FCA Regulatory Training
Whether someone is new to your team, or you need to ensure that you or your existing team members have sufficient knowledge and understanding to comply with current regulations, we offer a wide range of compliance training, designed to help you and your firm understand the regulatory framework and apply compliance.

Tailored In-House Training
Our tailored training is ideal for larger groups or if you have specific topics to be briefed on, or complex scheduling and timing for busy teams in different jurisdictions. Check out our menu of tailored training topics and options here or speak to us about how our virtual and interactive courses can be customised to meet your learning objectives and the content developed to meet your specific requirements.
Latest insights

Q2 2025 Regulatory Reporting Deadlines
Financial firms must meet various regulatory filing requirements throughout the year. These are the regulatory filing submission deadlines occurring from April through June 2025.
- Compliance
- SEC
- FCA
- FINRA
- Regulatory Deadlines

Maximizing Preparedness: Get Ahead of the 2025 SEC Exams
Why a mock exam is a game-changer
- Compliance
- SEC

Six Million Records Potentially Compromised in Oracle Cloud Breach
A threat actor is selling authentication records exfiltrated from Oracle Cloud, suggesting a breach of Oracle Cloud’s Single Sign On and Lightweight Directory Access Protocol systems.
- Cybersecurity

Critical Security Flaw in Veeam Backup & Replication
The risk of data loss, privilege escalation, and ransomware attacks makes immediate remediation essential.
- Cybersecurity

SEC Marketing Rule FAQs for Gross and Net Performance of Extracted Performance
The FAQ clarifies how to show gross and net performance of extracted performance and performance characteristics.
- Performance
- Compliance
- SEC Marketing Rule
- SEC

Apache Tomcat Vulnerability Under Active Exploitation
Apache Tomcat powers countless web applications across industries, and is actively being exploited to take control of servers or steal sensitive data.
- Cybersecurity