SARs & Cyber Crimes
On-Demand Webinar
StreamedAug 23, 2023Duration90 minutes
- Unlimited & shareable access starting two business days after live stream
- Available on desktop, mobile & tablet devices 24/7
- Take-away toolkit
- Ability to download webinar video
- Presenter's contact info for questions
With suspicious activity reports, accuracy is imperative.
Cyber-related
issues can bring a different twist. Do you know when to file a SAR on a
potential cyber crime? What is IT’s role? What five things should be contained
in the narrative? This line-by-line analysis will be invaluable.
AFTER
THIS WEBINAR YOU’LL BE ABLE TO:
- Understand what constitutes a cyber crime
- Know when to file a SAR on a cyber crime
- Identify five things that must be in the narrative
- Accurately complete the drop downs on the SAR to reflect the type of crime
- Separate business email compromise (BEC) and email account compromise (EAC)
- Work with IT to develop a referral form
WEBINAR DETAILS
This webinar will address what constitutes a cyber
crime and how to report it in the suspicious activity report. Learn the
difference between BEC and EAC and why this is important in accurately conveying
the circumstances to law enforcement. Join us for a line-by-line look at how to
complete the data fields and write a cyber crime narrative.
WHO SHOULD ATTEND?
This timely webinar will
benefit BSA and IT officers and staff.
TAKE-AWAY TOOLKIT
- SAR handbook
- Employee training log
- Interactive quiz
- PDF of slides and speaker’s contact info for follow-up questions
- Attendance certificate provided to self-report CE credits
NOTE: All materials are subject to copyright. Transmission, retransmission,
or republishing of any webinar to other institutions or those not employed by
your institution is prohibited. Print materials may be copied for eligible
participants only.
Presented By
Gettechnical Inc
Related Webinars
© 2023 FINANCIAL EDUCATION & DEVELOPMENT, INC