InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

What Are the Elements of a Strong OFAC Sanctions Program?

Presented by

Paul Mockapetris, Chief Scientist at ThreatSTOP

About this talk

Discover the key elements required to maintain rigorous sanctions compliance in this informative video by Francis Turner from ThreatSTOP. Learn about the challenges of identifying and avoiding interactions with sanctioned entities and how ThreatSTOP's solutions can support your compliance efforts. Explore practical measures, including IP address filtering and identifying controlled entities, that can help you navigate complex sanctions regulations and keep your business secure. Key Takeaway: In the intricate landscape of sanctions compliance, staying vigilant is crucial. Francis outlines essential strategies to navigate the challenges of sanctions enforcement. By leveraging ThreatSTOP's tools, you can implement effective compliance measures using your existing firewalls and DNS service. With built-in reporting, you can be sure you're not inadvertently engaging with sanctioned parties. ThreatSTOP DNS and IP Defense solutions demonstrate your best effort towards compliance, protecting your business from liability. Fortify your sanctions compliance strategy by contacting us and learning how ThreatSTOP can start protecting you in as little as 15 minutes.
ThreatSTOP, Inc.

ThreatSTOP, Inc.

300 subscribers40 talks
Proactively block real-time cyber threats.
ThreatSTOP was started in 2009 with a mission: Give organizations of any size the same cybersecurity protection that Fortune 1000 companies have. Few companies have the resources to curate threat intelligence feeds and update network devices to block real-time threats. ThreatSTOP automates network security, converting the latest threat data into enforcement policies, and blocking attacks before they become breaches.
Related topics