Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Track 2: Non-Agency / CRT Jake Katz, Paul Edelen, Christian Valencia, Shekhar Shah and Roman Shimonov Product and research teams will cover recent non-agency and CRT enhancements. Hear from a panel of industry leaders on CRT market observations and tre... 5 months ago | 35 mins Enhanced tools for analyzing Non-Agency RMBS David Craft, Jake Katz, and Aysegul Erdem from Yield Book, LSEG Yield Book is in tune with complexities of the current mortgage market landscape and has made strategic enhancements to their models and tools for ana... 1 year ago | 38 mins Analytical Insights for Agency Credit Risk Transfer Deals David Craft and Jake Katz In this webinar, we will cover: •A demonstration of Yield Book's capabilities for analyzing CRTs, including prepayment dials and macro-economic adjust... 3 years ago | 25 mins Healthcare Security Fireside Chat: NIST, Identity, and Ransomware Scott Breece, Community Health Systems CISO and Gil Kirkpatrick, Semperis Chief Architect No one can ignore the sharp uptick of hospitals victimized by ransomware. And in healthcare, the stakes are higher. Just last month, a 78-year-old pat... 1 year ago | 61 mins PMI’s Pulse of the Profession InDepth Report:The Essential Role of Communication Jen McCaffrey, Market Research Supervisor at PMI.org At its most basic level, communication is the transfer of information and ideas between two or more entities. In the context of organizational project... 7 years ago | 46 mins Synthetic Identity Fraud: Unreal Identities Result in Real Fraud Losses Scott Peddle, Verafin Presented by Verafin In this digital age, vast amounts of compromised customer information from data breaches and fraud scams is readily available fo... 1 year ago | 50 mins Tax Evasion, the Panama Papers and Global Wealth Management Dan diBartolomeo The release of the so-called “Panama Papers” has raised the veil on the secretive tax evasion practices of some wealthy investors and generated substa... 6 years ago | 61 mins Anatomy of an Attack – How to defend against a multi-stage attack Michael Osterman, Principle - Osterman Research Recently, we’ve seen the emergence of multi-stage attacks, such as the widely reported Target breach. Multi-stage attacks employ multiple technologies... 8 years ago | 56 mins 2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe Davide Canali, Senior Threat Analyst and Richard Davis, Cybersecurity Strategist More than 99% of the worldwide attacks we see in cybersecurity require some form of human interaction to succeed. The "Human Factor" of curiosity and ... 3 years ago | 60 mins File Transfer Solutions and How to Achieve Compliance Moderator: Michael Hine, Speakers: Paul Castiglione, Derek Brink & James McCloskey The ability to move files effectively and securely is integral for organizations, with everything from sensitive personal records to highly confidenti... 7 years ago | 62 mins