Skip to main content
Please wait...

Cyber Security Training

  • Riskpro provides training on awareness on Cyber security risk trends, types or controls and make them aware of their responsibilities in relation to fraud prevention.
  • We provide training on Vendor Awareness Programs on information security.
  • We provide quarterly Information security risk assessments and Annual IS Audits are conducted by experienced professionals.

Anti bribery/ Corruption Training

  • Riskpro provides 1-2 hours / upto 15-16 hours FCPA / Anti Bribery training.
  • We help with FCPA Overview and Compliance Requirements like the law’s key Anti-Bribery and Accounting Provisions, how to avoid FCPA risk and reputational harm etc.
  • We provide training regarding ISO 37001 – Anti Bribery Management Systems- Important Framework elements.
  • We help with the Assessment and Certification.

AML Training

  • We have the most successful programs across Chennai, Mumbai, Bangalore and Pune.
  • We conduct 1-2 hrs / 1 to 3 days training on AML, KYC, Terrorist Financing, Trade Based ML and Customer profile covering the following aspects:
    • Introduction and emerging trends in AML.
    • Customer profiling and high risk customers.
    • Designing an effective AML framework.
    • Suspicious transactions and detection.

Operational/ Credit Risk Training

Riskpro conducts 1-2 hours / one to three days program on Operational Risk. We conduct foundational training which can be designed and rolled out across the Company.

Webinar - Supply Chain Risks

Please do join in to understand all about Supply Chain Risks, how to identify them, how to mitigate them, and keep them going.

Webinar - Zapoj - Smart Platform for Critical Event Management

Riskpro in partnership with Zapoj brings to you a Critical Event Management (CEM) platform which provides a clear and detailed understanding of the threat perception, by correlating threats with locations people, facilities, systems, and logistics.

Webinar- Insider Threats

A security danger that comes from within the targeted organization is known as an insider threat. It frequently involves a current or former employee or business acquaintance who improperly utilizes access to privileged accounts or sensitive information within an organization's network. Or the data is transferred or accidentally corrupted. 

Webinar- Interviewing Skills

Learn how to prepare for conducting an interview. Also, learn about the interviewer’s responsibilities towards the organization and towards the candidate. 

Third Party Risk Management - Vendor Risk Management

If you thought third party is all about vendors, think again. Employing a third party means more than just vendor risk management. It also involves suppliers, agents, distributors, accountants, intermediaries and sometimes even customers. All these stakeholders are creating risks for your organisation at all times. Companies have to ensure that there are processes to protect confidential IT information, ensure ethical dealings, mitigating noncompliance with code of conduct and ultimately managing reputation risk.

Personal Data Protection Services (PDP) - India

Once the Bill comes into force, all Indian companies handling, storing or processing personal data will be required to adhere to it. The Bill gives four basic rights to data principals, namely - Right to confirmation and access; Right to correction, Right to Data Portability and Right to Be Forgotten.

ESG Training

The term ESG encompasses the set of words like Environmental, Social & Governance. It can impact a company’s ability to generate value. In a corporate world, ESG is the incorporation of non-financial considerations into business strategy and decision-making. Although ESG factors are non-financial they are linked to business competitiveness and the way it is handled can result in financial consequences.