- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
Provided by Computer Services, Inc. (CSI)2021-02-02T08:54:00
CSI’s white paper, BSA/AML Compliance: A Growing Consensus for Change, explores the need to modernize BSA/AML compliance and provides insight on recent updates designed to combat financial crime, including new guidance on Section 314(b) of the USA PATRIOT Act.
Our white papers are prepared by our sponsors and are free to view.
You need to register for this site and agree to the sponsor’s conditions to be granted access.
2025-04-11T16:32:00Z By Adrianne Appel
Banks alerted authorities to $1.4 billion in suspicious transactions in 2024, a big assist in the nation’s fight against crime and fentanyl trafficking, according to the Financial Crimes Enforcement Network.
2025-04-11T08:00:00Z By Adrianne Appel
Block Inc., maker of the popular Cash App, has been hit with a $40 million fine by New York for its alleged failure to report suspicious activity. The move marks the latest in a string of recent state and federal enforcement actions against the company.
2025-04-02T18:50:00Z By Aaron Nicodemus
The Securities and Exchange Commission (SEC)’s pivot in favor of crypto took another step as the agency indicated it wants to resolve a long-standing lawsuit against the crypto exchange Gemini.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
2024-05-05T17:30:00Z Provided by ServiceNow and KPMG
To help investors gain a better understanding of cyber risk, the US Securities and Exchange Commission (SEC) has created sweeping new rules—forcing companies to take a more proactive approach to cybersecurity.
Site powered by Webvision Cloud