Loughnane Associates, LLC
  • Home
  • About Us
  • Our Team
  • Training Courses
  • Videos
  • More
    • Home
    • About Us
    • Our Team
    • Training Courses
    • Videos

Loughnane Associates, LLC

  • Home
  • About Us
  • Our Team
  • Training Courses
  • Videos

Loughnane Associates Training Programs

Where noted, our training courses are applicable to Continuing Professional Education credits for professional certification and reaccreditation packages for Certified Anti-Money Laundering Specialists (ACAMS), Certified Fraud Examiner (ACFE), and Certified Financial Crime Specialist (ACFCS).

Data Protection for US Companies

Data protection and privacy issues are some of the foremost concerns for companies operating today. Even non-security sector companies need to be careful to comply with regulations, and those regulations only get more complicated when international laws come into play. Join Mariam Chaduneli of the Steinlein Group for a discussion of data protection for US companies. This webinar will address US privacy law, the EU-US legal framework for cross-border data transfer, and the scope of the GDPR and requirements for US companies.

Presented by: Mariam Chaduneli

April 20th, 2021

1 pm EST

Free

Register

Your Organization Just Got Hacked. Now What?

A ransomware attack compromises your organization. How do you contain the incident? Whom do you call to respond? What statements are you going to make to the public, shareholders, and board of directors? If you don't know the answers to these questions, you might not be prepared for when an incident occurs. In this training by cybersecurity expert, Jay Rosenberg, you will learn how to prepare, plan, and manage a successful and rapid incident response for your organization.

Presented by: Jay Rosenberg

May 4th, 2021

1 pm EST

1 hour | $150

1 CPE Credit Available

Register

Begin with the End in Mind: Case Planning

The technology today that supports investigations of all types is astounding. These systems and methods can probe all manner of data sets, pulling valuable information from a multitude of sources to support investigative work. However, the time has not yet come for the computer that testifies in court as the investigator or witness. It remains essential for the human investigator to understand how to plan and work with the technology provided and use it in an effective investigation. No matter what technology they use, the investigator needs to inform supervisors and action officials of the status of the investigation. The responsibility still comes down to the investigator to assess needs, measure results, and pull the case together, and this comes down to effective planning.


In this webinar, we will discuss considerations in planning for an effective investigation. Topics we will discuss include:

• A critical thinking approach in case planning;

• Considering necessary expertise, tools and resources;

• The process of violation mapping;

• Incorporating planning as a case management tool.


Participants can expect to gain information that will enable them to better organize, control, and communicate their investigative work.

Presented by: Michael Loughnane

Date TBD

How Attackers Bypass Website Credential Protection Mechanisms

Even the best defenses against cyberattacks have their weaknesses. As quickly as new technologies for verifying user credentials have been deployed, attackers learn to circumvent them. Understanding those weaknesses and how hackers exploit them is key to improving defenses and protecting your valuable resources.


This course, presented by Abi Waddell, illustrates some methods of circumventing current system methods of credential protection on web and other applications. In addition, we will offer recommendations on how organizations can improve the detection and prevention of such attacks. 


From this training, students will learn about how hackers work around common defenses such as:

  • login timing;
  • multiple logins with the same username;
  • captcha codes;
  • enforced password changes;
  • source IP address blocking.  


Some technical knowledge is recommended for this course. Useful areas: network administration, IT security, web application development

Presented by: Abi Waddell

Date TBA

The Tip of the Spear: Internal AML/CFT Audit Planning

 In the battle to identify money laundering and terror finance activities, an effective internal audit program is a critical operational need, as well as meeting compliance. Financial institutions and businesses must have in place the processes to both detect and report suspicious actions, while at the same time protecting internal operations. Our training, based on international best practices, provides insights to support your efforts to develop an effective and compliant AML/CFT internal audit program. An effective program can assure that procedures are being followed correctly and ensure that business can continue in an orderly way without important guidelines and regulations being misunderstood or misused, while at the same time identifying suspicious activity.


This online training is presented as a road map in which subject matter expert Jim Wright will show you how to evaluate the effectiveness of your compliance program. Jim will provide a step-by-step guide that will demonstrate how to address those essential elements of the AML/CFT compliance program required for a bank or other entities. With this guide, the auditor will be able know what kinds of documents to select and examine, who within the organization to interview, and what questions to ask. By following each step, you will be better able to measure compliance in each area, and reach a conclusion of compliant, partial compliant, or non-compliant.


Attendees will be able to:

  • develop an effective audit plan to identify audit coverage, including identification of resources, topics, and timeline for carrying out the audit;
  • identify persons assigned to the audit;
  • how this type of audit should align with the bank/business risk assessment activity;
  • questions to ask during interviews;
  • conduct sampling in the five critical areas;
  • communicate the audit findings to management and the board of directors;
  • identify persons assigned to the audit

Presented by: Jim Wright

Date TBA


Copyright © 2021 Loughnane Associates, LLC - All Rights Reserved.


Powered by GoDaddy

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

Accept & Close