Hi [[ session.user.profile.firstName ]]
Sort by:
    • Actionable Intelligence for Anti-Money Laundering Compliance
      Actionable Intelligence for Anti-Money Laundering Compliance Vamsi Chemitiganti, GM of Financial Services, Hortonworks Recorded: Mar 2 2016 5:00 pm UTC 63 mins
    • In this 1-hour webinar, Vamsi Chemitiganti, Hortonworks GM for Financial Services, will discuss the key business issues and technology considerations in moving a financial services anti-money laundering (AML) regime onto Hortonworks Connected Data Platforms and the key benefits in doing so. Banks and capital markets firms can use Hortonworks Data Platform and Hortonworks DataFlow to process huge amounts of transaction-related data from both traditional and non-traditional sources. Compliance teams can then analyze that data-in-motion and data-at-rest for actionable intelligence required for Suspicious Activity Reports—to discover illegal activity and provide detailed reporting to authorities. There will be time for Q&A at the end of the presentation.

      Read more >
    • Better Anti Money Laundering (AML) Compliance with Hortonworks
      Better Anti Money Laundering (AML) Compliance with Hortonworks Vamsi K Chemitiganti, General Manager - Financial Services, Hortonworks Recorded: Nov 24 2015 3:00 pm UTC 59 mins
    • In 2015, it goes without saying that Banking is an increasingly complex as well as a global business. Leading Banks now generate a large amount of revenue in Global markets and this is generally true of all major worldwide banks. Financial crime is a huge concern for banking institutions given the complexity of the products they offer their millions of customers, large global branch networks and operations spanning the spectrum of financial services. The BSA (Bank Secrecy Act) requires U.S. financial institutions to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, to file reports of cash transactions exceeding $10,000 (daily aggregate amount), and to report suspicious activity that might signify money laundering, tax evasion, or other criminal activities. After the terrorist attacks of 2001, the US Patriot Act was passed into law by Congress. The Patriot Act augments the BSA with Know Your Customer (KYC) legislation which mandates that Banking institutions be completely aware of their customer’s identities and transaction patterns with a view of monitoring account activity. This webinar discusses the key business issues and technology considerations in moving your AML regime to a Hadoop based infrastructure and the key benefits in doing so.

      Read more >
    • Security practices for safe mobile money transfers
      Security practices for safe mobile money transfers Tom Meredith (SmartToken Chain), Ali Raza (CCG Catalyst) Recorded: Jul 20 2016 3:00 pm UTC 62 mins
    • Every person on the planet has a mobile phone, but 2 Billion people are “Un-banked”.
      Banks and telecoms are in a Gold Rush to bank the unbanked, but many obstacles remain. Money transfers are some of the most popular transactions made by both the banked and the unbanked. However, building trust in this new service is definitely a challenge.

      Join this panel where discussion points will include:

      -Who has the upper hand: Banks or Carriers?
      -How can Fintech companies ensure trust and security when it comes to mobile money transfers?
      -Global ISO Standards Authenticate ID and Asset Verification
      -ISO Reduces Fraud and Speeds up Asset Transfers
      -What are some of the security challenges new payment services are able to overcome?
      -Are “Standards” emerging to reduce implementation and compliance costs?
      -How do you create cross-border and Inter-bank/carrier transactions?
      -How can banks and telecoms successfully bank the unbanked?

      Read more >
    • How to Stop Wasting Money and Start Managing Cybersecurity
      How to Stop Wasting Money and Start Managing Cybersecurity Shay Zandani, CEO, Cytegic Recorded: Jan 21 2015 9:00 am UTC 40 mins
    • In today’s world, decision-makers are overwhelmed by the sheer amount of cyber-threat information and cyber-security technologies available.

      CISOs who are tasked with securing business assets in face of rapidly evolving threats, find themselves with insufficient capability to measure the effectiveness and efficiency of their organization security apparatus and equipped with inadequate tools for determining optimal resource allocation, while constantly having to display the risk levels posed by cyber threats to the organizations’ management. It is nearly impossible to estimate if money spent on one technology could have had better security and business impact invested elsewhere.

      This Webinar will present the challenging state of affairs today and will suggest how to remedy the situation using automation, analytical tools and intelligence forecasting and simulation.

      Read more >
    • Stopping Data Breaches: Show me the money
      Stopping Data Breaches: Show me the money Dave Finger, Director of Product Marketing, Fortinet Recorded: Jun 3 2015 3:00 pm UTC 40 mins
    • Yes, there are annual studies that calculate the cost of the average data breach. And yes, within weeks of a major data breach the headlines shift from number of records lost to estimated cost. So it is unsurprising, if troubling, that a recent survey of enterprise executives indicated that the #1 thing they are most concerned about protecting from cyber attack is customer data. However, there are other important aspects to making a business case for improving your security posture. This webcast will discuss what we feel you should be concerned about losing and why…and it’s not just customer records that require costly breach notification.

      Read more >
    • Beneficial Ownership - Why the Devil is in the Detail
      Beneficial Ownership - Why the Devil is in the Detail Melaine B. Campbell, Managing Director of Global Compliance Solutions, Dun & Bradstreet Recorded: Sep 20 2016 2:00 pm UTC 36 mins
    • Do you really know your customers, your vendors, and your third parties? Melaine Campbell, Dun & Bradstreet's Managing Director explains why it's important as ever to know who you are really doing business with.

      Beneficial Ownership and Ultimate Beneficial Ownership (UBO) identification and verification are critical requirements for combating everything from financial crime, tax evasion and corruption, fraud and money laundering, to trafficking and terrorist funding.

      In this essential D&B Perspectives Webinar you will learn:
      - The most important regulations and challenges are around Beneficial Ownership
      - Which are the best practices to safeguard your business
      - How accurate data can keep your business safe
      - How to accelerate customer and third party due diligence
      - How D&B can help you uncover who you really are doing business with

      Melaine Campbell is a global authority and writer on business compliance. An experienced lawyer and former prosecutor in the US legal system she has an extensive background in Global Anti-bribery / Anti-corruption and Anti-money laundering and is a widely regarded industry subject matter expert speaking regularly on compliance issues around the world.

      Read more >
    • Blockchain For Identity Authentication Infrastructure
      Blockchain For Identity Authentication Infrastructure Professor Michael Mainelli, FCCA FCSI FBCS (Z/Yen Group Limited) Upcoming: Mar 14 2017 9:00 am UTC 45 mins
    • Mutual distributed ledger (MDL) identity schemes could empower people with personal data storage and management, permission frameworks for access by third parties such as banks insurers or governments, and even distributed reputation ratings.

      Such applications could reduce financial fraud, costs, and crime, and increase returns, confidence, and security. MDLs are uniquely supportive of controlled distribution and sharing of digitally-signed documentation and could form the backbone to identity and authentication systems worldwide. In fact, some claim that identity authentication infrastructure is the ‘killer app’ for MDLs rather than payments.

      While anti-money-laundering/know-your-customer/ultimate-beneficial-ownership processes are arduous for high-net-worth individuals, about 2.4 billion poor people worldwide lack official identification, about 1.5 billion over the age of 14.

      This webinar will examine how MDLs might aid both rich and poor.

      Read more >
    • KYC in the online age
      KYC in the online age Panel Discussion featuring: UK Cabinet Office, CurrencyFair, IOX & Mitek Recorded: Feb 16 2017 3:00 pm UTC 47 mins
    • Financial institutions from all over the world are facing increasingly strict regulations regarding the verification and authentication of their customers’ identity. The imminent enforcement of the 4AMLD and the publication of the 5AMLD will nothing but add pressure on the financial services industry.

      To keep a competitive edge and still be compliant with the latest Anti-Money Laundering (AML) and Know Your Customer (KYC) regulations, banks, prepaid card operators, digital currency processors, exchanges, and wallets are being compelled to embrace the digitalisation of traditionally cumbersome processes such as customer due diligence and ongoing authentication.

      Aiming to simplify KYC in this ever-changing regulatory environment, and optimizing the digital channels for further security and convenience, financial institutions need to successfully achieve this change within their policies, procedures, business models, and technology infrastructures.

      During this webinar, our panel of experts will provide answers to the following questions:

      •Are the technologies to underpin digital identity verification reliable and robust enough for financial institutions to rely on them?

      •Are customers prepared to go down the digital route?

      •Can financial institutions strike the right balance between rock-solid compliance, and smooth, easy, digital customer experience?

      •How are financial institutions coping with the challenges posed by the latest regulatory updates?

      Join us for this panel discussion with our expert speakers:

      Don Thibeau, Chairman & President, The Open Identity Exchange (OIX)
      Fintan Byrne, Head of Risk & Chief Compliance Officer, CurrencyFair
      Sarah Clarke, General Manager - Identity, Mitek
      David Rennie, Identity Assurance Programme, UK Cabinet Office

      Read more >
    • The Path to a Modern Data Architecture in Financial Services
      The Path to a Modern Data Architecture in Financial Services Vamsi Chemitiganti, GM - Financial Services at Hortonworks and Lee Phillips, Product Marketing at Attivio Recorded: Dec 1 2016 6:00 pm UTC 60 mins
    • Delivering Data-Driven Applications at the Speed of Business: Global Banking AML use case.

      Chief Data Officers in financial services have unique challenges: they need to establish an effective data ecosystem under strict governance and regulatory requirements. They need to build the data-driven applications that enable risk and compliance initiatives to run efficiently. In this webinar, we will discuss the case of a global banking leader and the anti-money laundering solution they built on the data lake. With a single platform to aggregate structured and unstructured information essential to determine and document AML case disposition, they reduced mean time for case resolution by 75%. They have a roadmap for building over 150 data-driven applications on the same search-based data discovery platform so they can mitigate risks and seize opportunities, at the speed of business.

      Hosted by Hortonworks and Attivio

      Read more >
    • Big data’s big advantage for financial institutions
      Big data’s big advantage for financial institutions Mark Melton, Sales Engineer, Platfora Recorded: Apr 28 2016 3:00 pm UTC 53 mins
    • For global financial institutions, it’s nearly impossible to keep up with market changes, regulatory changes, security concerns, and technology advancements. But the right big data discovery solution lets you quickly extract insights—and enables everyone across your organization to dig deep into your big data to stay ahead of market and compliance requirements. What’s more, you can view the insights directly in Platfora or export your findings into any BI tool you prefer.

      Join this webinar to see how Big Data Discovery helps detect and monitor these top challenges:
      • Anti-money laundering
      • Financial liquidity monitoring
      • Sector equity within retail wealth management

      Read more >
    • Withstanding a Ransomware Attack: A Step-by-Step Guide
      Withstanding a Ransomware Attack: A Step-by-Step Guide Russel McDermott, Netwrix Recorded: Nov 8 2016 2:00 pm UTC 43 mins
    • Ransomware has spread epidemically in 2016. Analysts, IT pros and corporate staff list it among the top IT security threats. According to a report prepared by the Cyber Threat Alliance (CTA), CryptoWall, version 3.0, alone has already cost its victims $325 million. Malicious software R&D is funded profusely through sources ranging from the proceeds of criminal activity to money raised through crowdfunding services. Under crowdfunding, those who pay the developer receive a copy and can try using it.

      Join our new webinar “Withstanding a ransomware attack: A step-by-step guide” and learn:

      -What you should do to ensure your data’s availability,
      -How to train your colleagues to avoid being caught on the hook of ransomware,
      -How to moderate the aftermath of a ransomware attack,
      -And more!

      Read more >
    • Secure your enterprise to maintain quality of care
      Secure your enterprise to maintain quality of care Matt Mellen - Security Architect & Healthcare Solution Lead - Palo Alto Networks Recorded: Nov 29 2016 10:00 am UTC 45 mins
    • The business model behind cybercrime has changed and cyber attackers are looking for new sources of income. Ransomware is on the rise and is of great risk to healthcare organisations as they impact the quality of care clinical facilities can provide, costs organisations money in remediation efforts, and damages their reputation as competent providers of care. There are, however,straight forward steps organisations can take to prevent this threat.

      Palo Alto Networks invites you to a webinar where Matt Mellen, a former Information Security Lead at a hospital, will discuss practical steps healthcare organisations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will discuss:

      • Practical steps healthcare organisations can take on systems and network devices to prevent exposure to this rampant attack.
      • How the most current variants of ransomware work
      • How to prevent successful ransomware attacks in Healthcare

      Read more >