Risk and Compliance Services


Webinar- Comparative Analysis-New Indian Data Standard vs Global Privacy Regulations

 

In the light of the new data privacy regulation coming into force, organizations have to initiate compliance measures for adding in new provisions and understand overlapping controls.

In this webinar, the speaker will help you understand the salient…


Internal Audit Software

 

Overview of Internal Audit Software

Internal Audit is an important function of an organization. If the department is not able to manage the audit process efficiently, then it is not able to maximize its value to the organization. Automation is one way to effectively make…


Whistleblowing Software - Third Party Ethics Helpline

 

Overview of the Whistleblowing Software

  • Encourages internal reporting before venturing outside to the media, the regulator, or social media
  • A system for employees to red-flag actual or potential violations of the Company’s Code-of-Conduct,…

Modules of Legal Compliance

 

Overview of Compliance & Its Modules

Managing compliances manually can be a daunting task. With new regulations and rules being enforced regularly, companies may find it challenging to meet all new compliances. To make the compliance process easier, Riskpro has…


Webinar- Implementing Zero Trust: A Model For Effective Cybersecurity

 

Traditional network security focuses on perimeter defenses. Once inside the network perimeter, users are “trusted” and often given broad access to many corporate resources. But threat actors can come from inside or outside the network, and several high-profile…


Webinar- Risk Management Software Demo

 

Risk HAWC is a Fully Integrated, Flexible, & Dynamic Risk & Compliance Management System. The tool enables you to actively manage risk exposures with insightful configurable dashboards and it has a strong Compliance Management Capability.


Webinar- Accounting Automation To Improve Your Working Capital And Financial Reporting

 

With the advent of Industry 4.0, millions of businesses are utilizing advanced technology like the Internet of things (IoT), Artificial Intelligence, Machine Learning for scalability. It's high time, Indian businesses start leveraging such technologies to grow at the fastest speed with…


NESA Compliance Services

 

  • Comply with security requirements under the ‘NESA’ Standard with our NESA Compliance Services.
  • Fortify the security of your basic and crucial information with the help of our experienced technical professionals.
  • Riskpro professionals have years of proven…

Recent RBI Guidelines - Digital Payment Security Governance

RBI has mandated Regulated Entities (REs) like Scheduled Commercial Banks (excluding Regional Rural Banks), Small Finance Banks; Payments Banks; and Credit Card issuing NBFCs to implement a Digital Payment Security Control framework via circular DoS.CO.CSITE.SEC.No.1852/31.01.…


21CFR Part11 Cloud based GxP Compliance

The term GxP is a general abbreviation for good practice guidelines and regulations in the life sciences industry, including good clinical, laboratory, manufacturing, and other practices.  Computerized systems that use GxP processes require validation of adherence to GxP requirements…


Webinar- Cyber Security Demystified

The webinar on Cybersecurity Demystified basically unwinds the importance of what Cybersecurity is all about and its objectives and understands why Cybersecurity is so important. The webinar will also emphasize on implementation of cybersecurity and in accordance with…


Webinar- Digitize Your Legal Compliance Program

Managing compliances manually can be a daunting task. With new regulations and rules being enforced regularly, companies may find it challenging to meet all new compliances. To make the compliance process easier, Avantis RegTech has created a legal compliance product for…


Webinar- Setting Up a Successful Whistleblowing Program

Evolving laws and the need to implement global best practices in corporate governance have made organizations in India aware of the necessity of putting in place effective whistle-blowing mechanisms (vigil mechanisms) in their business operations. This webinar focuses on the key elements of a…


C-TPAT Audits

The Customs-Trade Partnership Against Terrorism (C-TPAT) is a supply chain security audit that is driven by the US Customs and Border Protection. It helps improve the security of those companies that are involved in the supply chain with respect to transactions with USA. IT helps to mitigate…


Webinar- ISAE 3402

The widespread use of outsourcing requires Service Organisations to better manage their risks associated with outsourced services. More specifically, the clients of Service Organisation i.e. User Organisations require a degree of assurance on well-established Internal Control Framework of…


Webinar- Training on Anti-Bribery

Riskpro is hosting an interesting webinar on Anti-Bribery which will provide an introduction and overview on Foreign Corrupt Practices Act (FCPA), World Bank’s Integrity Program and Indian Prevention of Corruption Act (PCA), Differences between Bribery, Corruption, Gratification, Facilitation…


Certificate Course in Anti-Money Laundering - Online Batches

EVENT OVERVIEW:

Certificate Course in Anti Money Launder (AML) is a unique 4 days, 3 hours each day covering comprehensive training to enhance your knowledge in the field of AML/KYC. Essential for everyone working in Banking, Securities, Insurance, or any Financial Institution. For more…


Prevention of Insider Trading- Training

Overview of Insider Trading

The trading of the company shares based on the inside information about the company (which is not available to the general public) is known as Insider Trading. In simple terms, the act of doing Trading on the basis of “Unpublished Price Sensitive…


Third Party Due Diligence

If you are a business owner, there is a high chance you’re dependent on third parties to run your business. Conducting a background check on third parties is known as Third-Party Due Diligence. Nowadays, it is extremely necessary to find out about the third parties before getting associated with…


Cybersecurity Maturity Model Certification (CMMC)

If you have never heard of the words CMMC, don't worry. You are not alone. It is a recent regulation and it is not yet fully in force. But, if will gain momentum in the information security and data privacy domain like no other regulation.

Current Updates

CMMC is not a…


Webinar- India's Personal Data Protection Regulation - It's the Final Countdown

The webinar covers the salient features of the Indian Personal Data Protection (PDP) Bill. The webinar also covers the alignment of Indian regulation to global data privacy practices. The webinar will cover the Salient Features, What has changed in the last 6 months, Data Localisation and its…


Webinar- Manage Supply Chain Disruptions and Mitigate Vendor Risks

The pandemic has created uncertainty in the quality and reliability of supply chain partners and the logistics challenges. As you look on to onboard a new set of suppliers, learn what are the challenges in supply change, and how to mitigate Vendor risks. To conclude, learn about TPRM or Third…


Webinar- Data Localisation - India's Data Privacy Framework and Its Challenges

The webinar will provide an overview of Data Localization in terms of its growing importance, feasibility, and implementation in reference to the Personal Data Protection Bill 2019. The speaker will share an overview of the Data Privacy Framework recommended by the Data Security Council of India…


Effective & Efficient ISO 27001 Process Management Using Risk HAWC

Join this webinar to discover how Risk HAWC can help your business effectively and efficiently manage your ISO 27001 policies, controls, and records. These activities are critical to managing your exposure and also to maintain your certification. Also, Risk HAWC's built-in Audit tool will let…