Corporations today are thinking about how to protect assets. A few of the white collar crime problems include hacking/intrusions (cyber vulnerability), insider/outsider trading (convergence of cyber and financial crimes), the Foreign Corrupt Practices Act (FCPA), spear fishing (email compromise) and economic espionage. They must consider the possibility of internal corruption or external corruption, and environmental factors such as culture and competition contributing to these crimes. As protection, organizations can use cyber security, pen testing and data loss prevention tactics.Read More
This particular memo struck a chord with subscribers last week. Last week it held the #3 spot in our Weekly Top 5, which makes sense as public companies are “in the throes” of preparing for their fiscal year-ends, typically involving compliance with the Sarbanes-Oxley Act.Read More
Each month, we'll be giving our social media followers special access to download one of our most popular recently published tools.Read More
Each month, we'll be giving our social media and blog followers special access to download one of our most popular recently published tools.Read More
A well-designed transaction monitoring (TM) system is an important component of an effective anti-money laundering (AML) compliance program. It supports efforts to combat money laundering and terrorist financing by helping financial institutions identify unusual or suspicious activity that must be reported to regulatory authorities, and aids law enforcement in tracking and prosecuting criminals involved in money laundering and terrorist financing.