Risk & Compliance

Lorem ipsum

Protect your company’s core values and reputation with our structured, easy-to-use e-learning modules.

The business challenge

In today's world, where trust is paramount, organisations that establish credibility through their brand, products, and services can enhance their corporate resilience and strengthen relationships with customers, staff, and stakeholders. Ensuring awareness of compliance requirements across your company will help you stay prepared for regulatory changes and mitigate risks.

How we can help

Our structured, easy-to-use e-learning materials will help develop regulatory awareness in your organisation, thereby protecting your company’s core values and reputation. Through an engaging e-learning experience, you can build comprehensive knowledge within your organisation. Be proactive and equip your team with the knowledge to promote future compliance success. Choose the right set of modules for your needs, use our platform to sign up your users or upload the e-learning files to your own learning management system (LMS).

The benefits of our e-learning at a glance

Flexibility

Access our user-friendly modules anytime, anywhere.

Measurable

Gain insight to real-time reporting on training progress.

Up-to-date

We regularly update our digital learning solutions to reflect changes in regulations.

Customised

Integrate company-specific case studies and guidelines if needed.

Our modules to promote compliance

AML – Introduction to anti-money laundering

  • Key Anti-Money Laundering (AML) and Combating the Financing of Terrorism (CFT) issues.

  • What laws and regulations create AML obligations, and how they are similar internationally.

  • Various methods of money laundering, as well as areas and services that are especially useful to money launderers.

  • Key AML areas, such as AML controls and compliance, as well as risk factors that could be considered as part of a risk-based approach.

The curriculum consists of 8 modules:

  1. Money laundering and its impact​

  2. Historical background​

  3. Legal basis for AML and counter terrorist financing​

  4. Stages of money laundering​

  5. Risk factors​

  6. Exposure to terrorist financing and politically exposed persons​

  7. AML controls​

  8. Risk-based approach

Whistleblower Protection Directive

  • What is included in Directive (EU) 2019/1937?

  • Who is affected?

  • What options do whistleblowers have?

  • Reporting through internal and external channels

  • Prohibition of retaliation

  • What to do to comply?

Competition law in the European Union

  • Outline of competition law

  • Agreements

  • Dominance

  • State aid

  • Unfair commercial practices

  • Record keeping and business communication

Sanctions

  • The purpose of imposing sanctions

  • The types of sanctions

  • The applicability of the relevant sanctions regime, including any recent sanction regime

  • Sanctions evasion techniques

  • The risk for non-compliance with sanctions and detect sanctions risks

AI literacy

What is artificial intelligence (AI)

  • Different types of AI
  • Key AI concepts

  • How different types of AI apply to real-world scenarios

  • AI’s strengths and limitations compared to human intelligence

AI risks and limitations

  • Factors affecting AI accuracy

  • Bias in AI and its implications

  • The challenges in ensuring AI explainability and interpretability

  • The risks associated with AI use

How to use GenAI

  • Key factors for selecting a GenAI tool

  • Skills for structuring effective prompts

  • Key considerations for interacting with GenAI

  • When to incorporate GenAI into everyday use

The EU AI Act and AI safety

  • What is the AI Act and why is it important?
  • Obligations under the AI Act

  • Best practices for Using AI safely and effectively

  • How the way you use AI can affect the AI Act obligations of your organisation

Cybersecurity and data protection related modules

Cybersecurity and crisis management for Corporates

  • The changing landscape of cybersecurity oversight 

  • Cyber incidents involving different industries

  • Cybersecurity threats involving customers

    • Malware

    • Phishing

    • Web application attack

    • DDos

    • Data breach

    • Insider threat

    • Botnet

  • Companies’ role in managing crisis, and effective ways to oversee the process 

  • Insights on how corporations can most effectively discharge their responsibilities when a crisis strikes.

DORA – Digital Operational Resilience Act

  • What is DORA?

  • Changes made by DORA

  • Key elements of the pillars in DORA

  • Regulatory technical standards and implementing technical standards of DORA

NIS2 – Network and Information Systems Directive​

  • Differences between NIS and NIS2

  • Essential and important entities defined by NIS2

  • Main requirements and obligations set out by the NIS2

  • How does the NIS2 apply to your organisation?

GDPR – General concept of privacy

  • What is personal data?

  • Who is affected?

  • Data Controller and Processor

  • Data transfer

  • What to do to comply?

GDPR Awareness – Practical aspects of compliance

  • The concept of the GDPR and personal data
  • The importance of compliance in the field of data protection

  • Basic data security and data awareness rules, including practical tips

  • What data breaches are and how to handle them properly

  • The most important rules related to data subject rights

Pay transparency related modules

EU Pay Transparency Directive for HR professionals​

  • Background of Directive (EU) 2023/970

  • An overview of the Directive

  • Pay transparency in line with the Directive

  • Enforcement mechanisms under the Directive

Diversity management

  • What do we mean if we talk about diversity?

  • What does an inclusive workplace look like?

  • What value can diversity bring to an organisation?

  • How to build a diversity strategy?

  • Inclusive leadership

  • Covering topics from EU Directives, such as pay transparency and gender equality​

Compensation basics​

  • International position evaluation methodologies

  • Job architecture/position matrix

  • Salary banding

  • Salary adjustments

  • Salary strategy

  • Individual differentiation within bands

Tax related modules

Transfer pricing documentation basics

  • Requirements of the transfer pricing documentation as per the OECD Transfer Pricing Guidelines and BEPS Action 13

  • Specific elements of the transfer pricing documentation (i.e. Master File, Local File and Country-by-Country Report)

  • Basic information on transfer pricing principles

Individuals or corporates below 15 users may purchase the curriculum in our E-learning Online Store via card payment.

For corporate offers and volume discounts, please contact your local PwC representative or the Digital learning team.*

*Our e-learnings are available for corporates either as a cloud service on the PwC platform or integrated into your own LMS.

Contact us

Krisztina Sótonyi

Director, Digital Learning Services, PwC Central and Eastern Europe

Email

Csaba Gyimesi

Director, PwC Central and Eastern Europe

Email

Csilla Dékány

Senior manager, PwC Central and Eastern Europe

Email

Zsófia Straubinger

Manager, PwC Central and Eastern Europe

Email

Melinda Molnár

Manager, PwC Central and Eastern Europe

Email

Follow us on social media