article thumbnail

FDIC’s New Banker Engagement Site (BES): Improving CRA & Compliance Exam Communication

Perficient

Already reviewed by Perficient, BES provides a secure and efficient portal to exchange documents, information, and communications for consumer compliance and Community Reinvestment Act (CRA) examinations. Bank executives and supporting third parties will be authenticated using a secure two-factor authentication process.

article thumbnail

SWIFT: Real-Time Payments Demands Real-Time Security And Compliance

PYMNTS

Security and compliance are also vital components in ensuring that payments are delivered safely and without delay. In her view, financial institutions are indeed coming together to share common compliance concerns, and in doing so, are working openly to create innovative solutions and put the pieces together.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco and Theta Lake: Compliance and Security Monitoring for Cisco Webex

Cisco

This week we welcome Marc Gilman , General Counsel and VP of Compliance at Theta Lake for a Q&A on a key topic for compliance, operational risk, and security leaders – ensuring that robust controls are in place for regulatory, cybersecurity, and privacy of collaboration platforms.

article thumbnail

How to choose the right payment processor for your business

Payments Dive

Choosing the right payment processor for your business, whether it be a retail shop, restaurant or service provider, is a critical decision that requires several major considerations, including security, PCI compliance, convenience and ease of use.

How To 390
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Bales, Esq.

article thumbnail

How to control sensitive data on unmanaged devices with MCAS

Perficient

In today’s blog, I’ll show you how you can block downloading of files with sensitive data to unmanaged devices with the use of session policies in Microsoft Cloud App Security (MCAS). Megan is working on a file that has several different Social Security Numbers of different employees at her organization.

Data 520
article thumbnail

AI fraud challenges: How to guard against losses

Abrigo

Here are several suggestions for tightening security. Takeaway 2 Improving security questions is a good step to take to avoid text-to-speech AI fraud schemes. Best practices Addressing AI fraud in your policies AI fraud can be particularly tricky because it impacts how financial institutions verify customers’ identities.

Fraud 150
article thumbnail

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association 

PCI compliance can feel challenging and sometimes the result feels like you are optimizing more for security and compliance than you are for business outcomes. The key is to take the right strategy to PCI compliance that gets you both. In this webinar you will learn: The right approach to a Zero Data security platform.