SARs & Cyber Crimes

On-Demand Webinar:
StreamedAug 23, 2023Duration90 minutes
  • Unlimited & shareable access starting two business days after live stream
  • Available on desktop, mobile & tablet devices 24/7
  • Take-away toolkit
  • Ability to download webinar video
  • Presenter's contact info for questions
See Registration Options

With suspicious activity reports, accuracy is imperative.

Cyber-related issues can bring a different twist. Do you know when to file a SAR on a potential cyber crime? What is IT’s role? What five things should be contained in the narrative? This line-by-line analysis will be invaluable.
 
AFTER THIS WEBINAR YOU’LL BE ABLE TO:
  • Understand what constitutes a cyber crime
  • Know when to file a SAR on a cyber crime
  • Identify five things that must be in the narrative
  • Accurately complete the drop downs on the SAR to reflect the type of crime
  • Separate business email compromise (BEC) and email account compromise (EAC)
  • Work with IT to develop a referral form

WEBINAR DETAILS

This webinar will address what constitutes a cyber crime and how to report it in the suspicious activity report. Learn the difference between BEC and EAC and why this is important in accurately conveying the circumstances to law enforcement. Join us for a line-by-line look at how to complete the data fields and write a cyber crime narrative.

WHO SHOULD ATTEND?

This timely webinar will benefit BSA and IT officers and staff.

TAKE-AWAY TOOLKIT

  • SAR handbook
  • Employee training log
  • Interactive quiz
  • PDF of slides and speaker’s contact info for follow-up questions
  • Attendance certificate provided to self-report CE credits

NOTE: All materials are subject to copyright. Transmission, retransmission, or republishing of any webinar to other institutions or those not employed by your institution is prohibited. Print materials may be copied for eligible participants only.

Presented By

Debbie CrawfordDeborah L. Crawford
Gettechnical, Inc.
© 2024 FINANCIAL EDUCATION & DEVELOPMENT, INC