your organization from cyber attacks, you need to implement a robust information security management system (ISMS) and business continuity management system (BCMS) based on international standards, such as ISO/IEC 27001 and ISO 22301.
Amongst others, the webinar covers:
• Why we need a cyber response plan to protect business operations
• Introduction to ISO/IEC 27001 and ISO 22301
• What do we need for a cyber security response plan?
• How do we develop a cyber security response plan?
Presenters:
Nick Frost
Nick Frost is Co-founder and Lead Consultant at CRMG.
Nick’s career in cyber security spanning nearly 20 years. Most recently Nick has held leadership roles at PwC as Group Head of Information Risk and at the Information Security Forum (ISF) as Principal Consultant.
In particular Nick was Group Head of Information Risk for PwC designing and implementing best practice solutions that made good business sense, that prioritise key risks to the organisation and helped minimise disruption to ongoing operations. Whilst at the ISF Nick led their information risk projects and delivered many of the consultancy engagements to help organisations implement leading thinking in information risk management.
Nicks combined experience as a cyber risk researcher and practitioner designing and implementing risk based solutions places him as a leading cyber risk expert. Prior to cyber security and after graduating from UCNW and Oxford Brookes Nick was a geophysicst in the Oil and Gas Industry.
Simon Lacey
Simon is a resourceful, creative Information & Cyber Security professional with a proven track record of instigating change, disrupting the status quo, influencing stakeholders and developing ‘big picture’ vision across business populations. Multiple industry experience; excels in building stakeholder engagement & consensus; and suporting organisations to make sustainable change.
Simon also has considerable experience of risk management, education and awareness, strategy development and consulting to senior management and is a confident and engaging public speaker.
Simon has previously worked within the NHS, Bank of England and BUPA, before setting out as an independent consultan forming Oliver Lacey Limited, supporting clients in multiple business sectors.
When not working, Simon loves to run – currently training for the Berlin Marathon, a Director of Aylesbury United Football Club, records vlogs and is an experienced standup comic.
Date: April 26, 2023
Find out more about ISO training and certification services
Training: https://bit.ly/3AyoyYF
https://bit.ly/3LbBVTx
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/i4qx5mjEqio
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
Integrating ISO/IEC 27001 and ISO 31000 can help organizations align their information security and risk management efforts with their overall business objectives, leading to more effective risk management and better decision-making.
Amongst others, the webinar covers:
• Aligning the ISMS process with ISO/IEC 27001
• Using ISO 31000 within the ISMS
• Aligning the RM process with ISO 31000
• How/where does ISO/IEC 27001 fit?
Presenters:
Nick Riemsdijk
As a highly experienced and multi-skilled leader in Information and Physical Security, Nick is known as a collaborative, focused, driven and highly analytical individual with a broad portfolio of successes in client engagements. His expertise spans devising, implementing, managing and delivering information security, physical security, organizational resilience and facilities management solutions for organizations. He is certified as a Certified Information Security Manager (CISM), Certified Protection Professional (CPP), in Project Management (Prince2), ISO 22301 (Business Continuity), ISO 27001 (Information Security), and ISO 31000 (Risk Management).
Rinske Geerlings
Rinske is an internationally known consultant, speaker and certified Business Continuity, Information Security & Risk Management trainer.
She was awarded Alumnus of the Year 2012 of Delft University, Australian Business Woman of the Year 2010-13 by BPW, Risk Consultant of the Year 2017 (RMIA/Australasia) and Outstanding Security Consultant 2019 Finalist (OSPAs)
Rinske has consulted to the Department of Prime Minister & Cabinet, 15 Central Banks, APEC, BBC, Shell, Fuji Xerox, NIB Health Funds, ASIC, Departments of Defense, Immigration, Health, Industry, Education, Foreign Affairs and 100s of other public and private organizations across 5 continents.
She has been changing the way organizations ‘plan for the unexpected’. Her facilitation skills enable organizations to achieve their own results and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCM, Security, and Risk.
Her 'alter ego' includes being a lead singer in SophieG Music and contributing to the global charity playing for Change, which provides music education to children in disadvantaged regions.
Date: March 23, 2023
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-31000
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/Xj0U2mbpZUs
IT Governance and Information Security – How do they map?PECB
Effective IT Governance requires proper Information Security practices to ensure that the organization's data is secure. On the other hand, Information Security policies and procedures must be aligned with the organization's overall IT Governance framework to ensure that security measures do not negatively impact business operations.
Amongst others, the webinar covers:
▪ Bring Governance and InfoSec Together
▪ Answering WIIFM
▪ Business Terms
Presenters:
Dr. Edward Marchewka
Dr. Edward Marchewka is a seasoned executive that has come up through the ranks in the IT vertical, expanding into information security, quality management, and strategic planning.
Edward founded and serves as the Principal for 3LC Solutions, enabling YOU to Tell a Better Story in business, with our vCIO, vCISO, quality, and strategy consulting services, through metrics and relating risk to the business with our CHICAGO Metrics® SaaS solution.
He has also held several roles leading information technology, most recently with Gift of Hope Organ and Tissue Donor Network, leading the Information and Technology Services department as the Director of IT, Data, and Security Services. Prior to Gift of Hope, he ran information security for Chicago Public Schools.
Edward has earned a Doctorate of Business Administration from California Southern University and Masters’ degrees in Business Administration and Mathematics from Northern Illinois University. He earned Bachelors’ degrees in Liberal Studies and Nuclear Engineering Technologies from Thomas Edison State College, N.J. Edward maintains several active IT, security, and professional certifications from (ISC)2, ASQ, ITIL, PCI, PMI, ISACA, Microsoft, and CompTIA. He has held legacy IT certifications from Cisco and HP, and a designation from the National Security Agency.
Date: February 22, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-38500
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/2bSbAdL5Idg
Student Information Session University Digital Encode.pptxPECB
oin us as our Director for Business Mustafe Bislimi teams up with Dr. Obadare Peter Adewale, our academic partner Digital Encode Limited, to provide valuable information about our programs, admissions process and specialization and elective courses.
Discover the opportunities available to you as a student at PECB University and get a firsthand look at what makes us a top choice for education.
Whether you're a prospective student or simply curious about PECB University, don't miss this informative session! Subscribe to our channel and stay tuned for more videos.
For inquiries regarding admission process contact us: university.studentaffairs@pecb.com
-EMBA in Cybersecurity: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbHJQUUpjMmY2NmcyeURhTzE5VlRSNjg2Y1hwd3xBQ3Jtc0tuLTZqdmZyWkc2VVNQV21YRTlKZUQ2SEtUenNXbzYyb1ZianV5cldDYTViWjZ1eVhCNWtxWHI3VTNwRS1BOE4wTERkZ3BtcndwM0sxdVoydWZYSXBkV2hYd2lwU0NLSTk5WERWMlhtVk1Ud2tuWTRjTQ&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fcybersecurity&v=3YJbbr708pk
-EMBA in Business Continuity Management: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa3JQTGVhd1VfeG1weWNzUzRrMmg2bk0tc3kxUXxBQ3Jtc0tsOVF5VG82TkhRU3R5TVRWWmdhMzBrSTU2eW9wby1OYWN4VTg5bkJBY0lhTmNsOFhETzB5cVp0WU8zbTQwTlZkdk9Dby1fSXdhWmRpZFFPUmk3NS1QOGpMOVBlaDFhVVpwa2JZMkxKNGRnTnppMm93SQ&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fbusiness-continuity-management&v=3YJbbr708pk
-EMBA in Governance, Risk, and Compliance: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbUplMGtjOFRWbzdGWERmdTR2QjdSbTBuQUxCd3xBQ3Jtc0tsNVdOU1p6UERWM3ZySE55V2FlWlJ1aFlzUU85VEt0aVRoR0hyTjNHbUNVYVMyb0lzTkZycUtJRzNxazlDWGRqTHZQMWJPZEYwbG1xWjVJN1JNOW1QUjJBZDY3NkU5LVl0b2xxOFpkZW1ZX2F3QmF5cw&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fgovernance-risk-compliance&v=3YJbbr708pk
Being aware of the trends that are expected to shape the digital landscape is an important step in ensuring the security of your data and online assets.
Amongst others, the webinar covers:
• Top Cyber Trends for 2023
• Cyber Insurance
• Prioritization of Cyber Risk
Presenters:
Colleen Lennox
Colleen Lennox is the Founder of Cyber Job Central, a newly formed job board dedicated to Cybersecurity job openings. Colleen has 25+ years in Technical Recruiting and loves to help other find their next great job!
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Date: January 25, 2023
Tags: ISO, ISO/IEC 27032, Cybersecurity Management
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
https://pecb.com/article/cybersecurity-risk-assessment
https://pecb.com/article/a-deeper-understanding-of-cybersecurity
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/BAAl_PI9uRc
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
2. 2
Agenda
Familiarization with CAE’s background and anti-
corruption laws applicable to its operations
Summary of CAE’s Anti-Corruption Policy and processes
Description of CAE’s preventive measures and corporate
culture
Reporting tools and support available for employees
3. 3
CAE Background
CAE is a global leader in training for the civil aviation,
defence and security, and healthcare markets
Founded in 1947, CAE expanded its sales internationally
in the 1980s, became the world leader in the sale of
flight simulators in the 1990s, launched a network of
training centres in early 2000s
Today, CAE has over 8,500 employees in over 35
countries, and operates 67 training locations
CAE’s business is divided in three core business
sectors, each led by a Group President:
Civil Aviation
Defense and Security
Healthcare
4. 4
Anti-Corruption Laws
Any corporation is bound by anti-corruption laws of the
origin country as well as any country in which said
corporation has presence.
Along with local anti-corruption laws, CAE is mostly
concerned with three anti-corruption legislations:
1. The Corruption of Foreign Public Officials Act (CFPOA)
2. The Foreign Corrupt Practices Act (FCPA)
3. The UK Bribery Act (UKBA)
It is important to note that a “foreign official” in the
context of CAE’s operations means any officer or
employee of a state-owned enterprise, or even a
corporation with a majority share owned by the
government.
5. 5
Corruption Risk Profile
CAE’s company profile places it in a position where there is a high
risk of exposure to corruption or unethical behavior for the following
reasons:
Presence in countries with a high corruption index
Independent offices expose CAE to risks of unauthorized payments
Contact with government officials
Use of third parties such as foreign representatives and consultants
There are two main avenues that could put CAE at risk:
Foreign
Reps
Unauthorized
Payments
6. 6
Foreign Representatives
Foreign reps are third parties hired in countries where CAE has
minimal employee presence as they are a cost-effective alternative.
Their main task is to assist CAE in marketing activities and in selling
its products and services.
As CAE is expanding its worldwide presence, the need for
representatives is diminishing. The CAE Compliance Office is
tasked with managing all rep agreements by working in conjunction
with the business unit:
The business unit determines the need for a representative
The Compliance Office conducts a detailed due diligence and
determines the amount that should be paid to the
representative
• Who are the reps? Are they related to government officials?
• Do they have any red flags associated to them?
• What services do they provide for the fee that they are earning?
7. 7
Processes and Safety Measures
Reps go through a rigorous process in order to be hired by CAE
In addition, our foreign rep agreements contain safety measures to
ensure that reps will not use the fees paid as bribes:
Agreements are only signed by the Group President of the applicable
business unit after obtaining approval from the Chief Compliance
Officer
The fee is only paid after a contract is awarded to CAE
The fee is paid to a bank account with the rep’s name using the project
milestones
The fee amount is calculated based on the services provided
Reps go through anti-corruption training and sign anti-corruption
certifications prior to being hired
Rep agreements are only valid for one year, and if they are to be
renewed, the rep must undergo the above process upon renewal
Justification Interview
Due
Diligence
Training and
Certification
Agreement
8. 8
Business Courtesies
Business courtesies help corporations develop and maintain
relationships with customers. However, it is important to understand
the rules concerning the exchange of business courtesies in order to
avoid misconduct and the risk of unauthorized payments.
A business courtesy is deemed unacceptable when it is:
Money or a cash equivalent
Requested by recipient
Extravagant and luxurious
Exchanged with the same party multiple times a year
Provided solely to a spouse or close relative
In CAE’s Anti-Corruption Policy, there are spending limits attributed
to business courtesies. These limits vary depending on what the
purpose is, who the recipient is and in what country the business
courtesy is being exchanged.
9. 9
Prevention
To mitigate the risk of unauthorized payments, CAE requires
employees to present proper justification before using company
funds. There has to be a detailed and valid explanation for the use
as well as prior approval from the employee’s supervisor and the
Finance department.
In addition, CAE’s Internal Audit and the Compliance Office conduct
regular audits and risk assessments of areas that could potentially
be compromised, such as employee spending or fees paid to third
parties.
Our Anti-Corruption Policy and related processes are subject to
continuous improvement in order to adapt to the everchanging
landscape.
CAE’s Political and Charitable Contributions Policy prohibits
employees from making any political donations in CAE’s name, and
all charitable contributions must be made by the Global
Communications department.
10. 10
Red Flags
Here are some of the red flags to watch out for:
Country has a reputation for corruption
Signs of collusion between suppliers and customers
Third parties requesting gifts or cash payments
Excessive or lavish expenses incurred
Frequent complaints about an individual or party
Although these alone are sometimes not enough to
make deductions, they are a signal that prompts us to
investigate further.
11. 11
Management Tone
At CAE, our CEO, as well as all the executive
management committee are continuously vocal about
the importance of ethical conduct.
The Chief Compliance Officer reports monthly to the
management committee on all compliance matters and
reports quarterly to the Board of Directors.
CAE is also a member of the UNGC in support of social
responsibility and ethical practices.
12. 12
Training
Employees are required to go through the online Anti-
Corruption training annually.
In addition to online training, the Compliance Office
conducts live training to several departments. This
training would be customized based on the activities
of each department.
In addition, employees are required to annually certify to
the Code of Conduct.
An anti-corruption manual is distributed to employees for
a quick reference on policy requirements.
13. 13
Whistleblowing
CAE’s Whistleblower Policy encourages employees to
report any suspicious activities that they may witness.
Under this Policy, CAE is not allowed to retaliate against
any whistleblower.
EthicsPoint is an anonymous reporting tool that CAE
offers to its employees.