All Resource articles – Page 14

  • Resource

    Preventing worldwide human rights abuses

    2018-03-06T15:45:00Z Provided by

    No company in the world wants to be the subject of a human rights abuse violation. In this eBook, produced by Compliance Week in partnership with iPoint, chief compliance officers, chief risk officers, and in-house counsel will learn everything they need to know about how to mitigate such a risk.

  • Resource

    7 Step Guide to Risk & Compliance

    2018-03-05T11:00:00Z Provided by

    This guide provides insight into how technology can empower compliance professionals with the correct tools to assess regulatory impacts, then communicate this information effectively throughout your organization. In short, Signavio’s 7 Step Guide to Risk & Compliance will help ensure compliance becomes a company-wide endeavour, by harnessing the skills, knowledge, ...

  • Resource

    It’s time to refocus your internal control lens on risks. Not benchmarks.

    2018-02-27T09:00:00Z Provided by

    The first paper in Deloitte’s new series on ICFR takes a closer look at financial statement risk assessments and provides a risk assessment diagnostic scorecard to help get you started. The paper also discusses how world-class organizations are applying innovation to their ICFR programs as part of the risk assessment ...

  • Resource

    Taking the pulse of third-party risk management policies

    2018-02-23T15:00:00Z

    This e-Book, produced by Compliance Week, explores the latest trends in third-party risk management programs against which compliance officers and risk officers can gauge how their programs compare against their peers. This eBook further examines best practices for how to reduce the associated costs of managing third-party risk.

  • Resource

    Cybersecurity Pulse Check Cross-Industry Performance Report

    2018-02-09T11:00:00Z Provided by

    True Office’s Cybersecurity Competency Toolkit is one-stop-solution to help organizations diagnose employee understanding of their role in cybersecurity and train on the necessary topics to ensure compliance with policies and regulations.

  • Resource

    When sexual harassment impacts corporate culture

    2018-02-07T11:15:00Z Provided by

    This eBook, produced by Compliance Week in collaboration with NAVEX, provides the latest insights and best practices on how to proactively address the company’s expectations concerning employee behavior, address gaps in a speak-up culture, and properly respond to allegations of misconduct.

  • Resource

    Financial Services: Managing Digital Risk and Compliance

    2018-02-06T10:30:00Z Provided by

    Cyber criminals go anywhere there’s a potential financial gain, and FIs a top target. To fight back against these potential threats, you need a digital risk and compliance solution built for all your digital channels.

  • Resource

    File Sharing Without Fear: 5 Key Requirements for Law Firms When Choosing a Content Collaboration Platform

    2018-01-23T09:00:00Z Provided by

    As we will explore, despite the industry’s aversion to media coverage of attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.

  • Resource

    How To Tackle the Challenges of GDPR

    2018-01-19T11:45:00Z Provided by

    This whitepaper explores compliance approaches, explains the importance of governance to successful compliance, and offers guidance on implementing new technologies to support GDPR initiatives      .

  • Resource

    Case Study: Global Investment Firm Uses Secure File Sharing Tool to Comply with International Regulations

    2018-01-16T14:15:00Z Provided by

    QIC routinely works with highly sensitive data, and keeping this data secure is critical. An expanding global presence represented a significant challenge for the organization in this regard – a challenge it met through BlackBerry Workspaces.

  • Resource

    Goldmoney Case Study

    2018-01-12T10:45:00Z Provided by

    Goldmoney uses IdentityMind to automate their KYC, Anti-Money Laundering, and Fraud Prevention activities. Our scalable solution allows uninhibited growth and our automation, machine learning, and easy-to-use rules allowed Goldmoney to focus on expanding their business.

  • Resource

    The Sanctions Screening Whitepaper

    2018-01-05T11:15:00Z Provided by

    The IdentityMind white paper provides important background and tips to improve the sanction screening process. Learn how false positives can be minimized using matching algorithms, ways to apply risk integrated rules to configurable lists, and how their technology can help to eliminate wasted effort and improve results.

  • Resource

    Trusted Digital Identities

    2018-01-05T11:15:00Z Provided by

    Read this white paper to learn more about why it is crucial to develop digital identities which look at more than static data, and how introducing digital attributes such as online behavior and transactional history creates a much more robust system where trusted identities and suspicious identities evolve differently, making ...

  • Resource

    Forrester's Vendor Landscape: Anti-Money Laundering Solutions 2017

    2018-01-05T11:15:00Z Provided by

    In this comprehensive report, Forrester explains that Anti-Money Laundering (AML) programs are key for companies that facilitate financial transactions. When selecting the right AML technologies, you should consider the broader financial crimes prevention and risk management architecture within which AML sits.

  • Resource

    Secure information exchange with cloud fax for Financial Services

    2017-12-20T09:00:00Z Provided by

    Meeting the ever-changing requirements of regulations, such as Sarbanes Oxley, Gramm-Leach-Biley and Basell II, is an increasing and costly challenge for all organizations in the Financial Services sector.

  • Resource

    Five Must-Haves in a Cloud Financial Management System

    2017-12-19T12:00:00Z Provided by

    Read this whitepaper to find out what to look for when evaluating a cloud-based financial management solution.

  • Resource

    File Sharing and Collaboration Leads to Security Gaps in Financial Services Firms

    2017-12-11T11:00:00Z Provided by

    Despite strict security policies, and high scrutiny from regulators, most financial services institutions reported they had experienced a breach of business files. The culprits varied, but at the heart of many of these breaches was inadequate means for sharing files.

  • Resource

    5 Key Things Your Policies Policy Must Have

    2017-12-06T09:15:00Z Provided by

    5 Key Things will offer one easy approach for mastering all your policy challenges in a way that brings simplicity to your organization—and satisfaction to your stakeholders.

  • Resource

    Implementing Customer Risk Profiling

    2017-12-04T09:00:00Z Provided by

    This white paper gives you insight on the ways you can overcome the toughest challenges and even enhance risk management activities.

  • Resource

    2018 Top 5 Compliance Investments

    2017-12-04T09:00:00Z Provided by

    By identifying and responding to shifts and trends in compliance early, compliance, business, risk, legal, technology, and internal audit partners can better position their organization to move beyond compliance