Skip to main content
Please wait...

AML Training

  • We have the most successful programs across Chennai, Mumbai, Bangalore and Pune.
  • We conduct 1-2 hrs / 1 to 3 days training on AML, KYC, Terrorist Financing, Trade Based ML and Customer profile covering the following aspects:
    • Introduction and emerging trends in AML.
    • Customer profiling and high risk customers.
    • Designing an effective AML framework.
    • Suspicious transactions and detection.

Operational/ Credit Risk Training

Riskpro conducts 1-2 hours / one to three days program on Operational Risk. We conduct foundational training which can be designed and rolled out across the Company.

Virtual Risk Manager

  • Riskpro provides Virtual Risk Managers (VRM) who would be on our payroll but are fully dedicated to you for the time period like hourly, per week etc. that you have hired them for.
  • Our VRMs can be contacted any time for anything that you need to be done and small conversations with our VRM are always free.

Full/ Part Time Risk Internal Audit Professionals

Due to the importance of regulatory compliances, it has become essential that companies are able to audit the business operations effectively. To meet this growing demand, Riskpro India offers Internal audit and IT audit professionals on a staff augmentation / temporary basis.

Business Responsibility and Sustainability Reporting (BRSR)

The BRSR seeks disclosures from listed entities on their performance against the nine  principles of the ‘National Guidelines  on  Responsible  Business  Conduct (NGBRCs)and reporting under  each  principle is  divided  into essential  and leadership indicators The listed entities are already preparing and disclosing sustainability reports based on internationally accepted reporting  frameworks  (such  as  GRI,  SASB,  TCFD or Integrated  Reporting) may cross-reference  the disclosures  made  under  such framework to the disclosures sought under the BRSR.

DSCI DPF Consulting Services & Training

To protect the privacy of personal information from unauthorized use, disclosure, modification, or misuse, DSCI has conceptualized its approach towards privacy in the DSCI Privacy Framework (DPF©) which is based on the global privacy best practices and frameworks.

Webinar - Supply Chain Risks

Please do join in to understand all about Supply Chain Risks, how to identify them, how to mitigate them, and keep them going.

Webinar - Zapoj - Smart Platform for Critical Event Management

Riskpro in partnership with Zapoj brings to you a Critical Event Management (CEM) platform which provides a clear and detailed understanding of the threat perception, by correlating threats with locations people, facilities, systems, and logistics.

Webinar- Insider Threats

A security danger that comes from within the targeted organization is known as an insider threat. It frequently involves a current or former employee or business acquaintance who improperly utilizes access to privileged accounts or sensitive information within an organization's network. Or the data is transferred or accidentally corrupted. 

Webinar- Interviewing Skills

Learn how to prepare for conducting an interview. Also, learn about the interviewer’s responsibilities towards the organization and towards the candidate. 

Third Party Risk Management - Vendor Risk Management

If you thought third party is all about vendors, think again. Employing a third party means more than just vendor risk management. It also involves suppliers, agents, distributors, accountants, intermediaries and sometimes even customers. All these stakeholders are creating risks for your organisation at all times. Companies have to ensure that there are processes to protect confidential IT information, ensure ethical dealings, mitigating noncompliance with code of conduct and ultimately managing reputation risk.

Personal Data Protection Services (PDP) - India

Once the Bill comes into force, all Indian companies handling, storing or processing personal data will be required to adhere to it. The Bill gives four basic rights to data principals, namely - Right to confirmation and access; Right to correction, Right to Data Portability and Right to Be Forgotten.