How Regtech can help with Know-Your-Customer and Data Sharing Challenges

Presented by

Miranda Brawn (moderator), Donald Gillies (PassFort), Paul Higgins (Crowd Valley), Emma Lindley (Innovate Identity)

About this talk

Digital developments are opening new paths that are making Regulation and Compliance not only constraints but also business opportunities to redefine the rules of the compliance game, make them more palatable, more efficient, cheaper and also open commercial prospects to providers of digital products and solutions aiming at using technology with regulation and compliance. The So-called REGTECH sector is fast becoming particularly relevant in the fields of fintech and insurtech, using blockchain in particular as a key infrastructure to improve compliance in financial services, insurance but also trade. This webinar will discuss how these new advances can help with the challenges institutions face in complying with challenges such as Know-Your-Customer (KYC) and data sharing.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13396)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more