InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

5 Steps to Automating OFAC Compliance (The Details Please)

Presented by

Paul Mockapetris, Chief Scientist at ThreatSTOP

About this talk

Automating OFAC compliance through ThreatSTOP can be as simple as five steps: Seamlessly integrating the aggregation and enrichment of threat intelligence from diverse sources Precision categorization User-customized policy creation Thorough research and enrichment, including subsidiary identification Effortless enforcement with automated reporting, ensuring efficient and effective risk mitigation. Watch this video as Paul and Ofir discuss different threats and ways to thwart them. Key Takeaway: ThreatSTOP's process for automating compliance involves aggregating, enriching, and categorizing threat intelligence from various sources, including government and proprietary data, using geographic threat intelligence, and partnering with compliance experts like Fiveby. This intelligence is transformed into user-customizable policies, taking into account OFAC updates, global entities, subsidiaries, and detailed research. Enrichment and categorization ensure precision, while easy policy configuration and automated reporting culminate in effective compliance risk management.
ThreatSTOP, Inc.

ThreatSTOP, Inc.

299 subscribers40 talks
Proactively block real-time cyber threats.
ThreatSTOP was started in 2009 with a mission: Give organizations of any size the same cybersecurity protection that Fortune 1000 companies have. Few companies have the resources to curate threat intelligence feeds and update network devices to block real-time threats. ThreatSTOP automates network security, converting the latest threat data into enforcement policies, and blocking attacks before they become breaches.
Related topics