Information Security Risk Compliance

Enterprise Wide Cyber Risk Management

Our financial industry has been plagued with financial crimes like phishing, fraud, critical data leakage, security lapses and anti-money laundering experiences. Cyber security has become an extremely important challenge for the banks. Failure in cyber security not only impacts operations, reputations and core processes, but public’s confidence in financia [...]

Risky Business: Healthcare Compliance is a Priority over Data Security!

A recent Healthcare Edition of the 2016 Vormetric Data Threat Report (DTR) observed that despite feeling vulnerable to data threats, IT security leaders are prioritizing and focusing more on Compliance. 96% are already bracing for an attack on the personal information, and almost 63% of them experienced a past data breach, with nearly one in five indicating [...]

Electronic Money with Compliance Hazards

The Electronic Fund Transfer Act (EFTA, 12 CFR 1005) was passed by the U.S. Congress in 1978 and signed by President Jimmy Carter, to establish the rights and liabilities of consumers as well as the responsibilities of all participants in electronic funds transfer activities.If your institution is still debating the future of Remittance Transfe [...]

Does anyone EVER read my SAR Reports?

One of the most important tasks that a Bank Secrecy Act (“BSA”) Officer has is to make the decision whether or not to file a suspicious activity report (“SAR”).   Many BSA Officers have had the experience of reviewing transactions, analyzing them for suspicious activity and then making the decision whether or the not the activity rises to the level [...]

360factors at the Next Gen Oil & Gas Pipeline Security Conference

CEO Ed Sattar recently spoke at The Next Generation Oil & Gas Pipeline Security conference in Houston, Texas on February 17-19.Designed to provide a fully comprehensive platform to security experts in all aspects of oil and gas protection, the conference focused on the latest developments in pipeline monitoring and security technology and how it mee [...]