Looking for learning and events? Visit the education store

Showing results 1-10 of 17

Sort results
Sort results
  1. NZ accountants to join fight against "dirty money"

    New legislation clears the way for professional financial ‘gatekeepers’, including accountants, to help stop criminals turning ‘dirty money’ into clean,” says Chartered Accountants Australia and New...

    Tagged in:
  2. June workshops on complying with the AML/CFT regime

    The Department of Internal Affairs is hosting a series of workshops across New Zealand in June...

    Tagged in:
  3. acuity

    Cybercrime and law enforcement

    Australian Federal Police Commander David McLean explains cyber crime from the viewpoint of law enforcement...

  4. acuity

    Inside the mind of a hacker

    Ethical hacker Daniel Weis is one of the good guys, but he knows how the bad guys think and advises companies on how to avoid security breaches...

  5. acuity

    Stamping out corruption's influence on society

    Australia and New Zealand are among the least corrupt cultures in the world — but we are not immune...

  6. acuity

    The move to electronic identity verification

    If you’d rather not have the AML/CFT Act compromise your client experience, embrace technology. Embrace electronic identity verification...

  7. acuity

    Auditors and accountants meeting challenges

    Insights on major challenges for accountants and auditors in the rapidly changing professions...

  8. acuity

    Terrorism: Big business with deep pockets

    Modern terrorist groups are increasingly financing themselves and disrupting their supply of finance is a critical issue...

    Tagged in:
  9. Are Australia and New Zealand corrupt?

    The fight against corruption This paper explores why corruption seems to be on the increase in Australia and New Zealand and considers if we’re doing enough to fight it. It asks some thought-...

  10. acuity

    Connected world ripe for cybercriminals' picking

    Opportunities for hackers are expanding rapidly from device connectivity and inadequate business cybersecurity...

Previous Page (disabled)
  1. Page 1
  2. Page 2