A full discussion draft of Senate Banking Committee Chairman Richard Shelby’s regulatory relief bill was released on Tuesday, May 12. This legislation could mean some big changes are in store for community and regional banks.
The latest cybersecurity threats have bankers focused on such initiatives as DDoS, social engineering and external penetration. But while these concepts are important, they shouldn’t distract from the more commonplace areas. So, in the hierarchy of cybersecurity controls at your organization, where does email encryption fall?
Recently, I was browsing Facebook and saw a post that caught my eye. It was a photo of a small wooden board. There were clothes pins attached and a painted heading that read: “Sole Mates.” The idea is to hang this board in your laundry room, and whenever you find a single sock, pin it to the board in hopes the missing sock will show up and find its “mate.”
UDAAP: Is there a more concerning or confusing acronym in current financial regulatory jargon? This vague yet all-encompassing regulation is still in its infancy compared to many compliance laws, but its bite is proving as injurious as its initial bark had foreshadowed.
As CSI’s data services manager and resident watch list expert, I do everything I can to stay on top of the latest updates to the OFAC SDN and restricted party watch lists. And with no sign of the Ukrainian crisis letting up, I sat down with Doug Jacobson, an international trade attorney in Washington, D.C. who specializes in sanctions and export controls. He gave us an update on the U.S. sanctions on the Crimea region—and what this means for financial institutions and other companies.
With stories of cybercrime and cyberattacks buzzing in the headlines, it’s no surprise more sanctions, like those levied against North Korean officials and organizations, are back in the news. In fact, on April 1, 2015, President Barack Obama ramped up the OFAC sanctions program—and now he’s focusing on cyber-related threats.
Your institution’s data is a veritable goldmine, but in order to really benefit from it, you must be able to fully analyze it. Enter business intelligence (BI) tools.
Imagine a time when your institution or organization is under constant attack—all day, every day—from criminals. They attempt to scramble through doors and windows just like the bank robbers in those old black and white film shorts. They attempt to fool or exploit your employees just like Frank Abagnale, the con man of Catch Me If You Can fame.
Since its introduction in the Dodd-Frank Act, Unfair, Deceptive or Abusive Acts or Practices (UDAAP) has had financial institutions jumping through flaming hoops, trying to avoid penalties and enforcement actions. And unlike its predecessor, Unfair or Deceptive Acts or Practices (UDAP), which will likely be eliminated, UDAAP is here to stay.
Like all things Apple, their product developments are prominent in the headlines. But this time, Apple is coming under scrutiny for card fraud occurring on their mobile payment platform, Apple Pay.