How Attackers Bypass Website Credential Protection Mechanisms - Registration Open!

Loughnane Associates, LLC
  • Home
  • About Us
  • Our Team
  • Training Courses
  • Reviews
    • Home
    • About Us
    • Our Team
    • Training Courses
    • Reviews

Loughnane Associates, LLC

  • Home
  • About Us
  • Our Team
  • Training Courses
  • Reviews

Loughnane Associates Training Programs

Where noted, our training courses are applicable to Continuing Professional Education credits for professional certification and reaccreditation packages for Certified Anti-Money Laundering Specialists (ACAMS), Certified Fraud Examiner (ACFE), and Certified Financial Crime Specialist (ACFCS).

Check out our introduction to our The Tip of the Spear training series, presented by international banking advisor James Wright and information security consultant and researcher Abi Waddell. Registration for their training sessions is now open!

How Attackers Bypass Website Credential Protection Mechanisms

Even the best defenses against cyberattacks have their weaknesses. As quickly as new technologies for verifying user credentials have been deployed, attackers learn to circumvent them. Understanding those weaknesses and how hackers exploit them is key to improving defenses and protecting your valuable resources.


This course, presented by Abi Waddell, illustrates some methods of circumventing current system methods of credential protection on web and other applications. In addition, we will offer recommendations on how organizations can improve the detection and prevention of such attacks. 


From this training, students will learn about how hackers work around common defenses such as:

  • login timing;
  • multiple logins with the same username;
  • captcha codes;
  • enforced password changes;
  • source IP address blocking.  


Some technical knowledge is recommended for this course. Useful areas: network administration, IT security, web application development

Presented by: Abi Waddell

March 2nd, 2021

 1:00 PM - 2:00 PM EST

Duration: 60 minutes

Registration Fee: $70

Approved for 1 CAMS Credit 

Registration

Las Nuevas Iniciativas de Normativa Anti-legitimación de Activos

Este webinario introduce al profesional de cumplimiento o al investigador policial o de inteligencia de financiamiento ilícito a las nuevas leyes anti-legitimación de activos desarrolladas por los Estados Unidos y la Comunidad Británica comparándolas con la legislación existente en Latinoamérica. 

Se examinarán con especial interés los casos de Panamá, Colombia y de la Republica Dominicana. Por las condiciones geopolíticas que caracterizan a estos países, están han sido utilizados no solo por los carteles de las drogas, sino por otras redes ilícitas, como geografías útiles para desarrollar la infraestructura de financiamiento ilícito y el apoyo logístico de las operaciones criminales. 

El ambiente regulatorio internacional evoluciona rápidamente causando problemas para las instituciones de servicios financieros, estos problemas serán tratados. Seguidamente se ofrecerá ideas y reflexiones que identifiquen posibles acciones preventivas que preparen a las instituciones financieras y otras líneas económicas para adaptarse efectivamente a las nuevas demandas normativas.

Presentado por: Sandra Delgado Rodríguez, de Interlaw Council y, Robert Bacon de Huxley Orion LLC 

2 de marzo de 2021

13:00 - 14:00 EST

Gratis

Registro

Begin with the End in Mind: Case Planning

The technology today that supports investigations of all types is astounding. These systems and methods can probe all manner of data sets, pulling valuable information from a multitude of sources to support investigative work. However, the time has not yet come for the computer that testifies in court as the investigator or witness. It remains essential for the human investigator to understand how to plan and work with the technology provided and use it in an effective investigation. No matter what technology they use, the investigator needs to inform supervisors and action officials of the status of the investigation. The responsibility still comes down to the investigator to assess needs, measure results, and pull the case together, and this comes down to effective planning.


In this webinar, we will discuss considerations in planning for an effective investigation. Topics we will discuss include:

• A critical thinking approach in case planning;

• Considering necessary expertise, tools and resources;

• The process of violation mapping;

• Incorporating planning as a case management tool.


Participants can expect to gain information that will enable them to better organize, control, and communicate their investigative work.

Presented by: Michael Loughnane

March 16th, 2021

1:00 PM EST - 2:15 PM EST

 Duration: 75 minutes

Registration Fee: $70

Registration

The Tip of the Spear: Internal AML/CFT Audit Planning

 In the battle to identify money laundering and terror finance activities, an effective internal audit program is a critical operational need, as well as meeting compliance. Financial institutions and businesses must have in place the processes to both detect and report suspicious actions, while at the same time protecting internal operations. Our training, based on international best practices, provides insights to support your efforts to develop an effective and compliant AML/CFT internal audit program. An effective program can assure that procedures are being followed correctly and ensure that business can continue in an orderly way without important guidelines and regulations being misunderstood or misused, while at the same time identifying suspicious activity.


This online training is presented as a road map in which subject matter expert Jim Wright will show you how to evaluate the effectiveness of your compliance program. Jim will provide a step-by-step guide that will demonstrate how to address those essential elements of the AML/CFT compliance program required for a bank or other entities. With this guide, the auditor will be able know what kinds of documents to select and examine, who within the organization to interview, and what questions to ask. By following each step, you will be better able to measure compliance in each area, and reach a conclusion of compliant, partial compliant, or non-compliant.


Attendees will be able to:

  • develop an effective audit plan to identify audit coverage, including identification of resources, topics, and timeline for carrying out the audit;
  • identify persons assigned to the audit;
  • how this type of audit should align with the bank/business risk assessment activity;
  • questions to ask during interviews;
  • conduct sampling in the five critical areas;
  • communicate the audit findings to management and the board of directors;
  • identify persons assigned to the audit

Presented by: Jim Wright

Postponed

Date TBD


Copyright © 2021 Loughnane Associates, LLC - All Rights Reserved.


Powered by GoDaddy

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

Accept & Close