Offering highly secure, high-availability software solutions that meet the trading industry’s needs for intensive transaction processing, advanced analytics and modelling.
With recent reports of cybercriminals hitting the news headlines, this report exposes the architecture, business model, tools and methods used by cybercriminal organisations.
Against the backdrop of recent financial crises, and the need to pay close attention to the oversight of risk management and to risks like liquidity, reputation, governance and extreme scenarios (fat tails), operational risk managers have to step up to the mark. This white paper considers how.
This document looks at how to meet requirements for data security in a way that is fully manageable and transparent to users alongside the compliance requirements of the GSi Code of Connection (CoCo) for data security on removable devices.
Three industry experts spoke at an exclusive Operational Risk & Regulation webinar on operational risk and Solvency II and the challenges facing insurance firms today.
Ta Chong Bank Transforms Legacy Operations in Record Time, Positions Bank to Compete in Global Markets
Ta Chong Bank Transforms Legacy Operations in Record Time, Positions Bank to Compete in Global Markets.
Ultimately, for executing business strategy, dashboards and scorecards are complementary tools. Dashboards typically help you to understand and manage tactical operations while scorecards help you to understand and manage strategy.
The first steps to regulatory compliance usually come from the dept or business function most affected - the people ordered to comply. This can lead to a disjointed approach to compliance and managing risk. This white paper outlines the components of a GRC strategy and the role of data in it.
This white paper reviews the requirements of GLBA and FACTA (Security Guidelines), which impact a company's information infrastructure and the security means used therein.
One of the key new requirements of Basel II is that banks must manage and cover operational risks, including IT threats and employees. This white paper analyses the requirements of Basel II and its influence on a company's IT infrastructure.