SlideShare a Scribd company logo
1 of 20
The new Regulatory ParadigmHow to respond to Dodd-Frank while containing costs
Agenda What’s the net effect of Dodd - Frank Current Challenges  & How to Respond Recent Case Studies Employee Surveillance  A New Comprehensive Approach Relationships Are the Key What You Can Do How Does It Work Live Demo Panel Speakers: Alan Morley Compliance,  RBS Global Banking & Markets Chris Ekonomidis Director, Business Consulting, Sapient Eddie Cogan CEO and Founder,  Catelas, Inc. Regulatory Fines increase every year – Clearly there is something missing in our Compliance and Risk processes and technology.
Net effect – significant increase in complexity
Net effect – more rules  - 421 !!
Net effect – increased enforcement, number of inquiries & more surveillance rules SEC Chairman Mary Shapiro recently spoke ofthe "enormous burden" as the SEC shifts resources to create a new regulatory regime for hedge funds - 105 new rules, 20 studies and five offices. Shapiro’s “burden” will translate to increased enforcement/inquiries and additional surveillance rules for everyone involved in the Hedge Fundand Asset Management industries.  “The SEC is going to cast a much broader net to include people on the edge of a fraud,” said Steve Crimmins, a former trial attorney at the agency who’s now at law firm K&L Gates LLP in Washington. “There will be legions more SEC cops on the beat and that will mean a lot more activity.”  Under Dodd-Frank, which was signed into law in July, the SEC can sue an individual who “recklessly” aids a fraud even if the person isn’t aware of the wrongdoing.  The provisions “increase the likelihood of litigation” with fewer quietly settled cases, said David Kornblau, who was the SEC’s top prosecutor from 2000 to 2005
Current Challenges & How to Respond  No more “smoking gun” Keyword search monitoring – too many false positives  Random sampling – limited value from a risk perspective Costs are high, process is manual and impact generally accepted as being unreliable with very few ‘successes’ Transcripts showed Ms. Chiesi talking with Mr. Kurland, quoting him as telling her in August 2008: "Don't put anything in email.... Don't email even Raj." It is no longer enough to “satisfy” compliance requirements.  It is far more important to Identify Risk and to Proactively avoid adverse events
3 players – only one within each firm Coded emails – not detected by keyword surveillance Strong Relationships are the indicator of collaboration – good or bad “[SEC ] charged a Wall Street investment banker, another securities professional, and one of their friends in a clandestine insider trading ring that netted approximately $1 million in illicit profits by trading ahead of at least 11 mergers, acquisitions, and other corporate deals.” “coded e-mail messagesthat referred to securities and money as ‘frequent flyer miles’ and ‘potatoes.’ “  “…Poteroba, Koval, and Vorobiev are each Russian citizens who attended college [together] in the 1990s at the University of New Haven in Connecticut. “ Recent Cases – Insider Trading
UBS Accuses Three Quant Traders Of Stealing Its Code “UBS has filed a lawsuit against three former quant employees alleging that they stole proprietary trading software with the intent of using it at their new employer, Jefferies & Company.“ The three were also accused of starting their new jobs at Jefferies & Co while still employed at UBS.  A FINRA arbitration panel denied the injunction because they claimed that they always sent code to their personal email addresses and there was never a problem before. Compliance and Risk efforts were inadequate because they did not detect the data breach for years. Recent Cases – Employee Theft
FINRA Fines MetLife $1.2 Million “[FINRA} fined MetLife Securities, Inc., and three of its affiliates a total of $1.2 million for failing to establish an adequate supervisory system for the review of brokers' email correspondence with the public. …the firms relied on the brokers themselves to forward their emails to supervisors for review…But brokers were able to delete their emails from their assigned computers, thus rendering spot-checks unreliable.“ Certain employees exploited gaps in the compliance implementation and circumvented controls designed to allow MetLife to comply with securities laws. Recent Cases – Email Supervision
Employee Turnover ,[object Object]
Monitor activity and behavior of departing employees
Monitor activity and behavior of new employeesEarly detection = containment! Information Theft ,[object Object]
Monitor email behavior to external parties (webmail, press, competitors)Employee Surveillance FCPA (Foreign Corrupt Practices Act) ,[object Object]
Physical interviews and searches are often the most powerful tool , but it must be coordinated and timed to avoid alarming those involved
Companies must proactively identify risky relationships and monitor them closely,[object Object]
Drive physical investigation – Who to interview?  What is the nature of your relationship with X?  Who is else may have relevant information?
Identify relationship, regardless of language or use of codeInformation Barrier ,[object Object]
Include connections outside the firm
Identify information flow
Rank connections based on strengthBenefits ,[object Object]

More Related Content

What's hot

Reining in outsourcing risk
Reining in outsourcing riskReining in outsourcing risk
Reining in outsourcing risk
Tang Tan Dung
 
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...
ARMA International
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
Michael Solomon
 

What's hot (20)

[AIIM18] E-Signatures: the good, the bad -- and the law - Patrick Hatfield
[AIIM18]  E-Signatures: the good, the bad -- and the law - Patrick Hatfield[AIIM18]  E-Signatures: the good, the bad -- and the law - Patrick Hatfield
[AIIM18] E-Signatures: the good, the bad -- and the law - Patrick Hatfield
 
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
Cybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm Data
 
Reining in outsourcing risk
Reining in outsourcing riskReining in outsourcing risk
Reining in outsourcing risk
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
Vc us v4.0
Vc us v4.0Vc us v4.0
Vc us v4.0
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNix
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...
 
Instilling a Culture of Compliance and Knowing Your Customer
Instilling a Culture of Compliance and Knowing Your CustomerInstilling a Culture of Compliance and Knowing Your Customer
Instilling a Culture of Compliance and Knowing Your Customer
 
The Future of Auditing and Fraud Detection
The Future of Auditing and Fraud Detection The Future of Auditing and Fraud Detection
The Future of Auditing and Fraud Detection
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
Research Note RSA 2019
Research Note   RSA 2019Research Note   RSA 2019
Research Note RSA 2019
 

Similar to Sapient Catelas The New Regulatory Paradigm

Accounting fraud at Worldcom
Accounting fraud at WorldcomAccounting fraud at Worldcom
Accounting fraud at Worldcom
jonah1137
 
Session 309 - Allocating Risk for Your Company - Playing the Feud (cjp 10.26)
Session 309 - Allocating Risk for Your Company - Playing the Feud (cjp 10.26)Session 309 - Allocating Risk for Your Company - Playing the Feud (cjp 10.26)
Session 309 - Allocating Risk for Your Company - Playing the Feud (cjp 10.26)
Carl Peterson
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
grudoy
 

Similar to Sapient Catelas The New Regulatory Paradigm (20)

Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 
EDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records ManagementEDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records Management
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Anti-Bribery and Corruption Compliance for Third Parties
Anti-Bribery and Corruption Compliance for Third PartiesAnti-Bribery and Corruption Compliance for Third Parties
Anti-Bribery and Corruption Compliance for Third Parties
 
Key Issues In Workplace Privacy
Key Issues In Workplace PrivacyKey Issues In Workplace Privacy
Key Issues In Workplace Privacy
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Accounting fraud at Worldcom
Accounting fraud at WorldcomAccounting fraud at Worldcom
Accounting fraud at Worldcom
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
 
Corruption Risks Update 2009
Corruption Risks Update 2009Corruption Risks Update 2009
Corruption Risks Update 2009
 
Theres No Crying In Baseball...Or In E Discovery 04.30.10
Theres No Crying In Baseball...Or In E Discovery 04.30.10Theres No Crying In Baseball...Or In E Discovery 04.30.10
Theres No Crying In Baseball...Or In E Discovery 04.30.10
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
Session 309 - Allocating Risk for Your Company - Playing the Feud (cjp 10.26)
Session 309 - Allocating Risk for Your Company - Playing the Feud (cjp 10.26)Session 309 - Allocating Risk for Your Company - Playing the Feud (cjp 10.26)
Session 309 - Allocating Risk for Your Company - Playing the Feud (cjp 10.26)
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
The Missing Approach for Threat Detection
The Missing Approach for Threat DetectionThe Missing Approach for Threat Detection
The Missing Approach for Threat Detection
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 

Sapient Catelas The New Regulatory Paradigm

  • 1. The new Regulatory ParadigmHow to respond to Dodd-Frank while containing costs
  • 2. Agenda What’s the net effect of Dodd - Frank Current Challenges & How to Respond Recent Case Studies Employee Surveillance A New Comprehensive Approach Relationships Are the Key What You Can Do How Does It Work Live Demo Panel Speakers: Alan Morley Compliance, RBS Global Banking & Markets Chris Ekonomidis Director, Business Consulting, Sapient Eddie Cogan CEO and Founder, Catelas, Inc. Regulatory Fines increase every year – Clearly there is something missing in our Compliance and Risk processes and technology.
  • 3. Net effect – significant increase in complexity
  • 4. Net effect – more rules - 421 !!
  • 5. Net effect – increased enforcement, number of inquiries & more surveillance rules SEC Chairman Mary Shapiro recently spoke ofthe "enormous burden" as the SEC shifts resources to create a new regulatory regime for hedge funds - 105 new rules, 20 studies and five offices. Shapiro’s “burden” will translate to increased enforcement/inquiries and additional surveillance rules for everyone involved in the Hedge Fundand Asset Management industries. “The SEC is going to cast a much broader net to include people on the edge of a fraud,” said Steve Crimmins, a former trial attorney at the agency who’s now at law firm K&L Gates LLP in Washington. “There will be legions more SEC cops on the beat and that will mean a lot more activity.” Under Dodd-Frank, which was signed into law in July, the SEC can sue an individual who “recklessly” aids a fraud even if the person isn’t aware of the wrongdoing. The provisions “increase the likelihood of litigation” with fewer quietly settled cases, said David Kornblau, who was the SEC’s top prosecutor from 2000 to 2005
  • 6. Current Challenges & How to Respond No more “smoking gun” Keyword search monitoring – too many false positives Random sampling – limited value from a risk perspective Costs are high, process is manual and impact generally accepted as being unreliable with very few ‘successes’ Transcripts showed Ms. Chiesi talking with Mr. Kurland, quoting him as telling her in August 2008: "Don't put anything in email.... Don't email even Raj." It is no longer enough to “satisfy” compliance requirements. It is far more important to Identify Risk and to Proactively avoid adverse events
  • 7. 3 players – only one within each firm Coded emails – not detected by keyword surveillance Strong Relationships are the indicator of collaboration – good or bad “[SEC ] charged a Wall Street investment banker, another securities professional, and one of their friends in a clandestine insider trading ring that netted approximately $1 million in illicit profits by trading ahead of at least 11 mergers, acquisitions, and other corporate deals.” “coded e-mail messagesthat referred to securities and money as ‘frequent flyer miles’ and ‘potatoes.’ “ “…Poteroba, Koval, and Vorobiev are each Russian citizens who attended college [together] in the 1990s at the University of New Haven in Connecticut. “ Recent Cases – Insider Trading
  • 8. UBS Accuses Three Quant Traders Of Stealing Its Code “UBS has filed a lawsuit against three former quant employees alleging that they stole proprietary trading software with the intent of using it at their new employer, Jefferies & Company.“ The three were also accused of starting their new jobs at Jefferies & Co while still employed at UBS. A FINRA arbitration panel denied the injunction because they claimed that they always sent code to their personal email addresses and there was never a problem before. Compliance and Risk efforts were inadequate because they did not detect the data breach for years. Recent Cases – Employee Theft
  • 9. FINRA Fines MetLife $1.2 Million “[FINRA} fined MetLife Securities, Inc., and three of its affiliates a total of $1.2 million for failing to establish an adequate supervisory system for the review of brokers' email correspondence with the public. …the firms relied on the brokers themselves to forward their emails to supervisors for review…But brokers were able to delete their emails from their assigned computers, thus rendering spot-checks unreliable.“ Certain employees exploited gaps in the compliance implementation and circumvented controls designed to allow MetLife to comply with securities laws. Recent Cases – Email Supervision
  • 10.
  • 11. Monitor activity and behavior of departing employees
  • 12.
  • 13.
  • 14. Physical interviews and searches are often the most powerful tool , but it must be coordinated and timed to avoid alarming those involved
  • 15.
  • 16. Drive physical investigation – Who to interview? What is the nature of your relationship with X? Who is else may have relevant information?
  • 17.
  • 20.
  • 22. Save time and reduce costEmployee Surveillance
  • 23.
  • 24. Uncover who is talking to whom about which topics
  • 25.
  • 28.
  • 31. Employee Surveillance & Compliance: FCPA, AML, PII
  • 32. Other (not listed here)Audience Poll ?
  • 33.
  • 34. Allows surveillance of entire email network with same manpower as sampling
  • 35.
  • 41. Trading softwareWho knows who? What are they saying? Relationships are the Key
  • 42.
  • 43. Proactive, always-on, comprehensive monitoring and audit solution
  • 44. View entire corporate communications network through log file analysis,not just a sample
  • 45. WITHOUT cost & time of data collection
  • 46. Watch Lists, Restricted Lists, Deal Rooms – native email analysis
  • 47. Who spoke to whom; about what and when
  • 48. identify if people are talking about issues other than the participants
  • 49. Easy to use, deploy and support
  • 51. Don’t integrate to exchange or Archive
  • 53. Quick time to valueWhat You Can Do
  • 54.
  • 55. Social Network Analysis identifies missing custodians & uncovers ‘friends in common’
  • 56. Log file analysis allows ENTIRE company network to be uncovered
  • 57. Advanced Data Analytics uncover IP theft & information flow across barriers
  • 58. Highly scalable & comprehensive
  • 59. Easy to use, deploy & maintain
  • 60. Low cost of ownershipIM Email Telephony Log files How We Do It
  • 61.
  • 62. No increase in resource:
  • 63. Same resource, same time – completely audit of information barriers, watch lists etc
  • 64. Networks of interest AUTOMATICALLY created weekly, monthly
  • 65. Investigate Suspicious Activity Reports instantly without IT support – Always-On solution
  • 69.
  • 71. Cut collection costs by over 80%
  • 72. Cut travel costs as preliminary investigations conducted centrally
  • 74. Thank You Eddie Cogan 617 407 2967 Eddie.cogan@catelas.com www.catelas.com Thank You & Stay Tuned for Future Webinars! Alan Morley (201) 923-7214 Alan.Morley@rbs.com RBS Global Banking & Markets Chris Ekonomidis 646 207 0788 cekonomidis@sapient.com www.sapientglobalmarkets.com

Editor's Notes

  1. UBS loses trade secrets theft caseFeb 22 2010The US Financial Industry Regulatory Authority (FINRA) has ruled against UBS in its allegations that three of its former employees stole an algorithmic trading code used by the bank.The arbitration case found in favour of the three employees – JatinSuryawanshi, ParthaSarkar, and Sanjay Girdhar. According to the UBS complaint, they were accused of misappropriating trade secrets, breach of contract, breach of fiduciary duty, unfair competition and “other wrongdoing” while they were employed by UBS Securities.They were accused of obtaining proprietary company information – in this case the source code for UBS’s algorithmic trading programmes. They were then planning to give the source code to their new employees at investment bank Jefferies & Co, according to the report which appeared in Securities Industry News.Reports said that Sarkar had allegedly copied 25,000 lines of computer source code from UBS computers. This was roughly equal to the length of one algorithm, or parts of several. He then allegedly emailed this code to this personal email account. Suryawanshi was also accused of attempting to hide his colleague’s theft by deleting the records from a UBS computer.The three were also accused of starting their new jobs at Jefferies & Co while still employed at UBS. Suryawanshi was accused of a breach of fiduciary duties by poaching the other two programmers to work for other investment bank. The three former UBS employees had denied the charges.Citing an unnamed source, the report said that the ruling ends the dispute, with neither party seeking further action. All requests for injunctions or damages were rejected, and the arbitration fees will be split between UBS and the three former employees.Of the three member arbitration panel, one member dissented the final decision but no further explanation was given, the report said.“We are absolutely delighted to have this put behind them so that they, and Jefferies, can go forward,” said lawyer Lance Gotko, who represented the former UBS programmers.FINRA said it does not comment on the results of its arbitration cases. UBS has also declined to comment.
  2. Info Security and Litigation investigations for too long have been focusing on the wrong thing…. DATA rather than PEOPLE. The Catelas solution is turning investigations back to old fashioned police work. Rather than searching for the smoking gun, Catelas first dusts for finger prints to identify people potentially connected to the crime and at the scene of the crime at the time of the crime. Rather than focussing on data and content first, Catelas concentrates on people and relationships first, communications activity second and data third.In so doing we are cutting the time it takes to investigate cases by 40-90% - staggering, unheard of savings … by focusing on the RIGHT PEOPLE and the EXACT communication exchanges.