Money-laundering is one of the most common and complex financial crimes to be committed. Learn exactly what you need to know about the specific statutes and regulations that govern the crime.
Register for this webinar to receive first-hand advice from a veteran anti-money laundering investigator on:
Key...
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
What are some of the key audit and risk trends to track? David Melnick of Deloitte answers that...
Hard times have taken a toll everywhere - even when it comes to internal audit practices at financial institutions.
Yet, in the wake of security breaches and questionable business practices at some financial institutions, federal regulators are cracking down on auditors. In an exclusive interview, Holly Kidder, a...
Hard times have taken a toll everywhere - even when it comes to internal audit practices at financial institutions.
Yet, in the wake of security breaches and questionable business practices at some financial institutions, federal regulators are cracking down on auditors. In an exclusive interview, Holly Kidder, a...
Information security policies and procedures are the cornerstone of any information security program - and they are among the items that typically receive the greatest scrutiny from examiners and regulators. Cursory, disconnected or poorly communicated security policies will fail and likely drag down the overall...
Critics of the Heartland Payment Systems data breach have called out for tougher encryption standards for financial institutions and their third-party service providers. Applications for encryption are all around us from encrypting email traffic to board communications, remote access and mobile & Internet banking....
Information Security Media Group (ISMG), publisher of BankInfoSecurity.com and CUInfosecurity.com, recently posed few questions to Gary S. Baker, Partner, Enterprise Risk Deloitte & Touche LLP, and a senior ISACA leader on IT Governance and Assurance. In this exclusive interview, Gary S. Baker an audit and IT...
Mobile Payment Systems, Social Media, Facebook and LinkedIn. These are among the targets of the modern-day money launderer, and it behooves your institution to understand and prepare for them. Register for this webinar to hear directly from money-laundering investigator Kevin Sullivan:
The...
"Who's watching the road?"
That's the question many observers ask amidst the global economic crisis, with its wild market fluctuations and historic failures of well-known banking institutions such as Washington Mutual and IndyMac.
But don't blame these failures solely on institutions' audit committees for being...
Given the increased external scrutiny of banking institutions, what are the requisite skills and responsibilities for internal auditors?
"Up to now the internal auditors and the audit committee at banks have been mainly concerned with what the regulators and examiners have to say, and their prime focus has been on...
Internal auditing has always been a key function within financial systems, and it becomes even more so when it comes to IT and information security.
In this exclusive interview, David Richards, President of the Institute of Internal Auditors (IIA), discusses:
The key differences between internal and IT...
Interview with David Richards, President of the Institute of Internal Auditors
Internal auditing has always been a key function within financial systems, and it becomes even more so when it comes to IT and information security.
In this exclusive interview, David Richards, President of the Institute of Internal...
Join Information Security Media Group's Richard Swart in a conversation with Nathan Johns, former Chief of Information Technology at the FDIC. Based on his years of experience with banks, technology and audits, Johns offers his thoughts on training (classroom, online and hands-on), as well as advice for people just...
This workshop will expand on many of these areas and present practical and proven approaches many institutions have adopted in order to comply with Section 501(b) of GLBA and Section 216 of Fair and Accurate Credit Transaction Act. In the course of this workshop, we will provide detailed "best practices"...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.