Operational Risk
478 white papers and resources
Below you will find a collection of operational risk white papers by industry leading experts. This information resource looks at key industry issues and practices, which can be used to aid in the decision-making process and help maintain a competitive advantage. Operational risk is the type risk that a company is exposed to from the execution of business functions. It is a wide concept that has rapidly evolved over the years. It includes risk that arises from the break downs of internal procedures, systems and people, plus external events. Fraud risks, legal risks, physical risk and environmental risks also are encompassed in operational risk.
Will your business practices come back to haunt you? Use technology to mitigate your chances of conduct risk
Conduct risk is not something that can be identified by applying a simple boilerplate. Each financial services business will have its own culture, customer base, product portfolio and marketing strategy, so the risks will to some extent be bespoke to the business and they may also be deep-rooted.
Datafeeds Special Report - The need for feeds more than just speed
Barely a decade ago, traders begun eschewing traditional consolidated data feeds in favour of direct feeds from exchanges, in their pursuit of lower latency. The markets were becoming faster, and everyone had to keep pace if they wanted to remain competitive.
Equity Market Pulse, Issue 4 - Q2 2015
This white paper - driven by proprietary data and analytics - provides insights into the global equity market fundamentals and performance. Spanning developed and emerging markets in the Americas, Europe, and Asia, it provides perspective on fundamentals, valuations and investment strategy…
Internal Audit Management: Internal audit and its evolving role in GRC
This white paper looks at the evolution of audit, independent assurance versus integrated partnership, as well as, the change from “Docu-centric” to “data-centric”. It goes onto provide insight into audit and risk mitigation synergy.
Free webinar: Optimise IT governance with a sustainable risk and compliance approach: aligning IT with corporate initiatives, strategy and regulatory requirements
Free webinar: Optimise IT governance with a sustainable risk and compliance approach: aligning IT with corporate initiatives, strategy and regulatory requirements. 9th of July, 3pm BST/10 am ET.
Battling fraud at the root cause: How cybercriminals bypass your security defenses and what you can do about it
This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle — pre- login, during login and post-login — and offers strategies to help financial organizations combat malware-driven attacks.
Creating Effective Risk Models Using Machine Intelligence
This white paper looks into the current approaches to risk model development, validation, and monitoring. It goes further by discussing the challenges business face within these areas and examines how machine intelligence can provide solutions.
Selecting the right cybercrime-prevention solution
Financial institutions, commercial enterprises and government organisations are all prime targets for cyber-crime. Malicious software, or malware, is the primary attack tool used by cyber criminals to execute account takeover attacks, stealcredentials and personal information, and initiate…
Next generation criminal fraud detection: Identifying account takeover and fraudulent transactions to help stop cybercriminals
In today’s ever changing fraud landscape, much of the currently used statistical-based fraud detection methodology is creating significant challenges for both organizations and end users. These statistical models generate high false positive rates and provide a risk score that does not effectively…
Hedge Funds: Facing new challenges
The global financial markets are on the threshold of a new regulatory era. Technology will undoubtedly underpin hedge funds’ efforts to comply and compete in this changing environment. But is it better to build tailor-made systems in-house or use a third-party provider of off-the-shelf products?