For some attacks, the amount of time to compromise and exfiltrate data is measured in seconds. Time is of the essence when a potential incident occurs.

ComplianceCasts ™

- Juni 7, 202328 June, 2023Join our Webinar for an informative look at how to stay ahead of the composite...
- Mai 29, 2023
Webinar: Fireside Chat with Natasha Vij Greiner and Peter B Driscoll
6 June, 2023Fireside Chat with Natasha Vij Greiner, Deputy Director and National Associate ... - April 20, 2023
Webinar: It’s Not Too Early! Get Prepared Now for EMIR Refit
April 20, 2023The European Market Infrastructure Regulation (EMIR) Refit is designed to sim... - Oktober 5, 2022
Webinar: Fireside Chat with Richard Best, Director, Division of Examinations, SEC
November 02, 2022Joined by: Peter Driscoll, Partner, PwC and Kristin Snyder, Partner, Debev... - September 20, 2022
Webinar: Unpacking the SEC Cybersecurity Rules and Impacts
September 20, 2022The U.S. Securities and Exchange Commission (SEC) has moved a step closer to adoption of its propos... - September 20, 2022
Webinar: Navigating the Road to SEC Compliance: SEC Marketing Rule
September 15, 2022The hour long webinar saw Confluence thought leadership and industry experts discuss a range of SEC... - August 1, 2022
Webinar: Charting a Path to SFDR and PRIIPs KID Deadlines
August 1, 2022On 13 July 2022, we hosted a panel discussion with industry leaders, moderated by Shane Flatman, Senior ... - März 21, 2022
Dissecting the SEC’s Proposed Cyber Rules: Practical Takeaways
March 21, 2022New cybersecurity rules are on the horizon for investment advisers and investment companies......
Subscribe today and receive our latest industry updates and articles.
You may unsubscribe at anytime with our simple “unsubscribe” link at the bottom of each communication. Please see our privacy notices below for further information, including a list of affiliates covered by this consent.
Financial services are target No. 1. That was confirmed in a 2014 SEC cybersecurity roundtable when Larry Zelvin, then a…
It seems like there’s a new data breach in the news every other week. The fact is that hacking tools…
Think cybersecurity breaches won’t happen to your firm? It may be time to reconsider. Cybersecurity breaches are becoming much more…
When investment advisers use the cloud, they are making a conscious, informed decision to outsource tasks to vendors who may…
Companies struggling with Word, Excel and other traditional applications to support compliance functions, often lack guidance when evaluating tailored software…
Investment advisory firms and related individuals provide “disciplinary disclosures” to the public and the regulators though registration and reporting filings,…
Regulatory Concerns for Data Loss Prevention How confident are you in your firm’s information technology controls to prevent privacy breaches?…
50 Due Diligence Questions to Ask Your Cloud Services Provider You’ve made the decision to use cloud-based services. Selecting the…
In the financial services world, we frequently hear the mantra that advisers, as fiduciaries, have an obligation to seek “best…
It’s Monday morning. You’ve barely had time to set your coffee down on your desk and pull up your email…
The breadth and destructive force of Hurricane Sandy, which in October 2012 spread across 15 states as the largest Atlantic…