- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
Provided by Mindcrest2018-07-31T13:30:00
New rules and regulations for conducting business are constantly being developed—sometimes daily, it seems—both domestically and globally. Organizations must keep up by implementing a robust regulatory mapping system to ward off fines and penalties and, at the same time, maintain brand equity.
2025-06-19T19:28:00Z By Ruth Prickett
Fraud now accounts for around 40% of all crime in the U.K., posing a major problem for banks and consumers. Ted Datta, head of industry practice for financial crime compliance at Moody’s, warns that the risk is growing fast.
2025-06-17T15:17:00Z By Adrianne Appel
The Criminal Division of the Department of Justice, continuing its aggressive, pro-business stance, has revamped key, white-collar crime enforcement policies, including clarifying fine reductions in its self-disclosure program and curbing its use of monitorships.
2025-06-16T18:04:00Z By Neil Hodge
Trying to put rules in place to oversee an industry that has grown largely outside of regulation is not without serious challenges. But the UK’s Financial Conduct Authority’s (FCA) latest consultation aims to attract industry views about how some key aspects of crypto trading should be regulated ahead of planned ...
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
2024-05-05T17:30:00Z Provided by ServiceNow and KPMG
To help investors gain a better understanding of cyber risk, the US Securities and Exchange Commission (SEC) has created sweeping new rules—forcing companies to take a more proactive approach to cybersecurity.
Site powered by Webvision Cloud