- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
Provided by IdentityMind2018-01-05T11:15:00
The IdentityMind white paper provides important background and tips to improve the sanction screening process. Learn how false positives can be minimized using matching algorithms, ways to apply risk integrated rules to configurable lists, and how their technology can help to eliminate wasted effort and improve results.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2025-04-21T12:00:00Z By Neil Hodge
The United Kingdom’s latest effort to encourage regulators to pare down rules to attract companies and investment as a way to stimulate the economy has received mixed reviews from lawyers.
2025-04-18T17:45:00Z By Oscar Gonzalez
The U.S. Consumer Financial Protection Bureau continues to unravel amid pressure from Trump administration officials to shutter the agency. Not only has the agency informed its employees that it will no longer be a watchdog for the financial services industry, it has also laid off employees despite court orders blocking ...
2025-04-17T14:00:00Z Provided by ProcessUnity
Join us for a live webcast to learn how the newest risk exchange models are eliminating 80 percent of questionnaire requests with data.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
2024-05-05T17:30:00Z Provided by ServiceNow and KPMG
To help investors gain a better understanding of cyber risk, the US Securities and Exchange Commission (SEC) has created sweeping new rules—forcing companies to take a more proactive approach to cybersecurity.
Site powered by Webvision Cloud