For some attacks, the amount of time to compromise and exfiltrate data is measured in seconds. Time is of the essence when a potential incident occurs.
ComplianceCasts ™
- juin 7, 202328 June, 2023Join our Webinar for an informative look at how to stay ahead of the composite...mai 29, 2023
Webinar: Fireside Chat with Natasha Vij Greiner and Peter B Driscoll
6 June, 2023Fireside Chat with Natasha Vij Greiner, Deputy Director and National Associate ...avril 20, 2023Webinar: It’s Not Too Early! Get Prepared Now for EMIR Refit
April 20, 2023The European Market Infrastructure Regulation (EMIR) Refit is designed to sim...octobre 5, 2022Webinar: Fireside Chat with Richard Best, Director, Division of Examinations, SEC
November 02, 2022Joined by: Peter Driscoll, Partner, PwC and Kristin Snyder, Partner, Debev...septembre 20, 2022Webinar: Unpacking the SEC Cybersecurity Rules and Impacts
September 20, 2022The U.S. Securities and Exchange Commission (SEC) has moved a step closer to adoption of its propos...septembre 20, 2022Webinar: Navigating the Road to SEC Compliance: SEC Marketing Rule
September 15, 2022The hour long webinar saw Confluence thought leadership and industry experts discuss a range of SEC...août 1, 2022Webinar: Charting a Path to SFDR and PRIIPs KID Deadlines
August 1, 2022On 13 July 2022, we hosted a panel discussion with industry leaders, moderated by Shane Flatman, Senior ...mars 21, 2022Dissecting the SEC’s Proposed Cyber Rules: Practical Takeaways
March 21, 2022New cybersecurity rules are on the horizon for investment advisers and investment companies......
Subscribe today and receive our latest industry updates and articles.
You may unsubscribe at anytime with our simple “unsubscribe” link at the bottom of each communication. Please see our privacy notices below for further information, including a list of affiliates covered by this consent.
Financial services are target No. 1. That was confirmed in a 2014 SEC cybersecurity roundtable when Larry Zelvin, then a…
It seems like there’s a new data breach in the news every other week. The fact is that hacking tools…
Think cybersecurity breaches won’t happen to your firm? It may be time to reconsider. Cybersecurity breaches are becoming much more…
When investment advisers use the cloud, they are making a conscious, informed decision to outsource tasks to vendors who may…
Companies struggling with Word, Excel and other traditional applications to support compliance functions, often lack guidance when evaluating tailored software…
Investment advisory firms and related individuals provide “disciplinary disclosures” to the public and the regulators though registration and reporting filings,…
Regulatory Concerns for Data Loss Prevention How confident are you in your firm’s information technology controls to prevent privacy breaches?…
50 Due Diligence Questions to Ask Your Cloud Services Provider You’ve made the decision to use cloud-based services. Selecting the…
In the financial services world, we frequently hear the mantra that advisers, as fiduciaries, have an obligation to seek “best…
It’s Monday morning. You’ve barely had time to set your coffee down on your desk and pull up your email…
The breadth and destructive force of Hurricane Sandy, which in October 2012 spread across 15 states as the largest Atlantic…
Privacy Overview
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
You can adjust all of your cookie settings by navigating the tabs below.
You can view our full privacy notice here.