Where noted, our training courses are applicable to Continuing Professional Education credits for professional certification and reaccreditation packages for Certified Anti-Money Laundering Specialists (ACAMS), Certified Fraud Examiner (ACFE), and Certified Financial Crime Specialist (ACFCS).
A ransomware attack compromises your organization. How do you contain the incident? Whom do you call to respond? What statements are you going to make to the public, shareholders, and board of directors? If you don't know the answers to these questions, you might not be prepared for when an incident occurs. In this training by cybersecurity expert, Jay Rosenberg, you will learn how to prepare, plan, and manage a successful and rapid incident response for your organization.
Presented by: Jay Rosenberg
June 29th, 2021
1 pm EST
The technology today that supports investigations of all types is astounding. These systems and methods can probe all manner of data sets, pulling valuable information from a multitude of sources to support investigative work. However, the time has not yet come for the computer that testifies in court as the investigator or witness. It remains essential for the human investigator to understand how to plan and work with the technology provided and use it in an effective investigation. No matter what technology they use, the investigator needs to inform supervisors and action officials of the status of the investigation. The responsibility still comes down to the investigator to assess needs, measure results, and pull the case together, and this comes down to effective planning.
In this webinar, we will discuss considerations in planning for an effective investigation. Topics we will discuss include:
• A critical thinking approach in case planning;
• Considering necessary expertise, tools and resources;
• The process of violation mapping;
• Incorporating planning as a case management tool.
Participants can expect to gain information that will enable them to better organize, control, and communicate their investigative work.
Presented by: Michael Loughnane
Even the best defenses against cyberattacks have their weaknesses. As quickly as new technologies for verifying user credentials have been deployed, attackers learn to circumvent them. Understanding those weaknesses and how hackers exploit them is key to improving defenses and protecting your valuable resources.
This course, presented by Abi Waddell, illustrates some methods of circumventing current system methods of credential protection on web and other applications. In addition, we will offer recommendations on how organizations can improve the detection and prevention of such attacks.
From this training, students will learn about how hackers work around common defenses such as:
Some technical knowledge is recommended for this course. Useful areas: network administration, IT security, web application development
Presented by: Abi Waddell
In the battle to identify money laundering and terror finance activities, an effective internal audit program is a critical operational need, as well as meeting compliance. Financial institutions and businesses must have in place the processes to both detect and report suspicious actions, while at the same time protecting internal operations. Our training, based on international best practices, provides insights to support your efforts to develop an effective and compliant AML/CFT internal audit program. An effective program can assure that procedures are being followed correctly and ensure that business can continue in an orderly way without important guidelines and regulations being misunderstood or misused, while at the same time identifying suspicious activity.
This online training is presented as a road map in which subject matter expert Jim Wright will show you how to evaluate the effectiveness of your compliance program. Jim will provide a step-by-step guide that will demonstrate how to address those essential elements of the AML/CFT compliance program required for a bank or other entities. With this guide, the auditor will be able know what kinds of documents to select and examine, who within the organization to interview, and what questions to ask. By following each step, you will be better able to measure compliance in each area, and reach a conclusion of compliant, partial compliant, or non-compliant.
Attendees will be able to:
Presented by: Jim Wright