Are you doing sanction checks in your law firm? In the intricate landscape of legal practice, understanding and adhering to the UK's sanctions regime is not just a recommendation; it is mandatory and it is imperative. This course aims to set clear expectations and offer practical support to firms, guiding them away from the pitfalls of breaching the UK's sanctions regime. Who is this for? This 90 minute course is for all legal firms, irrespective of the services you provide. Whether you are navigating the sanctions regime independently or operating under a license from the Office of Financial Sanctions Implementation (OFSI), this course is for you. The course will cover: What are sanctions What do you need to know about the sanctions for your firm How is it different to the AML regime? What controls to put in place? If the firm offers services to sanction areas – what controls? My client has been sanctioned – what do I do? Reporting obligations Using screening tools Licensing How does this impact Legal Professional Privilege? Sanction Risk Assessment Red flags factors Enforcement actions Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Helen Torresi, Consultant, DG Legal Helen is a qualified solicitor with a diverse professional background spanning leadership roles in both the legal and tech/corporate sectors. Throughout her career, she has held key positions such as COLP, HOLP, MLCO, MLRO and DPO for law firms and various regulated businesses and services. Helen’s specialised areas encompass AML, complaint and firm negligence handling, DPA compliance, file review and auditing, law management, and operational effectiveness in law firms, particularly in conveyancing (CQS).
Fraud should not happen, but it does. It can happen at the highest to lowest levels in an organisation. Recent surveys show that incidents of fraud are not decreasing. Fraud costs companies money and, perhaps even more importantly, reputational damage. The losers are not just the shareholders, suppliers, customers, etc, but society as a whole. This programme shows why frauds happen, how organisations put themselves at risk and what they can do to prevent it. This programme will help directors and others understand: The motives for committing fraud Directors' responsibilities for identifying and reporting fraud What types of frauds there are How frauds are perpetrated How they can be prevented How regulators deal with fraud Above all, the principal objective of this programme is to help make your organisation as secure as possible from the threat of fraud. 1 Motives for committing fraud - drivers of fraud Session objective: to understand why people might commit fraud Drivers of fraudulent behaviourAmbitionGreedTheftConceit? And more! 2 Accounting mechanisms that allow fraud Session objective: to review the elements of the accounting, internal control and management processes that allow creative accounting Income or liability? Asset or expense? Coding errors and misclassification Netting off and grossing up Off-balance sheet items 3 Structures that allow fraud Session objective: to consider company and trading structures that allow frauds to be perpetrated Group structures Trading structures Tax havens Importing and exporting 4 Interpretations and other non-compliance that allow fraud Session objective: to look at how creative interpretations of law and accounting practice may permit fraud The place of accounting standards Accounting policies Trading methods The place of auditing standards 5 Money laundering Session objective: to review what constitutes money laundering Types of money laundering Identifying laundering Preventing laundering 6 Preventing fraud - proper management structures Session objective: to review the place of proper corporate governance Corporate governance Company management structure Audit committees The place of internal audit 7 Preventing fraud - proper accounting Session objective: to review best accounting and auditing practice Accounting standards Internal accounting policies Adequacy of internal controls Internal audit 8 Preventing fraud - regulation Session objective: to look at how regulators aim to prevent fraud The regulatory environment Financial services regulation 9 Conclusion Course review Open forum Close 10 Course summary - developing your own cost action plan Group and individual action plans will be prepared with a view to participants identifying their cost risks areas and the techniques which can be immediately applied to improve costing and reduce costs
Level 4 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access
QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support | All-Inclusive Cost
Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments. Overview Identify the functionality and capabilities of Citrix ADC and Citrix Gateway Explain basic Citrix ADC and Gateway network architecture Identify the steps and components to secure Citrix ADC Configure Authentication, Authorization, and Auditing Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway. You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Monitoring and Troubleshooting Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA
3 QLS Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 10 CPD Courses | Lifetime Access
3 QLS Endorsed Diploma | QLS Hard Copy Certificate Included | 10 CPD Courses | Lifetime Access | 24/7 Tutor Support
Level 3 QLS Endorsed Course with FREE Certificate | CPD & CiQ Accredited | 120 CPD Points | Lifetime Access
Level 3 QLS Endorsed Course with FREE Certificate | CPD & CiQ Accredited | 120 CPD Points | Lifetime Access