What Every Banker Needs to Know About Dodd-Frank (in Less Than 40 Pages)
This Dodd-Frank Cheat Sheet is a synthesis of the legislation's most important provisions, highlighting the Act's key requirements, deliverables and IT implications. While the Cheat Sheet isn't a substitute for reading the entire legislation, the interactive tool will help you make sense of this historic piece of regulation -- in less than 40 pages.
April 2013- Read the Aite Group paper "Investigation Management for Fraud: Catch More Fraudsters More Efficiently" to learn effective strategies for combating financial fraud. It discusses new, real-world strategies, tactics and technologies that commercial entities and public sector organizations can use against this mounting threat.
February 2013- Law enforcement and domain registrars will continue to curb cybercrime efforts. This will likely be coordinated through CERT groups and relations with security firms. However, a more comprehensive, multi-layered approach to security will be key in bolstering that effort.
February 2013- Many Financial services organizations struggle with the competing demands of security and speed. What's more, the industry is facing a period of challenging and unpredictable economic circumstances, compounded by the likelihood of dramatic and on-going changes to the regulatory environment.
February 2013- IBM Intelligent Investigation Manager - comprising IBM Case Manager, IBM i2 Fraud Investigation Analysis and IBM Content Analytics - helps teams manage fraud investigations by capturing all relevant details of each case, supporting dynamic collaboration and incorporating forensic/link analysis.
February 2013- Financial institutions face an increasingly difficult challenge from persistent and virulent attacks. Drawing on limited resources, IT security teams have to protect networks that are growing in size and complexity. A new approach to network device and access management is helping IT security teams detect vulnerabilities, prioritize mitigation approaches and enable a safer deployment of configuration changes to network devices. Download this UBM Tech white paper to learn more.
Insurers lose millions each year through fraudulent claims. Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy and saving time and resources.
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts; build models based on previously audited claims and use them to identify potentially fraudulent future claims; ensure adjusters focus ...
September 2012- The purpose of this guide is to offer an overview of the process of preparing and implementing an eBanking security solution. At Gemalto, we believe that reliable and flexible eBanking security is not only a requirement for your customers, but a prerequisite for future business opportunities. Through our knowledge and experience, we have identified the key success factors in launching a successful eBank and have created a step-by-step guide toward a more reliable and strategic ...
August 2012- Leading companies applying "predictive intelligence" to proactively mitigate and manage complexity-fraught risks, while bringing value to their bottom line and their brand.
August 2012- In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization. You will learn how techniques including cluster analysis, anomly detection, time series analysis, social network analysis, predictive models and scoring can be used to detect suspicious activity in real-time so your orgnization can take action to minimize risk and increase positive outcomes. As a final step, you will learn how automating model ...
July 2012- Smart decision making based on the most current data is essential as banks seek to better manage credit risk and drive growth. Here are four ways to manage the explosion of data and make faster decisions.
One of the most insidious criminal attacks on banking in recent times has been the proliferation of malware targeted at online banking. This custom malware enables activity such as authentication fraud by the theft of mTANs or SMS messages, or "man in the browser" / "man in the middle" attacks to steal credentials.
Now a new frontier has opened in online banking - consumers and businesses using smart phone-based applications to manage their finances. ...
March 2012- OpenPages 6 empowers managers with the ability to reduce loss and improve performance through deep insight into enterprise-wide governance, risk, and compliance initiatives.
March 2012- Insurance companies are beginning to recognize the potential value in deploying a robust operational risk management framework and integrating it into their ERM efforts.
March 2012- This whitepaper discusses how ERM, when embedded into everyday processes at all levels of the organization, can drive business performance.
March 2012- Automating operational risk practices is essential for insurance companies to gain a holistic view of risk and embed ORM into the corporate culture.
March 2012- This report from Chartis Research reveals the RiskTech100 rankings with IBM at the top. It also provides a detailed review of the IBM risk offerings from OpenPages and Algorithmics.
March 2012- Carnival Corporation & plc enhances process-based risk assessment system with the IBM OpenPages GRC Platform.
March 2012- Learn how the IBM solution for Solvency II introduces a proven framework for risk management - including defining required capital levels and implementing procedures to identify, measure and manage risk levels.
March 2012- This whitepaper discusses ORM in the context of Sound Practices for the Management and Supervision of Operational Risk, a paper from the Basel Committee.
Banks must meet more (and more varied) regulations today than ever. The sheer scale and scope of banking regulations, including Dodd-Frank, Basel III and IFRS, pose challenges to all financial institutions, from the smallest bank to the largest financial services enterprise.
While the greater transparency required by these regulations can seem like a burden, savvy firms are beginning to realize that the same information can help them run their businesses better - enabling ...
February 2012- This document is intended to provide a foundation for related conversation and agreement between Business Managers, Chief Risk Officers and Heads of Operational Risk so that a structured, pragmatic operational risk strategy can be put in place or optimized if already existing.
The settlement systems of central securities depositories (CSDs) have a tremendous impact on the liquidity and efficiency of securities transactions.
Read this case study to learn how INDEVAL, Mexico's CSD, used optimization software to raise liquidity levels, lower capitol requirements and help provide stability to Mexico's financial system.
It seems that survival and recovery should be the focus of companies in the financial sector. However, improving operational efficiency and building customer relationships offer competitive advantages.
Read this white paper to learn how optimization technologies enable rapid deployment of applications that address these important differentiators.
Like any business, midsize banks face an increasing number of security challenges, as well as strong competition. This paper examines how an integrated, holistic approach to security can also encourage business growth and innovation.
By reading this paper, you?ll also learn about the various security solutions offered by IBM and its business partners.
News headlines about the increasing frequency of unauthorized access to sensitive data and identity theft have focused awareness on data security and privacy breaches - and their consequences.
In response to this issue, regulations (SOX, HIPAA, PCI-DSS, FISMA, EU Data Privacy Directive) along with the rising number of regulatory mandates have increased the pressure to show immediate compliance, otherwise failure to ensure compliance can result in significant financial penalties and even jail time. ...
View All Categories
INSURANCE: Architecture/Infrastructure, Claims, Customer Insight/Business Intelligence, Distribution, Management Strategies, Policy Administration & Management, Regulation/Financial Systems, Security/Risk Management
ADVANCED TRADING: ATS/ECN/Dark Pool, Algorithmic Trading, Block Trading, Cross Asset Trading, Data Latency, Derivatives, Market Data, OMS/EMS, Trading Infrastructure/Technology, Trading Regulations/Compliance, Trading/Exchanges, Transaction Cost Analysis (TCA)
Featured Banking Resources
What Every Banker Needs to Know About Dodd-Frank (in Less Than 40 Pages)