Suspicious activity: Are you seeing the big picture?
Monitoring customer transactions for suspicious activity — and filing Suspicious Activity Reports (SARs) when appropriate — is a key component of a financial institution’s Bank Secrecy Act / Anti-Money Laundering (BSA/AML) program. Unfortunately, many banks make the mistake of focusing their efforts on deposit accounts and paying less attention to other products and services, particularly […]
Disbursements: Internal Controls in a Remote Environment
As tasks and routines are increasingly being completed remotely due to the COVID-19 emergency, there are some individuals looking to take advantage of the situation. One of the more common fraud schemes to emerge over the past two years, and one that will no doubt increase during this pandemic, is attempted fraud on ACH debits […]
Covid-19: Business Assessment Checklist
From your workforce to your customers to your shareholders, you have a lot of considerations right now. CSH has put together a detailed checklist to help you evaluate your Workforce, Customer, Shareholder-Creditor and Community readiness to handle the current crisis and its aftermath. Download our checklist and start assessing your preparedness.
Top 5 Reasons to Use Cloud-based Data Backup
Data loss often happens when you least expect it. Human error, malicious actors and even natural disasters can wipe out – or hijack – your company’s data at any time. Recent studies show that a staggering 93% of organizations that lose data because of a disaster go out of business within two years. Still, many […]
Emerging trends in third-party risk management
Please note: CPE is only available for live events. It is not available for webinars on-demand. During our last webinar on third-party risk management (A Look at Data Safety and Third-Party Technology Risk Management), we looked at risk management from a data security perspective, and we explored various assessment approaches, current challenges, and potential solutions […]
Cybersecurity for Retailers
Retailers are prime targets for cyberattacks. Is your retail company doing all it can to protect its systems and customer data? The first line of defense against cyberthreats is knowing what kind of threats and vulnerabilities exist so that you can develop a plan to mitigate them. In this recorded webinar, Clark Schaefer Consulting’s Carly […]
Using insurance to manage your nonprofit’s risk
Insurance is the cornerstone of any not-for-profit’s comprehensive risk management plan. It can’t protect your organization from every contingency, but it’s critical to protecting the people, property, funds and support you depend on. Must-have policies Many kinds of insurance coverage are available, but it’s unlikely your organization needs all of them. One type you do […]
A Look at Data Safety and Third-Party Technology Risk Management
Please note: CPE is not available for webinars on-demand. CPE is available only for live events. Presented by: Carly Devlin and Stephen Chasser As organizations are increasingly relying on third-parties for various business processes and services, it’s important, from an information security and regulatory perspective, to understand how the organization’s data is being handled by […]
Are you ready for a catastrophe?
Disaster planning is critical for all companies to help ensure that normal business activities can resume as soon as possible after a disaster strikes. However, dealerships face unique risks when it comes to preparing for catastrophes. Unlike most businesses, the bulk of your inventory is sitting outside, where it’s exposed to the elements. Natural disasters […]
Introduction to the NIST SP 800-171 Framework
Presented By: Richard Collins and Chris Heitkamp In an effort to improve data protection, regulators are increasingly requiring organizations to comply with IT Security best practices. From Department of Defense (DoD) contractors to colleges and universities, NIST SP 800-171 has been breaking out as the baseline standard for such initiatives. This presentation will provide an […]