MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Bank Systems & Technology
March 11, 2004
Peggy Bresnick Kendler
Meeting the E-Mail Security Challenge As e-mail usage becomes a standard way of doing business in banking, security issues have become an increasingly complex matter. Financial services firms looking to minimize e-mail security risks need to put a plan into place. mark for My Articles similar articles
Bank Systems & Technology
July 5, 2004
Peggy Bresnick Kendler
Virus Vigilance A virus can grind a bank's operations to a halt and expose billions of dollars. To really safeguard their systems, banks must implement strict security policies - and communicate them to employees and technology partners. mark for My Articles similar articles
Insurance & Technology
November 1, 2006
Maria Woehr
Message Mania For insurers, e-mail and instant messaging provide easy ways to share information with distributors and employees, communicate effectively with customers and agents, and help claims adjusters transfer files to turn around claims - all in real time. mark for My Articles similar articles
U.S. Banker
November 2007
Patrick Conte
Embrace This Acronym: IT GRC. It Could Save Banks a Bundle. Used to describe the interdependent disciplines of governance, risk and compliance, GRC refers to the people, processes and technology banks invest in to comply with regulations and manage risk as part of effective corporate governance. mark for My Articles similar articles
Insurance & Technology
July 19, 2004
Peggy Bresnick Kendler
Victory Over Viruses? Insurers must rely on a combination of tools - such as e-mail filters and firewalls - training and common sense to safeguard their systems and their operations from viruses and worms. mark for My Articles similar articles
Insurance & Technology
August 12, 2005
Peggy Bresnick Kendler
The Compliance Challenge Industry experts offer opinions on what the biggest challenges carriers currently face in terms of regulatory compliance. mark for My Articles similar articles
Global Services
May 27, 2007
Raj Chaturvedi
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Jody Westby
Building an Enterprise Security Program Key to Managing Risks Insurance companies are particularly vulnerable to cyber risks because they house so much sensitive data. mark for My Articles similar articles
Financial Planning
October 1, 2009
Nancy Lininger
What It Takes Compliance is top of mind at many firms today. Here's what makes a great compliance officer, no matter who takes the role. mark for My Articles similar articles
Bank Director
2nd Quarter 2010
Jack Milligan
Knee Deep in Regulation As part of the fallout from the latest financial crisis, bankers are wading through new layers of regulation while scanning for clearer skies ahead. mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
InternetNews
November 17, 2006
Clint Boulton
Rajiv Gupta, CEO, Securent Corp. Securent is one of the first startups targeting the next layer of identity management: entitlement. mark for My Articles similar articles
CIO
May 15, 2006
Diann Daniel
Regulation's Silver Lining John Hagerty, vice president of research with AMR, says regulatory mandates have put a new spotlight on IT as a means to mitigate business risk. mark for My Articles similar articles
Insurance & Technology
June 14, 2005
Wendy Toth
Securing Compliance: System, Project or Process? Database and application security products are growing in popularity as companies look for ways to keep up with regulatory demands like Sarbanes-Oxley. mark for My Articles similar articles
Bank Technology News
May 2011
Clara Shih
5-Step Social Media Plan With more than 800 million active users across Facebook, LinkedIn, and Twitter, social media cannot be ignored. Financial institutions must adapt or face mass customer migration. mark for My Articles similar articles
Bank Technology News
January 2006
Better Info Security Driven By Regulatory Compliance If information security is to become a strategic priority, then banks can start by reviewing existing practices -- their own and that of those companies with which they do business. mark for My Articles similar articles
Insurance & Technology
May 28, 2008
Nathan Conz
Insurers Taking More Unified Approach to Compliance Compliance is becoming the key component of core systems -- especially within the insurance industry. It means complying with state-to-state insurance regulations; but it also means establishing an anti-money laundering program. mark for My Articles similar articles
Insurance & Technology
May 16, 2007
Peggy Bresnick Kendler
Effective Vendor Management Enables Insurance Companies to Get the Most Out of Software, IT Services and Outsourcing Contracts Questions and answers about insurer/vendor relationships. mark for My Articles similar articles
OCC Bulletin
December 14, 2005
Small Entity Compliance Guide This compliance guide summarizes the obligations of financial institutions to protect customer information and illustrates how certain provisions of the Security Guidelines apply to specific situations. mark for My Articles similar articles
Wall Street & Technology
March 1, 2004
Getting Management on Board With Compliance Compliance and litigation readiness have blasted up the priority list of top management. Leading financial institutions have appointed general counsel into top management roles. Boards of directors are reviewing and approving technology solutions. mark for My Articles similar articles
OCC Bulletin
May 10, 2004
Risk Management of New, Expanded, or Modified Bank Products and Services The risk management principles in this bulletin outline the expectations of the Office of the Comptroller of the Currency and apply to the introduction of traditional and non-traditional bank products and services, as well as modifications to existing products and services. mark for My Articles similar articles
Insurance & Technology
May 18, 2004
Julie Gallagher
IT Isn't Tapped for Compliance The insurance industry fails to embrace the full business value of IT when it comes to addressing regulatory requirements and instead relies primarily on manual processes and ad hoc measures mark for My Articles similar articles
Bank Systems & Technology
March 5, 2010
Penny Crosman
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. mark for My Articles similar articles
CIO
October 15, 2008
Kim S. Nash
Why Technology Isn't The Answer To Better Security You've beefed up your IT security arsenal, and you're focused on compliance. But you're still vulnerable. Here's why. mark for My Articles similar articles
National Defense
February 2015
Jessica Bejarano
Creating Effective Compliance Programs Enforcement of government contract regulations has become increasingly vigilant. mark for My Articles similar articles
InternetNews
December 23, 2005
Roy Mark
E-Mail Dominance Faces Challenges E-mail faces significant challenges from real time communications, spam and bugs and viruses, according to a new report from IDC. mark for My Articles similar articles
Bank Systems & Technology
April 25, 2008
Gregory J. Calpakis
Knowledgeable Personnel and Flexible AML/CFT Programs Are Banks' First, Best Line of Defense The most important aspect of an effective program for anti-money laundering and combating the financing of terrorism is people. It is critical for an organization to have staff who are knowledgeable and experienced and continuously receive training. mark for My Articles similar articles
Bank Systems & Technology
December 1, 2003
Cynthia Ramsaran
Newer Regulations Keep Banks On Their Toes When it Comes to Content Compliance demands highlight need for enhanced content management strategies. mark for My Articles similar articles
CIO
December 11, 2008
Jarina D'Auria
Achieving Compliance As economic tough times continue, there's one thing companies can count on: more regulations. So, should you buy a GRC tool or leverage existing applications? A company's size and the scope of its operations can help guide that decision. mark for My Articles similar articles
Insurance & Technology
March 7, 2006
Peggy Bresnick Kendler
Who Goes There? Insurance industry executives discuss how controlling access to information through identity management is key to securing critical client and corporate data. mark for My Articles similar articles
Bio-IT World
February 11, 2005
Judy Hanover
Leveraging IT to Achieve Compliance Budgeting and measuring the success of compliance initiatives is a credibility issue for CIOs. mark for My Articles similar articles
Bio-IT World
January 12, 2004
Steve Lefar
Systematize Your Regulatory Info! Want better protection against regulation breaches? Build a system that engenders 'grassroots' compliance. mark for My Articles similar articles
Wall Street & Technology
November 21, 2006
Cory Levine
Inefficient Efforts: Firms Look to Break Down Their Isolated Compliance Processes Industry solution providers are coming up with new ways to unify compliance efforts across the organization, bringing efficiencies and benefits to the business from widely maligned regulatory mandates. mark for My Articles similar articles
OCC Bulletin
November 1, 2001
Third-Party Relationships This bulletin provides guidance to national banks on managing the risks that may arise from their business relationships with third parties... mark for My Articles similar articles
Insurance & Technology
August 10, 2006
Maria Woehr
Compliance Automation Responding to growing pressure on insurers to comply with federal regulations such as Sarbanes-Oxley, the Gramm-Leach-Bliley Act, the Federal Information Act and HIPAA, ControlPath launched ControlPath Compliance Suite 3.0. mark for My Articles similar articles
Financial Advisor
September 2007
Joel Bruckenstein
File Trials Today's regulatory, legal and security environments demand a more robust document management solution and financial advisors who downplay these issues may find themselves doing so at their own risk. mark for My Articles similar articles
CIO
June 11, 2012
Lauren Brousell
5 Things CIOs Need to Know About Privacy Policy Technology and government policies and regulations are constantly in flux. Here are 5 tips to help CIOs stay in compliance and avoid getting into hot water with the FTC like MySpace did. mark for My Articles similar articles
Bank Systems & Technology
July 1, 2005
Martin J. Garvey
Storage Networks: One More Potential Weak Link Before regulatory compliance, nobody got jail time for lost or compromised data or paid millions of dollars in fines. Now, any company can be pulled into court and asked to produce evidence of security procedures or face penalties. So, are compliance regulations forcing companies to re-evaluate their storage-security practices? mark for My Articles similar articles
Bank Systems & Technology
February 18, 2009
Ashfield & Shroyer
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. mark for My Articles similar articles
Insurance & Technology
November 24, 2003
Anthony O'Donnell
Do Not Call Readiness Varies The insurance industry has accepted the inevitability of Do Not Call compliance, but many companies lag in implementing concrete measures. mark for My Articles similar articles
Financial Advisor
October 2004
Chaplin & Giachetti
Contingency Planning And Rule 206(4)-7 What must a financial advisor do to comply? mark for My Articles similar articles
Global Services
November 29, 2007
The Future of Regulation Whether offshore or onshore, the confluence of increased regulations and increased outsourcing will result in increasingly intense scrutiny by regulators of outsourcing relationships. mark for My Articles similar articles
InternetNews
April 6, 2004
Ryan Naraine
IBM Targets Regulatory Compliance To support enterprises who struggle to comply with the maze of government regulations for record-keeping, IBM Monday rolled out three new software products to help track and manage internal e-mails and instant messaging conversations. mark for My Articles similar articles
CIO
September 15, 2005
Scott Berinato
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking. mark for My Articles similar articles
Wall Street & Technology
August 22, 2005
Atul Seth
Mutual Fund Musts Seven key compliance imperatives that will have a major impact on the mutual fund industry over the next year and suggestions on how firms can meet the challenges posed by the requirements successfully. mark for My Articles similar articles
InternetNews
July 13, 2004
Erin Joyce
Resistance is Futile. Your E-mail is Being Watched. According to a new survey anyway. At least you know you're not paranoid. mark for My Articles similar articles
InternetNews
August 6, 2009
Survey: Businesses Lack Social Media Policies Companies are eager to use social media but too many are reluctant to police their use. mark for My Articles similar articles
InternetNews
May 3, 2005
Jim Wagner
Mercury Refreshes SOX Tools As the annual rash of compliance deadlines looms, Mercury Interactive updates its IT governance software. mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Prasad Balakrishnan
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. mark for My Articles similar articles
Insurance & Technology
September 14, 2004
Peggy Bresnick Kendler
Framework for Security Insurers need effective security infrastructures to withstand online threats from hackers and cyber criminals, as well as lapses by unaware internal users. mark for My Articles similar articles