Latest Resources – Page 66
-
Webinar
The Crucial Challenges Every Organisation Must Address
Changing legislation and increased risk from lawsuits from inadequate incident and breach management processes is a challenge for every General Counsel in 2021.
-
Webinar
Making the most of multi-cloud Backup as a Service: Nine things to consider
Ask anyone how much they love backup and you get the same response. Laughter. It doesn’t have to be like that, especially if you’re looking for the right solution to handle your on-premises and public cloud IT environments.
-
News
Giant US insurer warns breach leaked customers’ driving license numbers
Major US car insurer Geico has sent a letter to policy holders to tell them of a hack which exposed their driver’s licence number to cyber-attackers.
-
Webinar
Tracking US Privacy Laws
This year, multiple states have introduced, reintroduced, or will make effective new privacy laws. While all eyes have been on the California Consumer Privacy Act (CCPA), there are many other notable federal and state-level laws you should know.
-
News
Investigation under way after hack at provider of code testing software
Codecov has called in law enforcement agencies after a cyber attacker breached one of its products which enables software developers to test source code to help prevent bugs and syntax errors.
-
Sponsored
Microsoft: Identifying and managing insider threats
Data breaches due to the behaviour of insiders is of increasing concern globally, but how do you tackle the problem? Neha Monga of Microsoft explains how you can identify and mitigate the risks
-
Q&A
PrivSec Job Focus: Lluis Mora, Chief Security Officer, Entain Group
In our latest reader-submitted Q&A, Lluis Mora talks about the importance of product design, customer experience and trust
-
News
Global cyber-attacks ‘top 600 a minute’
An average of 648 online threats per minute took place worldwide in the fourth quarter of last year, up 10.2% on the previous three months, according to research by security company McAfee Labs.
-
News
97% of businesses ‘experienced cyber attacks via mobile devices last year’
Nearly every business polled reported a cyber-attack via a mobile device last year, according to research by cyber security firm Check Point Software Technologies
-
Webinar
Identifying quick wins to enable data trust from an enterprise data governance program
The journey to data privacy governance is no easy task, especially when there is no vision of how data trust is connected to your business goals.
-
News
Indian online stockbroker Upstox enhances security after suspected data breach
Upstox, India’s second largest stockbroker, has upgraded its security systems after receiving emails claiming unauthorised access into the company’s database.
-
News
Israeli regtech AML firm ‘considers public listing’ ahead of expected AI boom
Israeli cyber security firm ThetaRay is considering listing on the stock market following an increase in the valuation of regtech companies.
-
Video
Due Diligence in the Age of Digital ID. A Revolution in Anti-Financial Crime?
Knowing and trusting who customers are is the primary responsibility of due diligence.
-
Video
Technological Promises, Criminal Realities. A conversation between Julian Dixon and Oliver Bullough
In the past decade, the ‘Regulatory Technology’ sector, or ‘RegTech’, has developed quickly in response to the need to manage existing financial crime risks better, enabled by the growing capacity and capability of evolving technologies themselves.
-
Video
The transparency illusion- UK companies and the Beirut Explosion
The explosion in Beirut was allegedly the largest non-nuclear explosion in history. But it has since emerged that the cause of the explosion was Ammonium Nitrate owned by a dormant UK company.
-
Video
Case Study: The Role of Digital Behavior in Identifying Mule Accounts
Money mules have become a modern day gold rush for cybercriminals.
-
Video
The Cyber-Fincrime Nexus The Impact of COVID-19 and the Next Steps
Even before 2020, law enforcement agencies had been warning of a growing nexus between cyber and financial crime, and an expanding role from international serious organised crime groups.
-
Video
Transforming Compliance into Risk Management. A presentation by Michael Rasmussen
Regulators consistently talk about the need for a ‘risk-based approach’ to financial crime, and many organisations have created ‘risk management’ functions to complement, and in some cases replace, legacy compliance functions. This shift is based on a recognition that it is not just what you do, it is how you do it that matters. Financial criminals are agile and reflexive, and those that seek to stop them need to be so in response.
-
Video
Effective Financial Crime Risk Management. How do we evidence what we are doing in AFC is actually effective?
We have started to see a shift in the AFC community, as the pressure from regulators for firms to achieve good outcomes in financial crime prevention increases. There is likely to be greater focus on how outcomes are measured and how confident firms are that their controls are effective at tackling financial crime.
-
Video
Keynote: ‘Everyone Is Doing Badly’: AML After 30 Years - A Conversation with David Lewis, Executive Secretary of FATF
In 1989, the Group of Seven leading industrialised nations formed the Financial Action Task Force (FATF) to create international standards in Anti-Money Laundering (AML).