SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Live Webinar
February 10, 2016
A SPECIAL WEBCAST FROM ETHISPHERE AND
COMPLIANCE STRATEGY
AND PERFORMANCE
© 2015. All Rights Reserved | 2
SPEAKERS
Patrick Quinlan
CEO
Convercent
Erica Salmon Byrne
Executive Vice President, Compliance &
Governance Services
Ethisphere
Agenda
Key Data &
Benchmarks
to leverage
Emerging Best
Practices
to adopt
Predictions for 2016
to keep a close eye on
© 2015. All Rights Reserved | 3
INFLUENCE & STRATEGY
© 2015. All Rights Reserved | 4
Budgets and visibilitytrendingupwards
© 2015. All Rights Reserved | 5
TREND ALERT
“
Whether the compliance officer reports to the general counsel or the
CEO is not going to govern an analysis of whether the compliance
function is working. What’s more important than where compliance
is housed is the independence of the function, that the compliance
officer has a ‘voice at the table’and can be heard by the board.”
—Andrew Weissmann
Chief, Fraud Section – Criminal Division
U.S. Department of Justice
16%
of surveyed CCOs report to the CEO, compared
to 36% of the World’s Most Ethical Companies.
© 2015. All Rights Reserved | 6
Compliancemore informed, but not influential
© 2015. All Rights Reserved | 7
Risk assessments, not strategy,driving compliancepriorities
© 2015. All Rights Reserved | 8
TREND ALERT
“Buyers splashedout $3.8 trillionon mergers
and acquisitions in 2015, the highest amount
ever.”
34%
of employees at
companies in M&A
situations experienced
retaliation—twice the rate
as more stable
workplaces.
27%
increase in observed
misconduct during
M&A transitions
© 2015. All Rights Reserved | 9
DATA & METRICS
© 2015. All Rights Reserved | 10
Lack of data availability, access and centralization
© 2015. All Rights Reserved | 11
TREND ALERT
“
Strong compliance must be data-driven. A good compliance officer
should be able to rattle off a list [of the types of data they would
monitor] off the top of their heads and their list will tell me the level
of their sophistication as a compliance professional. Similarly, when
I look at compliance programs, the kind of data that they do and do
not monitor tells me a lot abouthow sophisticated their program is.”
—Hui Chen
Compliance Expert, Fraud Section
Criminal Division
U.S. Department of Justice
© 2015. All Rights Reserved | 12
Compliancedrawing on other department data
© 2015. All Rights Reserved | 13
TREND ALERT
“
Every piece of your program needs to actually be tied to the
operations of your company. When you don’t tie those systems
together, it’s very easy to ignore the other system that’s not necessary
to make the transaction happen.”
—Hui Chen
Compliance Expert, Fraud Section
Criminal Division
U.S. Department of Justice
© 2015. All Rights Reserved | 14
ROI most desired—and elusive—metric
© 2015. All Rights Reserved | 15
TREND ALERT
“
Companies have searched for reasonable metrics to assess how likely
their employees are to follow their rules...But years into this quest, many
compliance experts are no closer to agreeing what exactly a culture of
compliance is or how to measure it.”
© 2015. All Rights Reserved | 16
PROGRAM REPORTING
© 2015. All Rights Reserved | 17
State of the programreports deliveredat least annually
© 2015. All Rights Reserved | 18
Report frequency, content, format and audiencevary
© 2015. All Rights Reserved | 19
TREND ALERT
“
A firm’s culture is a key driver behind the behavior of those in it. In
many cases, where things have gone wrong in a firm, a cultural issue
is at the heart of the problem.”
—UK Financial ConductAuthority
Compliance Culture—A Timeline of Regulators’Comments
WSJ
© 2015. All Rights Reserved | 20
TREND ALERT
“
The fact is that many of our internal processes, controls, and actions
around compliance have been inadequate, and some decisions have just
been plain wrong. As a result, [CEO Conrad] Parker has resigned. In
order for us to move forward as a company, we cannot seek to hide or
downplaythe problem. We must admit it and remediate it as soon as
possible.
—David Sacks
CEO, Zenefits
BusinessInsider
© 2015. All Rights Reserved | 21
InconsistentReportingPractices
© 2015. All Rights Reserved | 22
Q&A

Más contenido relacionado

La actualidad más candente

ACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining ForcesACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining ForcesJen Dunham, CFE
 
7 Steps to Build an Effective Corporate Compliance Strategy
7 Steps to Build an Effective Corporate Compliance Strategy7 Steps to Build an Effective Corporate Compliance Strategy
7 Steps to Build an Effective Corporate Compliance StrategyMaarten Boonen
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firmsJohn Davis
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision makingTalkTalk Business
 
AMLMaps - Research & Highlights Report
AMLMaps - Research & Highlights ReportAMLMaps - Research & Highlights Report
AMLMaps - Research & Highlights ReportAbhishek Bali
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
 
A Report on Cybersecurity
A Report on CybersecurityA Report on Cybersecurity
A Report on CybersecurityPulse Q&A
 

La actualidad más candente (9)

ACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining ForcesACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining Forces
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
7 Steps to Build an Effective Corporate Compliance Strategy
7 Steps to Build an Effective Corporate Compliance Strategy7 Steps to Build an Effective Corporate Compliance Strategy
7 Steps to Build an Effective Corporate Compliance Strategy
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firms
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision making
 
AMLMaps - Research & Highlights Report
AMLMaps - Research & Highlights ReportAMLMaps - Research & Highlights Report
AMLMaps - Research & Highlights Report
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security Guarantees
 
A Report on Cybersecurity
A Report on CybersecurityA Report on Cybersecurity
A Report on Cybersecurity
 

Destacado

255 274 - relatório final inquérito
255 274 - relatório final inquérito255 274 - relatório final inquérito
255 274 - relatório final inquéritoRoberto Rabat Chame
 
Entrepreneur's Guide to Building a World Class Sales Organization
Entrepreneur's Guide to Building a World Class Sales OrganizationEntrepreneur's Guide to Building a World Class Sales Organization
Entrepreneur's Guide to Building a World Class Sales Organizationalexzente
 
Catalogo "Sembrano tracce, sono invece... sapori"
Catalogo  "Sembrano tracce, sono invece... sapori"Catalogo  "Sembrano tracce, sono invece... sapori"
Catalogo "Sembrano tracce, sono invece... sapori"saramontani
 
Success Factors and Failure Points in Biopharmaceutical Product Launches: An ...
Success Factors and Failure Points in Biopharmaceutical Product Launches: An ...Success Factors and Failure Points in Biopharmaceutical Product Launches: An ...
Success Factors and Failure Points in Biopharmaceutical Product Launches: An ...Best Practices
 
Conceptos Básicos Biología
Conceptos Básicos BiologíaConceptos Básicos Biología
Conceptos Básicos BiologíaMaine Santillán
 
Ochrona klientów porównanie zabezpieczeń bankowych oraz platformy wymiany w...
Ochrona klientów   porównanie zabezpieczeń bankowych oraz platformy wymiany w...Ochrona klientów   porównanie zabezpieczeń bankowych oraz platformy wymiany w...
Ochrona klientów porównanie zabezpieczeń bankowych oraz platformy wymiany w...Sylwester Suszek
 

Destacado (10)

Seo san diego2
Seo san diego2Seo san diego2
Seo san diego2
 
255 274 - relatório final inquérito
255 274 - relatório final inquérito255 274 - relatório final inquérito
255 274 - relatório final inquérito
 
Afip
AfipAfip
Afip
 
Entrepreneur's Guide to Building a World Class Sales Organization
Entrepreneur's Guide to Building a World Class Sales OrganizationEntrepreneur's Guide to Building a World Class Sales Organization
Entrepreneur's Guide to Building a World Class Sales Organization
 
Resumen de encuesta
Resumen de encuestaResumen de encuesta
Resumen de encuesta
 
Catalogo "Sembrano tracce, sono invece... sapori"
Catalogo  "Sembrano tracce, sono invece... sapori"Catalogo  "Sembrano tracce, sono invece... sapori"
Catalogo "Sembrano tracce, sono invece... sapori"
 
Success Factors and Failure Points in Biopharmaceutical Product Launches: An ...
Success Factors and Failure Points in Biopharmaceutical Product Launches: An ...Success Factors and Failure Points in Biopharmaceutical Product Launches: An ...
Success Factors and Failure Points in Biopharmaceutical Product Launches: An ...
 
Conceptos Básicos Biología
Conceptos Básicos BiologíaConceptos Básicos Biología
Conceptos Básicos Biología
 
Ochrona klientów porównanie zabezpieczeń bankowych oraz platformy wymiany w...
Ochrona klientów   porównanie zabezpieczeń bankowych oraz platformy wymiany w...Ochrona klientów   porównanie zabezpieczeń bankowych oraz platformy wymiany w...
Ochrona klientów porównanie zabezpieczeń bankowych oraz platformy wymiany w...
 
Webdesign, UX et UCD #7
Webdesign, UX et UCD #7Webdesign, UX et UCD #7
Webdesign, UX et UCD #7
 

Similar a Convercent Webinar Ethisphere Strategy Report

Compliance Strategy and Performance
Compliance Strategy and PerformanceCompliance Strategy and Performance
Compliance Strategy and PerformanceEthisphere
 
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...Amber Clark
 
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...Ethisphere
 
Webinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB SectorsWebinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB SectorsSecurefact
 
Pwc 2015 Technology Sector Sec Comment Letter Trends
Pwc 2015 Technology Sector Sec Comment Letter TrendsPwc 2015 Technology Sector Sec Comment Letter Trends
Pwc 2015 Technology Sector Sec Comment Letter TrendsPwC
 
2016 - TIA NSW 9th Annual Tax Forum - Using data and analytics to support pub...
2016 - TIA NSW 9th Annual Tax Forum - Using data and analytics to support pub...2016 - TIA NSW 9th Annual Tax Forum - Using data and analytics to support pub...
2016 - TIA NSW 9th Annual Tax Forum - Using data and analytics to support pub...Bruce Collins
 
Anti-Bribery and Corruption Compliance for Third Parties
Anti-Bribery and Corruption Compliance for Third PartiesAnti-Bribery and Corruption Compliance for Third Parties
Anti-Bribery and Corruption Compliance for Third PartiesDun & Bradstreet
 
BCBS239 - A Roadmap for Data Governance - 04202016.pdf
BCBS239 - A Roadmap for Data Governance - 04202016.pdfBCBS239 - A Roadmap for Data Governance - 04202016.pdf
BCBS239 - A Roadmap for Data Governance - 04202016.pdfssusere0e4e8
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Craig Taggart MBA
 
2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference PresentationRon Steinkamp
 
2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference PresentationRon Steinkamp
 
Fraud Control Framework
Fraud Control FrameworkFraud Control Framework
Fraud Control FrameworkRavi Nayak
 
The Evolving Role of the Chief Compliance Officer
The Evolving Role of the Chief Compliance OfficerThe Evolving Role of the Chief Compliance Officer
The Evolving Role of the Chief Compliance OfficerConvercent
 
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"NICSA
 
Essential Elements of Global Compliance Programs
Essential Elements of Global Compliance ProgramsEssential Elements of Global Compliance Programs
Essential Elements of Global Compliance ProgramsEthisphere
 
Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015Ruoh Yi Tham
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramPerficient, Inc.
 

Similar a Convercent Webinar Ethisphere Strategy Report (20)

Compliance Strategy and Performance
Compliance Strategy and PerformanceCompliance Strategy and Performance
Compliance Strategy and Performance
 
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...
 
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
 
Webinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB SectorsWebinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
Webinar Presentation: Enhancing AML Compliance Regimes in MSB Sectors
 
Pwc 2015 Technology Sector Sec Comment Letter Trends
Pwc 2015 Technology Sector Sec Comment Letter TrendsPwc 2015 Technology Sector Sec Comment Letter Trends
Pwc 2015 Technology Sector Sec Comment Letter Trends
 
2016 - TIA NSW 9th Annual Tax Forum - Using data and analytics to support pub...
2016 - TIA NSW 9th Annual Tax Forum - Using data and analytics to support pub...2016 - TIA NSW 9th Annual Tax Forum - Using data and analytics to support pub...
2016 - TIA NSW 9th Annual Tax Forum - Using data and analytics to support pub...
 
Anti-Bribery and Corruption Compliance for Third Parties
Anti-Bribery and Corruption Compliance for Third PartiesAnti-Bribery and Corruption Compliance for Third Parties
Anti-Bribery and Corruption Compliance for Third Parties
 
It52015 slides
It52015 slidesIt52015 slides
It52015 slides
 
BCBS239 - A Roadmap for Data Governance - 04202016.pdf
BCBS239 - A Roadmap for Data Governance - 04202016.pdfBCBS239 - A Roadmap for Data Governance - 04202016.pdf
BCBS239 - A Roadmap for Data Governance - 04202016.pdf
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
 
2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation
 
2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation
 
FCR Report 2017
FCR Report 2017FCR Report 2017
FCR Report 2017
 
Fraud Control Framework
Fraud Control FrameworkFraud Control Framework
Fraud Control Framework
 
The Evolving Role of the Chief Compliance Officer
The Evolving Role of the Chief Compliance OfficerThe Evolving Role of the Chief Compliance Officer
The Evolving Role of the Chief Compliance Officer
 
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
 
Essential Elements of Global Compliance Programs
Essential Elements of Global Compliance ProgramsEssential Elements of Global Compliance Programs
Essential Elements of Global Compliance Programs
 
Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
 
complianceweek2015_agenda_brochure
complianceweek2015_agenda_brochurecomplianceweek2015_agenda_brochure
complianceweek2015_agenda_brochure
 

Último

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 

Último (20)

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 

Convercent Webinar Ethisphere Strategy Report

  • 1. Live Webinar February 10, 2016 A SPECIAL WEBCAST FROM ETHISPHERE AND COMPLIANCE STRATEGY AND PERFORMANCE
  • 2. © 2015. All Rights Reserved | 2 SPEAKERS Patrick Quinlan CEO Convercent Erica Salmon Byrne Executive Vice President, Compliance & Governance Services Ethisphere Agenda Key Data & Benchmarks to leverage Emerging Best Practices to adopt Predictions for 2016 to keep a close eye on
  • 3. © 2015. All Rights Reserved | 3 INFLUENCE & STRATEGY
  • 4. © 2015. All Rights Reserved | 4 Budgets and visibilitytrendingupwards
  • 5. © 2015. All Rights Reserved | 5 TREND ALERT “ Whether the compliance officer reports to the general counsel or the CEO is not going to govern an analysis of whether the compliance function is working. What’s more important than where compliance is housed is the independence of the function, that the compliance officer has a ‘voice at the table’and can be heard by the board.” —Andrew Weissmann Chief, Fraud Section – Criminal Division U.S. Department of Justice 16% of surveyed CCOs report to the CEO, compared to 36% of the World’s Most Ethical Companies.
  • 6. © 2015. All Rights Reserved | 6 Compliancemore informed, but not influential
  • 7. © 2015. All Rights Reserved | 7 Risk assessments, not strategy,driving compliancepriorities
  • 8. © 2015. All Rights Reserved | 8 TREND ALERT “Buyers splashedout $3.8 trillionon mergers and acquisitions in 2015, the highest amount ever.” 34% of employees at companies in M&A situations experienced retaliation—twice the rate as more stable workplaces. 27% increase in observed misconduct during M&A transitions
  • 9. © 2015. All Rights Reserved | 9 DATA & METRICS
  • 10. © 2015. All Rights Reserved | 10 Lack of data availability, access and centralization
  • 11. © 2015. All Rights Reserved | 11 TREND ALERT “ Strong compliance must be data-driven. A good compliance officer should be able to rattle off a list [of the types of data they would monitor] off the top of their heads and their list will tell me the level of their sophistication as a compliance professional. Similarly, when I look at compliance programs, the kind of data that they do and do not monitor tells me a lot abouthow sophisticated their program is.” —Hui Chen Compliance Expert, Fraud Section Criminal Division U.S. Department of Justice
  • 12. © 2015. All Rights Reserved | 12 Compliancedrawing on other department data
  • 13. © 2015. All Rights Reserved | 13 TREND ALERT “ Every piece of your program needs to actually be tied to the operations of your company. When you don’t tie those systems together, it’s very easy to ignore the other system that’s not necessary to make the transaction happen.” —Hui Chen Compliance Expert, Fraud Section Criminal Division U.S. Department of Justice
  • 14. © 2015. All Rights Reserved | 14 ROI most desired—and elusive—metric
  • 15. © 2015. All Rights Reserved | 15 TREND ALERT “ Companies have searched for reasonable metrics to assess how likely their employees are to follow their rules...But years into this quest, many compliance experts are no closer to agreeing what exactly a culture of compliance is or how to measure it.”
  • 16. © 2015. All Rights Reserved | 16 PROGRAM REPORTING
  • 17. © 2015. All Rights Reserved | 17 State of the programreports deliveredat least annually
  • 18. © 2015. All Rights Reserved | 18 Report frequency, content, format and audiencevary
  • 19. © 2015. All Rights Reserved | 19 TREND ALERT “ A firm’s culture is a key driver behind the behavior of those in it. In many cases, where things have gone wrong in a firm, a cultural issue is at the heart of the problem.” —UK Financial ConductAuthority Compliance Culture—A Timeline of Regulators’Comments WSJ
  • 20. © 2015. All Rights Reserved | 20 TREND ALERT “ The fact is that many of our internal processes, controls, and actions around compliance have been inadequate, and some decisions have just been plain wrong. As a result, [CEO Conrad] Parker has resigned. In order for us to move forward as a company, we cannot seek to hide or downplaythe problem. We must admit it and remediate it as soon as possible. —David Sacks CEO, Zenefits BusinessInsider
  • 21. © 2015. All Rights Reserved | 21 InconsistentReportingPractices
  • 22. © 2015. All Rights Reserved | 22 Q&A