Hi [[ session.user.profile.firstName ]]
Sort by:
    • Actionable Intelligence for Anti-Money Laundering Compliance Actionable Intelligence for Anti-Money Laundering Compliance Vamsi Chemitiganti, GM of Financial Services, Hortonworks Upcoming: Mar 2 2016 5:00 pm UTC 60 mins
    • In this 1-hour webinar, Vamsi Chemitiganti, Hortonworks GM for Financial Services, will discuss the key business issues and technology considerations in moving a financial services anti-money laundering (AML) regime onto Hortonworks Connected Data Platforms and the key benefits in doing so. Banks and capital markets firms can use Hortonworks Data Platform and Hortonworks DataFlow to process huge amounts of transaction-related data from both traditional and non-traditional sources. Compliance teams can then analyze that data-in-motion and data-at-rest for actionable intelligence required for Suspicious Activity Reports—to discover illegal activity and provide detailed reporting to authorities. There will be time for Q&A at the end of the presentation.

      Read more >
    • Better Anti Money Laundering (AML) Compliance with Hortonworks Better Anti Money Laundering (AML) Compliance with Hortonworks Vamsi K Chemitiganti, General Manager - Financial Services, Hortonworks Recorded: Nov 24 2015 3:00 pm UTC 59 mins
    • In 2015, it goes without saying that Banking is an increasingly complex as well as a global business. Leading Banks now generate a large amount of revenue in Global markets and this is generally true of all major worldwide banks. Financial crime is a huge concern for banking institutions given the complexity of the products they offer their millions of customers, large global branch networks and operations spanning the spectrum of financial services. The BSA (Bank Secrecy Act) requires U.S. financial institutions to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, to file reports of cash transactions exceeding $10,000 (daily aggregate amount), and to report suspicious activity that might signify money laundering, tax evasion, or other criminal activities. After the terrorist attacks of 2001, the US Patriot Act was passed into law by Congress. The Patriot Act augments the BSA with Know Your Customer (KYC) legislation which mandates that Banking institutions be completely aware of their customer’s identities and transaction patterns with a view of monitoring account activity. This webinar discusses the key business issues and technology considerations in moving your AML regime to a Hadoop based infrastructure and the key benefits in doing so.

      Read more >
    • How to Stop Wasting Money and Start Managing Cybersecurity How to Stop Wasting Money and Start Managing Cybersecurity Shay Zandani, CEO, Cytegic Recorded: Jan 21 2015 9:00 am UTC 40 mins
    • In today’s world, decision-makers are overwhelmed by the sheer amount of cyber-threat information and cyber-security technologies available.

      CISOs who are tasked with securing business assets in face of rapidly evolving threats, find themselves with insufficient capability to measure the effectiveness and efficiency of their organization security apparatus and equipped with inadequate tools for determining optimal resource allocation, while constantly having to display the risk levels posed by cyber threats to the organizations’ management. It is nearly impossible to estimate if money spent on one technology could have had better security and business impact invested elsewhere.

      This Webinar will present the challenging state of affairs today and will suggest how to remedy the situation using automation, analytical tools and intelligence forecasting and simulation.

      Read more >
    • Stopping Data Breaches: Show me the money Stopping Data Breaches: Show me the money Dave Finger, Director of Product Marketing, Fortinet Recorded: Jun 3 2015 3:00 pm UTC 40 mins
    • Yes, there are annual studies that calculate the cost of the average data breach. And yes, within weeks of a major data breach the headlines shift from number of records lost to estimated cost. So it is unsurprising, if troubling, that a recent survey of enterprise executives indicated that the #1 thing they are most concerned about protecting from cyber attack is customer data. However, there are other important aspects to making a business case for improving your security posture. This webcast will discuss what we feel you should be concerned about losing and why…and it’s not just customer records that require costly breach notification.

      Read more >
    • Analytics of Multi-Cultural Name Information Analytics of Multi-Cultural Name Information IBM Upcoming: Feb 16 2016 7:00 pm UTC 60 mins
    • Managing, matching, and analyzing cultural name data continues to be one of the most challenging aspects of recognizing those masking or misrepresenting their identities. For instance, long before the attacks on the USS Cole, Pentagon and World Trade Center, there was the 1993 shooting at the CIA Headquarters in Langley Virginia. There Mir Aimal Kansi, a Pakistani militant, killed two CIA employees and wound three others. Kansi had entered the U.S. under the family name Kasi. Kansi (not Kasi) was on all of the watch lists at the borders and consulates issuing visas, but it was entered as ‘Kansi' vs Kasi. So, how might have instances like this been avoided?

      Join Dr. Leonard Shaefer, a pioneer in automated name processing and co-founder of Language Analysis Systems (LAS), for this informative discussion on overcoming the complexity of managing multicultural name information. The solutions Dr. Shaefer created at LAS were used by the U.S. government to track 9-11 terrorists to their Florida connection and formed the basis of the solution now sold by IBM as Global Name Recognition (GNR). Dr. Shaefer advises top-tier government agencies across missions including anti-terrorism, money laundering, transportation and immigration.

      Read more >
    • (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success Nik Whitfield, CEO, Panaseer Upcoming: Feb 17 2016 4:00 pm UTC 45 mins
    • Data-driven security and security data science are the ‘new hotness’.

      CISOs and their operations teams know they need critical insights from their data to measure success, prioritise resources for best result, and disrupt attacker ROI efficiently.

      But today, most data-driven security efforts see expensive talent spend their time wading through sewage rather than panning for gold. This wastes time, money and resources.

      This session will:

      * Quickly tour through problems past and present in gaining high value security insights from data

      * Explain what these problems show about how we need to engineer data-driven security approaches to meet use-case needs at best cost

      * Give practical examples of how you can use security data science effectively by boiling the kettle, rather than trying to boil the ocean

      Read more >
    • It’s Time to Think Differently About Network Security It’s Time to Think Differently About Network Security Franklyn Jones, VP, Spikes Security Recorded: Jan 20 2016 3:00 pm UTC 35 mins
    • Something is seriously wrong here. Businesses spend millions every year on the latest security technologies to keep their businesses safe – and then they still get attacked! Why does this continue to happen over and over again, and what can we do about it? This presentation – loaded with compelling research data from many different industry sources – provides revealing statistics on how bad this cyber security problem really is, and why it has continued to get worse despite your best efforts. But, if you’re willing to think differently about network security, there is now a way you can eliminate a huge number of attacks on your network, improve productivity of your IT staff, keep your business safe, and save a significant amount of money in the process. Skeptical, right? Well attend this session, learn the facts, then decide for yourself.

      Read more >
    • Breach Prevention Week: Why Layered Security Strategies Don’t Work Breach Prevention Week: Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Jan 20 2016 7:00 pm UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • Risk-Based Security - Where Next? Risk-Based Security - Where Next? Peter Wood, CEO, First Base Technologies LLP Recorded: Nov 4 2015 11:00 am UTC 45 mins
    • We seem to be struggling to get to grips with risk-based security, especially where it concerns defensive strategy. Few if any organisations have sufficient budget to protect and test every part of the business, so how do we choose where to put our effort and money? The skills, knowledge and techniques needed to defend against an agile and devious attacker are available but infrequently deployed properly. In this webinar, Peter Wood will describe some case studies where risk-based security has made a real difference to organisations’ defences and response to cyber-attack.

      Read more >
    • Cybersecurity and Investors Cybersecurity and Investors Jacob Olcott, Vice President, BitSight, Nell Minow Recorded: Oct 26 2015 6:00 pm UTC 49 mins
    • There’s no doubt that cyber attacks cause real financial harm to businesses. Money can be stolen, business operations disrupted. Cyber theft can provide international competitors with years worth of valuable intellectual property or trade secrets virtually overnight, jeopardizing current and future market opportunities. Cyber attacks can seriously damage an organization’s reputation with customers and result in legal liability for the company, executives, and board members.

      As companies race to protect themselves, how do investors know if the organizations they are investing in are secure?

      Join Jacob Olcott, VP at BitSight, and Nell Minow, corporate governance expert and co-founder of Institutional Shareholder Services (ISS), for a discussion of key issues, including:

      -How investors assess cybersecurity in the M&A diligence process

      -What institutional shareholders want to know about cyber risks to their investments

      -How shareholders can meaningfully engage with companies on cybersecurity

      Read more >
    • Regulatory Hot Topics for Financial Services in 2014 Regulatory Hot Topics for Financial Services in 2014 Protiviti's Tim Long, Scott Jones, John Atkinson, Steven Stachowicz, Nicole Weber Recorded: Jan 29 2014 6:00 pm UTC 63 mins
    • With nearly 40 percent of the Dodd-Frank Act yet to be implemented, numerous new consumer protection requirements taking effect this year, and the continued strong focus on anti-money laundering and sanctions compliance, regulatory compliance will remain a major challenge for the financial services industry in 2014.

      Join Protiviti's Tim Long, Scott Jones, John Atkinson, Steven Stachowicz and Nicole Weber on Wednesday January 29, as they help compliance, risk and internal audit professionals identify some of the important regulatory issues and developments for 2014 that will need to be included in internal audit and compliance programs.

      Topics will include:
      • Consumer Financial Lending and Deposits Products
      • Anti-Money Laundering and Sanctions
      • Broker-Dealers and Investment Advisers
      • The impact of the Current Environment on Compliance and Internal Audit organizations

      CPE credits will be provided to qualifying attendees.

      We look forward to having you join us. If you have any questions, contact Esther Veenhuizen at 212.708.6350 or esther.veenhuizen@protiviti.com.

      Read more >
    • Copyright Regime vs. Civil Liberties Copyright Regime vs. Civil Liberties Rick Falkvinge, Founder of the Swedish and first Pirate Party Recorded: May 13 2015 1:00 pm UTC 47 mins
    • The copyright monopoly debate has gotten exactly nowhere since the
      days of Napster. There's still a copyright industry that insists on
      control of the net in the name of lost profits. But what does this do
      to the net? More to the point, why are we letting a literal cartoon
      industry have any say at all in regulation of our most important piece
      of infrastructure?

      In this presentation, Rick Falkvinge, founder of the Swedish and first
      Pirate Party, examines how the entire copyright industry position is a
      red herring, which is (or should be) completely irrelevant to
      policymaking on net issues. He brings up the concept of Analog
      Equivalent Rights, and painfully points out that some of the most
      crucial civil liberties of our parents are currently not being passed
      on to our children, because doing so would interfere with profits of
      entertainment companies.

      There's nothing wrong with profit as such. But no entrepreneur should
      get to dismantle civil liberties just because they can't make money
      otherwise.

      Read more >
    • Evolution of Encrypting Ransomware Evolution of Encrypting Ransomware Tyler Moffitt-Senior Threat Research Analyst, Webroot Recorded: Oct 23 2014 5:00 pm UTC 48 mins
    • Encrypting ransomware is a key term in the title as just ransomware is broad and can include threats that are very different, easy to detect, and don't encrypt files at infection - the key differentiation point that gives these threats the upper hand against AV.

      The presentation is going to be on all the encrypting ransomwares we've seen thus far. It will cover in-depth features of each one and how malware authors made improvements as time went on. There is quite a few so it will be a full presentations worth (cryptolocker, dir-crypt, cryptowall, cryptodefense, zero-locker, critroni, synolocker, cryptographic locker). I'll show from start to finish of an infection and what a user will experience and will highlight social engineering tactics along with the methods of payment circumventing money mules.

      Read more >
    • Navigating the Intersection of the FCPA, AML and Extraterritorial US Laws Navigating the Intersection of the FCPA, AML and Extraterritorial US Laws Jeffrey Lehtman, Kurt Wolfe, Sarah Cox, Ellen Zimiles, Alma Angotti, Jay Perlman Recorded: Jun 18 2013 5:00 pm UTC 67 mins
    • In a recent case the DOJ dubbed a “wake-up call,” the SEC and DOJ charged four individuals for their roles in a massive international bribery scheme, which the SEC discovered during a periodic examination of a broker-dealer. The agencies allege that employees of Direct Access Partners, LLC (“DAP”), a registered broker dealer, paid illicit bribes to high-ranking officials of Banco de Desarrollo Economico y Social de Venezuela (“BANDES”), the state-owned economic development bank of Venezuela. The action illustrates how conduct that has traditionally formed the basis of a Foreign Corrupt Practices Act (“FCPA”) case might also subject individuals and entities to a much broader array of charges under US law, including charges under anti-money laundering laws and the Travel Act.

      Join an experienced panel of government enforcement experts to learn how multi-national organizations in all industries can ensure that they have developed and implemented robust compliance programs that address these overlapping regulatory schemes.

      Read more >
    • Combatting modern-day slavery through supply chain transparency Combatting modern-day slavery through supply chain transparency Mark Agnew Recorded: Sep 29 2015 1:00 pm UTC 62 mins
    • Slavery may seem like a thing of the past but is sadly not absent from the modern world. There are still many examples of human trafficking and exploitation in countries such as Thailand. More often than not, exploited individuals end up ‘paying back’ money earned to traffickers by working in factories and manufacturing plants.


      Supply chain management and transparency is therefore imperative for companies to ensure that slavery is not being used in the production chain. Emotive issues such as slavery can cause significant reputational damage to companies. And this is before one considers the moral obligation companies have to combat slavery and human trafficking.


      This webinar will explore the mechanisms that companies can use to ensure that people are not being exploited at any level of the supply chain. Speakers include The Red Flag Group Executive Chairman Scott Lane and Director of Anti-Slavery International Aidan McQuade

      Read more >
    • How to De£use the Fraud and Mone¥ Laundering Tim€ Bomb Ticking in Tran$lation How to De£use the Fraud and Mone¥ Laundering Tim€ Bomb Ticking in Tran$lation David Clarke, Today Advisory, Counter Fraud Specialist, Trustee and Founder of the NFIB Recorded: Oct 14 2014 12:00 pm UTC 42 mins
    • History teaches us that when things go seriously wrong in the legal and financial world the effects can take Nations to the edge of the abyss and spell personal and economic disaster for citizens and organisations not protected. The scandals of sub-prime mortgages, Libor and Payment Protection Insurance (PPI) provide a sobering reminder of what happens when professionals don’t follow the rules. This presentation exposes a risk that is often unseen – translation.

      In his presentation, David will:

      • Discuss the factors that contributed to recent financial scandals;

      • Ask why scandals such as PPI went undetected for so long despite being identified a decade earlier.

      • Highlight the nature of threat society faces from financial crime; and the new tougher enforcement approach being adopted by regulators.

      He will then shed light on a major compliance risk that has had little or no coverage to date: The use of translation and interpreting to facilitate fraud and money laundering and misinform customers of their rights and obligations.

      He will consider the potential scale of the problem and outline weaknesses in current practices in the professional services sector that poses a significant risk.

      David advocates ‘drawing a line in the sand’ and offers 5 steps to help regulated professionals to defuse the multilingual time bomb before it explodes into another major scandal.

      Read more >