Hi [[ session.user.profile.firstName ]]
Sort by:
    • Actionable Intelligence for Anti-Money Laundering Compliance Actionable Intelligence for Anti-Money Laundering Compliance Vamsi Chemitiganti, GM of Financial Services, Hortonworks Recorded: Mar 2 2016 5:00 pm UTC 63 mins
    • In this 1-hour webinar, Vamsi Chemitiganti, Hortonworks GM for Financial Services, will discuss the key business issues and technology considerations in moving a financial services anti-money laundering (AML) regime onto Hortonworks Connected Data Platforms and the key benefits in doing so. Banks and capital markets firms can use Hortonworks Data Platform and Hortonworks DataFlow to process huge amounts of transaction-related data from both traditional and non-traditional sources. Compliance teams can then analyze that data-in-motion and data-at-rest for actionable intelligence required for Suspicious Activity Reports—to discover illegal activity and provide detailed reporting to authorities. There will be time for Q&A at the end of the presentation.

      Read more >
    • Better Anti Money Laundering (AML) Compliance with Hortonworks Better Anti Money Laundering (AML) Compliance with Hortonworks Vamsi K Chemitiganti, General Manager - Financial Services, Hortonworks Recorded: Nov 24 2015 3:00 pm UTC 59 mins
    • In 2015, it goes without saying that Banking is an increasingly complex as well as a global business. Leading Banks now generate a large amount of revenue in Global markets and this is generally true of all major worldwide banks. Financial crime is a huge concern for banking institutions given the complexity of the products they offer their millions of customers, large global branch networks and operations spanning the spectrum of financial services. The BSA (Bank Secrecy Act) requires U.S. financial institutions to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, to file reports of cash transactions exceeding $10,000 (daily aggregate amount), and to report suspicious activity that might signify money laundering, tax evasion, or other criminal activities. After the terrorist attacks of 2001, the US Patriot Act was passed into law by Congress. The Patriot Act augments the BSA with Know Your Customer (KYC) legislation which mandates that Banking institutions be completely aware of their customer’s identities and transaction patterns with a view of monitoring account activity. This webinar discusses the key business issues and technology considerations in moving your AML regime to a Hadoop based infrastructure and the key benefits in doing so.

      Read more >
    • Security practices for safe mobile money transfers Security practices for safe mobile money transfers Tom Meredith (SmartToken Chain) Upcoming: Jul 20 2016 3:00 pm UTC 60 mins
    • Every person on the planet has a mobile phone, but 2 Billion people are “Un-banked”.
      Banks and telecoms are in a Gold Rush to bank the unbanked, but many obstacles remain. Money transfers are some of the most popular transactions made by both the banked and the unbanked. However, building trust in this new service is definitely a challenge.

      Join this panel where discussion points will include:

      -Who has the upper hand: Banks or Carriers?
      -How can Fintech companies ensure trust and security when it comes to mobile money transfers?
      -Global ISO Standards Authenticate ID and Asset Verification
      -ISO Reduces Fraud and Speeds up Asset Transfers
      -What are some of the security challenges new payment services are able to overcome?
      -Are “Standards” emerging to reduce implementation and compliance costs?
      -How do you create cross-border and Inter-bank/carrier transactions?
      -How can banks and telecoms successfully bank the unbanked?

      Read more >
    • How to Stop Wasting Money and Start Managing Cybersecurity How to Stop Wasting Money and Start Managing Cybersecurity Shay Zandani, CEO, Cytegic Recorded: Jan 21 2015 9:00 am UTC 40 mins
    • In today’s world, decision-makers are overwhelmed by the sheer amount of cyber-threat information and cyber-security technologies available.

      CISOs who are tasked with securing business assets in face of rapidly evolving threats, find themselves with insufficient capability to measure the effectiveness and efficiency of their organization security apparatus and equipped with inadequate tools for determining optimal resource allocation, while constantly having to display the risk levels posed by cyber threats to the organizations’ management. It is nearly impossible to estimate if money spent on one technology could have had better security and business impact invested elsewhere.

      This Webinar will present the challenging state of affairs today and will suggest how to remedy the situation using automation, analytical tools and intelligence forecasting and simulation.

      Read more >
    • Stopping Data Breaches: Show me the money Stopping Data Breaches: Show me the money Dave Finger, Director of Product Marketing, Fortinet Recorded: Jun 3 2015 3:00 pm UTC 40 mins
    • Yes, there are annual studies that calculate the cost of the average data breach. And yes, within weeks of a major data breach the headlines shift from number of records lost to estimated cost. So it is unsurprising, if troubling, that a recent survey of enterprise executives indicated that the #1 thing they are most concerned about protecting from cyber attack is customer data. However, there are other important aspects to making a business case for improving your security posture. This webcast will discuss what we feel you should be concerned about losing and why…and it’s not just customer records that require costly breach notification.

      Read more >
    • Big data’s big advantage for financial institutions Big data’s big advantage for financial institutions Mark Melton, Sales Engineer, Platfora Recorded: Apr 28 2016 3:00 pm UTC 53 mins
    • For global financial institutions, it’s nearly impossible to keep up with market changes, regulatory changes, security concerns, and technology advancements. But the right big data discovery solution lets you quickly extract insights—and enables everyone across your organization to dig deep into your big data to stay ahead of market and compliance requirements. What’s more, you can view the insights directly in Platfora or export your findings into any BI tool you prefer.

      Join this webinar to see how Big Data Discovery helps detect and monitor these top challenges:
      • Anti-money laundering
      • Financial liquidity monitoring
      • Sector equity within retail wealth management

      Read more >
    • Why Layered Security Strategies Don’t Work Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Mar 16 2016 9:00 am UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • Why Layered Security Strategies Don’t Work Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Mar 16 2016 2:00 am UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success Nik Whitfield, CEO, Panaseer Recorded: Feb 17 2016 4:00 pm UTC 47 mins
    • Data-driven security and security data science are the ‘new hotness’.

      CISOs and their operations teams know they need critical insights from their data to measure success, prioritise resources for best result, and disrupt attacker ROI efficiently.

      But today, most data-driven security efforts see expensive talent spend their time wading through sewage rather than panning for gold. This wastes time, money and resources.

      This session will:

      * Quickly tour through problems past and present in gaining high value security insights from data

      * Explain what these problems show about how we need to engineer data-driven security approaches to meet use-case needs at best cost

      * Give practical examples of how you can use security data science effectively by boiling the kettle, rather than trying to boil the ocean

      Read more >
    • It’s Time to Think Differently About Network Security It’s Time to Think Differently About Network Security Franklyn Jones, VP, Spikes Security Recorded: Jan 20 2016 3:00 pm UTC 35 mins
    • Something is seriously wrong here. Businesses spend millions every year on the latest security technologies to keep their businesses safe – and then they still get attacked! Why does this continue to happen over and over again, and what can we do about it? This presentation – loaded with compelling research data from many different industry sources – provides revealing statistics on how bad this cyber security problem really is, and why it has continued to get worse despite your best efforts. But, if you’re willing to think differently about network security, there is now a way you can eliminate a huge number of attacks on your network, improve productivity of your IT staff, keep your business safe, and save a significant amount of money in the process. Skeptical, right? Well attend this session, learn the facts, then decide for yourself.

      Read more >
    • Breach Prevention Week: Why Layered Security Strategies Don’t Work Breach Prevention Week: Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Jan 20 2016 7:00 pm UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • Risk-Based Security - Where Next? Risk-Based Security - Where Next? Peter Wood, CEO, First Base Technologies LLP Recorded: Nov 4 2015 11:00 am UTC 45 mins
    • We seem to be struggling to get to grips with risk-based security, especially where it concerns defensive strategy. Few if any organisations have sufficient budget to protect and test every part of the business, so how do we choose where to put our effort and money? The skills, knowledge and techniques needed to defend against an agile and devious attacker are available but infrequently deployed properly. In this webinar, Peter Wood will describe some case studies where risk-based security has made a real difference to organisations’ defences and response to cyber-attack.

      Read more >
    • Cybersecurity and Investors Cybersecurity and Investors Jacob Olcott, Vice President, BitSight, Nell Minow Recorded: Oct 26 2015 6:00 pm UTC 49 mins
    • There’s no doubt that cyber attacks cause real financial harm to businesses. Money can be stolen, business operations disrupted. Cyber theft can provide international competitors with years worth of valuable intellectual property or trade secrets virtually overnight, jeopardizing current and future market opportunities. Cyber attacks can seriously damage an organization’s reputation with customers and result in legal liability for the company, executives, and board members.

      As companies race to protect themselves, how do investors know if the organizations they are investing in are secure?

      Join Jacob Olcott, VP at BitSight, and Nell Minow, corporate governance expert and co-founder of Institutional Shareholder Services (ISS), for a discussion of key issues, including:

      -How investors assess cybersecurity in the M&A diligence process

      -What institutional shareholders want to know about cyber risks to their investments

      -How shareholders can meaningfully engage with companies on cybersecurity

      Read more >
    • Regulatory Hot Topics for Financial Services in 2014 Regulatory Hot Topics for Financial Services in 2014 Protiviti's Tim Long, Scott Jones, John Atkinson, Steven Stachowicz, Nicole Weber Recorded: Jan 29 2014 6:00 pm UTC 63 mins
    • With nearly 40 percent of the Dodd-Frank Act yet to be implemented, numerous new consumer protection requirements taking effect this year, and the continued strong focus on anti-money laundering and sanctions compliance, regulatory compliance will remain a major challenge for the financial services industry in 2014.

      Join Protiviti's Tim Long, Scott Jones, John Atkinson, Steven Stachowicz and Nicole Weber on Wednesday January 29, as they help compliance, risk and internal audit professionals identify some of the important regulatory issues and developments for 2014 that will need to be included in internal audit and compliance programs.

      Topics will include:
      • Consumer Financial Lending and Deposits Products
      • Anti-Money Laundering and Sanctions
      • Broker-Dealers and Investment Advisers
      • The impact of the Current Environment on Compliance and Internal Audit organizations

      CPE credits will be provided to qualifying attendees.

      We look forward to having you join us. If you have any questions, contact Esther Veenhuizen at 212.708.6350 or esther.veenhuizen@protiviti.com.

      Read more >
    • Copyright Regime vs. Civil Liberties Copyright Regime vs. Civil Liberties Rick Falkvinge, Founder of the Swedish and first Pirate Party Recorded: May 13 2015 1:00 pm UTC 47 mins
    • The copyright monopoly debate has gotten exactly nowhere since the
      days of Napster. There's still a copyright industry that insists on
      control of the net in the name of lost profits. But what does this do
      to the net? More to the point, why are we letting a literal cartoon
      industry have any say at all in regulation of our most important piece
      of infrastructure?

      In this presentation, Rick Falkvinge, founder of the Swedish and first
      Pirate Party, examines how the entire copyright industry position is a
      red herring, which is (or should be) completely irrelevant to
      policymaking on net issues. He brings up the concept of Analog
      Equivalent Rights, and painfully points out that some of the most
      crucial civil liberties of our parents are currently not being passed
      on to our children, because doing so would interfere with profits of
      entertainment companies.

      There's nothing wrong with profit as such. But no entrepreneur should
      get to dismantle civil liberties just because they can't make money
      otherwise.

      Read more >