What is the impact of a failed risk management program as a result of actions committed by a vendor or service provider? Your financial institution may be exposed to reputational damage and financial losses running into billions of dollars.
During this webinar, our financial crime and risk management experts discussed current financial crime trends, steps to identifying vendor risks, the need for Know Your Vendor (KYV) and due diligence, and creating a cross-functional risk-based approach to vendor governance.
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
Organizations lose an estimated five percent of annual revenues to fraud, totaling nearly $1 trillion in the U.S. alone. Cyber criminals are more organized and better equipped than ever, and continue to evolve their strategies in order to undermine even the strongest protections.
We continue to hear about major security breaches across all industries, but what is being done to fix the problem? There must be a tight interlock between risk, security, fraud and financial crimes management. Current solutions are proving inadequate as point solutions and a corporate silo mentality directly contribute to the risk of fraudulent activities going undetected.
Our webinar covered:
-How IBM’s Smarter Counter Fraud initiative can help public and private organizations prevent, identify and investigate fraudulent activities
-Real-world use cases including how one financial institution stopped $1M in fraud in the first week after implementing a counter-fraud solution
-Perficient’s multi-tiered approach to help guide successful business outcomes
It’s time to stop the bad guys with IBM Smarter Counter Fraud and Perficient – learn how now!
Improve Efficiency, Compliance and Productivity Through Finance Transformatio...Perficient, Inc.
The role of corporate finance in financial services firms has expanded as the demands for balancing growth, regulatory compliance and risk management increase. Firms must be able to improve visibility, insight and control over financial performance, and this can be done through technology-enabled transformation.
In this webinar, our expert discussed the strategic vision and components of finance transformation that will help your enterprise to identify gains in operational efficiency, improve forecasting and reporting, reduce risk, and optimize the strategic functions of the finance organization.
We covered:
-Demand and drivers for finance change
-Key components of the finance operating model
-Prioritization of value creation opportunities
-Approach for improving financial reporting processes
-Solution architecture to deliver meaningful insights to the business
10 Steps for Taking Control of Your Organization's Digital Debris Perficient, Inc.
Do you have too much old information, but not enough guidance to begin the task of cleaning out your data stores? Join Perficient to learn 10 tips for creating a strategic roadmap to take control of your information and uncover the technology that can support your efforts, including how to:
Stop keeping everything forever
Create an information governance and disposal policy before implementing technology
Automate information management to improve employee productivity
Prepare a discovery response plan
Although Big Data is changing enterprise data architecture models, support for Big Data extends beyond the walls of IT. The most successful companies are focused on building strong business cases for Big Data to drive support, adoption and funding though the enterprise.
This webinar investigated the two perspectives in constructing a business case for Big Data as well as how to create a compelling business case for Big Data success.
During this webinar, we covered:
-Challenges Creating Business Cases for Big Data
-Two perspectives for building Big Data business-cases
-Building the business-focused case and getting to monetized benefits
-Fortifying your business case with IT-benefits
Targeted Analytics: Using Core Measures to Jump-Start Enterprise AnalyticsPerficient, Inc.
How top healthcare organizations are realizing the benefits of data analytics in such core areas as core measures, clinical alerting, surgical analytics, service line profitability, diabetes management, revenue cycle management, claims management and utilization.
How to Leverage Increased Data Granularity in the ICD-10 Code SetPerficient, Inc.
A webinar designed for healthcare professionals. We explore how to leverage the increased data granularity in the ICD-10 code set. While there are risks, a properly executed ICD-10 implementation will deliver plentiful rewards.
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
Organizations lose an estimated five percent of annual revenues to fraud, totaling nearly $1 trillion in the U.S. alone. Cyber criminals are more organized and better equipped than ever, and continue to evolve their strategies in order to undermine even the strongest protections.
We continue to hear about major security breaches across all industries, but what is being done to fix the problem? There must be a tight interlock between risk, security, fraud and financial crimes management. Current solutions are proving inadequate as point solutions and a corporate silo mentality directly contribute to the risk of fraudulent activities going undetected.
Our webinar covered:
-How IBM’s Smarter Counter Fraud initiative can help public and private organizations prevent, identify and investigate fraudulent activities
-Real-world use cases including how one financial institution stopped $1M in fraud in the first week after implementing a counter-fraud solution
-Perficient’s multi-tiered approach to help guide successful business outcomes
It’s time to stop the bad guys with IBM Smarter Counter Fraud and Perficient – learn how now!
Improve Efficiency, Compliance and Productivity Through Finance Transformatio...Perficient, Inc.
The role of corporate finance in financial services firms has expanded as the demands for balancing growth, regulatory compliance and risk management increase. Firms must be able to improve visibility, insight and control over financial performance, and this can be done through technology-enabled transformation.
In this webinar, our expert discussed the strategic vision and components of finance transformation that will help your enterprise to identify gains in operational efficiency, improve forecasting and reporting, reduce risk, and optimize the strategic functions of the finance organization.
We covered:
-Demand and drivers for finance change
-Key components of the finance operating model
-Prioritization of value creation opportunities
-Approach for improving financial reporting processes
-Solution architecture to deliver meaningful insights to the business
10 Steps for Taking Control of Your Organization's Digital Debris Perficient, Inc.
Do you have too much old information, but not enough guidance to begin the task of cleaning out your data stores? Join Perficient to learn 10 tips for creating a strategic roadmap to take control of your information and uncover the technology that can support your efforts, including how to:
Stop keeping everything forever
Create an information governance and disposal policy before implementing technology
Automate information management to improve employee productivity
Prepare a discovery response plan
Although Big Data is changing enterprise data architecture models, support for Big Data extends beyond the walls of IT. The most successful companies are focused on building strong business cases for Big Data to drive support, adoption and funding though the enterprise.
This webinar investigated the two perspectives in constructing a business case for Big Data as well as how to create a compelling business case for Big Data success.
During this webinar, we covered:
-Challenges Creating Business Cases for Big Data
-Two perspectives for building Big Data business-cases
-Building the business-focused case and getting to monetized benefits
-Fortifying your business case with IT-benefits
Targeted Analytics: Using Core Measures to Jump-Start Enterprise AnalyticsPerficient, Inc.
How top healthcare organizations are realizing the benefits of data analytics in such core areas as core measures, clinical alerting, surgical analytics, service line profitability, diabetes management, revenue cycle management, claims management and utilization.
How to Leverage Increased Data Granularity in the ICD-10 Code SetPerficient, Inc.
A webinar designed for healthcare professionals. We explore how to leverage the increased data granularity in the ICD-10 code set. While there are risks, a properly executed ICD-10 implementation will deliver plentiful rewards.
Transforming Healthcare through Patient Engagement with Oracle SolutionsPerficient, Inc.
This demo will provide examples that leverage Oracle WebCenter Suite, Oracle Business Intelligence Enterprise Edition, and Oracle Health Information Exchange along with collaborative and mobile technologies to provide a unique view into an “e-Patient” experience. We will discuss patient use of the internet, social media and hand held devices to enhance their health and their demands for electronic medical record access, doctor competency scores, hospital infection rates, and more.
In this session we will explore how to:
Provide instant access to patient and clinical information with Healthcare Portals
Enable instantaneous access to patient and clinical information using Mobile Health applications
Transmit medical images, video and audio for Telehealth diagnosis and treatment plans
Allow patients to exchange pertinent information and discuss health conditions with healthcare providers using Social Media
Gain Faster Closure, Lower Risk and Better Results with IBM EmptorisPerficient, Inc.
Procurement organizations are often challenged with lack of spend visibility, little-to-no automation around sourcing processes, difficulties in on-boarding, registering and measuring performance, and more. These organizations need to not only show value to the enterprise by reducing costs, but also provide value-added services to the business.
Sarah Radka, senior business consultant in Perficient’s IBM industry solutions practice, demonstrates how a leading international producer and marketer of beer, wine and spirits improved efficiency in the contract process by implementing a full IBM Emptoris solution.
During this webinar, our solution experts covered the keys to addressing critical contracting and supplier issues such as:
Streamlining procurement operations and removing bottlenecks
Providing and increasing overall spend visibility for an entire organization
Rationalizing and consolidating all templates into a standardized subset
Improving performance, attaining cost savings, mitigating risks and more
With a focus on providing high-quality, lower-cost care, the healthcare industry has been looking to the retail industry for strategies used to engage and empower consumers. Lessons learned include how to use the retail setting as a medium for providing care and how to engage consumers outside of the care setting by using technology.
What is often neglected when assessing retail industry tactics is their core competency of using data insights to motivate and incentivize changes in consumer behavior. Connected Health solutions provide streams of valuable information that can be mined and analyzed to achieve business objectives.
Perficient's healthcare and retail experts demonstrated how data can be leveraged to:
-Transform passive recipients of care into active participants in care
-Mass customize messaging aligned with population health initiatives
-Achieve outreach objectives that convert unknown consumers into patients/members
-Improve care and lower healthcare costs
#IBMInsight session presentation "Mitigate Risk, Combat Fraud and Financial Crimes"
The Issue of fraud, challenges, fighting fraud as an enterprise endeavor, IBM Smarter counter fraud framework and IBM Counter Fraud business services
More at ibm.biz/BdEPRH
Advanced Analytics for Asset Management with IBMPerficient, Inc.
Extreme volumes of machine data, such as process control logs, asset inspection records and part quality data are created each day. Companies must analyze patterns and interactions within this data to create a total view of their operational processes.
In this webinar, our experts discussed how IBM is enabling companies to proactively address maintenance and asset management challenges with advanced analytics solutions:
-Determine root causes of failure based on usage and wear characteristics
-Analyze component and environmental data to reduce time to identify quality issues
-Identify conditions to optimize maintenance and inventory management
-Monitor, maintain and optimize assets for better supply chain availability
Our webinar covered an introduction to predictive maintenance, analytics use cases for asset management, and IBM Maximo integration with analytics solutions.
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...Perficient, Inc.
This slideshare discusses the cost crisis in healthcare, challenges healthcare organizations are facing, and how to:
Uncover true patient costs and value based purchasing
Understand quality and cost outcomes by aligning clinical and financial data
Identify trends and opportunities, and create actionable steps to improve business
Accelerate data integration with Perficient's High-Performance Costing Expressway
Leverage actionable visuals via dashboards with Oracle Business Intelligence tools
Evaluate patient complications, outcomes and detailed costs with Oracle’s Enterprise Healthcare Analytics Data Model
Console Power Productive Agents and Happy CustomersPerficient, Inc.
Take a deep dive into the core principles of building a great customer service agent experience with the Salesforce Console. During the webinar, our experts outlined the net impact of productivity metrics and customer satisfaction when the Salesforce Console is properly aligned with your company’s objectives.
We will also cover several key features, benefits and best practices for improving results with the new Agent Console:
-Easily spot important fields on records
-Limit switching between pages
-Quickly jot notes, actions and log interactions for each interaction
-Chat with customers in real time by integrating with Live Agent (Service Cloud only)
The session was packed with practical tips and insights from our real-world implementation experience.
Designing Enhanced Supervision for the Evolving Wealth Management Ecosystemaccenture
Converging and rapidly evolving industry trends are creating a new wealth management environment demanding Wealth Managers redefine supervisory governance to best support the firm’s growth strategies while balancing strong risk management. In this new Accenture Finance & Risk presentation we explore the evolving wealth management trends and challenges and outline four key business supervision design questions to support sustainable, long-term growth.
Peter Rasmussen, MD, Medical Director for Distance Health at Cleveland Clinic and Paddy Padmanabhan, CEO Damo Consulting Inc. shared 'Digitally Transforming Patient and Caregiver Experiences' at HIMSS 2019 on Feb 15th at Session 309. The session described the key elements of an enterprise digital transformation strategy, Illustrated success in digital transformation with the Distance Health program (Cleveland Clinic’s Telehealth Program), and discussed the key learnings from the ongoing digital transformation at the Cleveland Clinic
Protect Your Revenue Streams: Big Data & Analytics in TaxCapgemini
The game has changed since the onset of the financial crisis. Governments aiming to reduce budget deficits can only deliver so much through spending cuts. It is now even more vital that tax agencies ensure individuals and businesses pay the tax they owe, and that welfare fraud and error are minimised. Pretty will explain how he helps tax and welfare agencies tackle noncompliance, evasion and error. He will share client stories where billions of euros were saved, generating a return of at least 25 times the original investment.
By Ian Pretty,
Vice President, Global Tax & Welfare Leader
How Finance is driving growth in the Digital Age via OpenTextOpenText
In the digital age, finance business processes are shifting from batch to real-time, retrospective to predictive, and internally-focused to customer-centric. Innovative companies can drive growth by focusing on the revenue stream from an outside-in perspective. Learn more from OpenText at http://www.opentext.com/campaigns/rundigital/digitize-business/sap-finance/sap-finance-wod
Riding and Capitalizing the Next Wave of Information TechnologyGoutama Bachtiar
Delivered in guest lecture session for International Business Accounting Program, Faculty of Business and Management, Petra Christian University, Surabaya, East Java, Indonesia.
With recent acquisitions of master data management, process automation, and data governance capabilities, Precisely accelerates its leadership in data integrity with the broadest solution available from any one company. Join us in this webinar to learn about:
- The importance of data integrity for building business opportunities based on trusted data.
- How Winshuttle’s master data management and process automation products help achieve trust in data.
- How data governance capabilities from Infogix bridge the gap between business and IT to map your data integrity journey.
Advantages of an integrated governance, risk and compliance environmentIBM Analytics
Risk management is increasingly becoming a strategic, executive-sponsored solution that many organizations view as providing a competitive advantage. When companies have an aggregated view of all the different kinds of risk and compliance data, they can start to generate insights about how to run the business better. In this presentation, learn why and how to empower business leaders to make more risk-aware decisions with visibility across controls and associated issues and actions throughout the organization.
Insurance rating software is defined as an integrated software to handle the needs of insurers of all sizes. It is used to calculate the premium associated with a policy or other transactions. It stores the rating rules and algorithms, the base rates and associated factors, and the rules necessary to combine the rates and algorithms to calculate a premium.
Contego Fraud Solutions Ltd fin tech week 2014Rebecca1243
Data and Risk Management:A Match Made in FinTech.
Earlier this year Adrian Black, CEO of Contego, gave an insightful presentation on what data needs to be leveraged in the fight against fraud. Here at Contego we think that sharing the right intelligence reduces collective risk. So please take a look.
Transforming Healthcare through Patient Engagement with Oracle SolutionsPerficient, Inc.
This demo will provide examples that leverage Oracle WebCenter Suite, Oracle Business Intelligence Enterprise Edition, and Oracle Health Information Exchange along with collaborative and mobile technologies to provide a unique view into an “e-Patient” experience. We will discuss patient use of the internet, social media and hand held devices to enhance their health and their demands for electronic medical record access, doctor competency scores, hospital infection rates, and more.
In this session we will explore how to:
Provide instant access to patient and clinical information with Healthcare Portals
Enable instantaneous access to patient and clinical information using Mobile Health applications
Transmit medical images, video and audio for Telehealth diagnosis and treatment plans
Allow patients to exchange pertinent information and discuss health conditions with healthcare providers using Social Media
Gain Faster Closure, Lower Risk and Better Results with IBM EmptorisPerficient, Inc.
Procurement organizations are often challenged with lack of spend visibility, little-to-no automation around sourcing processes, difficulties in on-boarding, registering and measuring performance, and more. These organizations need to not only show value to the enterprise by reducing costs, but also provide value-added services to the business.
Sarah Radka, senior business consultant in Perficient’s IBM industry solutions practice, demonstrates how a leading international producer and marketer of beer, wine and spirits improved efficiency in the contract process by implementing a full IBM Emptoris solution.
During this webinar, our solution experts covered the keys to addressing critical contracting and supplier issues such as:
Streamlining procurement operations and removing bottlenecks
Providing and increasing overall spend visibility for an entire organization
Rationalizing and consolidating all templates into a standardized subset
Improving performance, attaining cost savings, mitigating risks and more
With a focus on providing high-quality, lower-cost care, the healthcare industry has been looking to the retail industry for strategies used to engage and empower consumers. Lessons learned include how to use the retail setting as a medium for providing care and how to engage consumers outside of the care setting by using technology.
What is often neglected when assessing retail industry tactics is their core competency of using data insights to motivate and incentivize changes in consumer behavior. Connected Health solutions provide streams of valuable information that can be mined and analyzed to achieve business objectives.
Perficient's healthcare and retail experts demonstrated how data can be leveraged to:
-Transform passive recipients of care into active participants in care
-Mass customize messaging aligned with population health initiatives
-Achieve outreach objectives that convert unknown consumers into patients/members
-Improve care and lower healthcare costs
#IBMInsight session presentation "Mitigate Risk, Combat Fraud and Financial Crimes"
The Issue of fraud, challenges, fighting fraud as an enterprise endeavor, IBM Smarter counter fraud framework and IBM Counter Fraud business services
More at ibm.biz/BdEPRH
Advanced Analytics for Asset Management with IBMPerficient, Inc.
Extreme volumes of machine data, such as process control logs, asset inspection records and part quality data are created each day. Companies must analyze patterns and interactions within this data to create a total view of their operational processes.
In this webinar, our experts discussed how IBM is enabling companies to proactively address maintenance and asset management challenges with advanced analytics solutions:
-Determine root causes of failure based on usage and wear characteristics
-Analyze component and environmental data to reduce time to identify quality issues
-Identify conditions to optimize maintenance and inventory management
-Monitor, maintain and optimize assets for better supply chain availability
Our webinar covered an introduction to predictive maintenance, analytics use cases for asset management, and IBM Maximo integration with analytics solutions.
Align Patient Outcomes with Financial Data: a Formula for Correlating Cost an...Perficient, Inc.
This slideshare discusses the cost crisis in healthcare, challenges healthcare organizations are facing, and how to:
Uncover true patient costs and value based purchasing
Understand quality and cost outcomes by aligning clinical and financial data
Identify trends and opportunities, and create actionable steps to improve business
Accelerate data integration with Perficient's High-Performance Costing Expressway
Leverage actionable visuals via dashboards with Oracle Business Intelligence tools
Evaluate patient complications, outcomes and detailed costs with Oracle’s Enterprise Healthcare Analytics Data Model
Console Power Productive Agents and Happy CustomersPerficient, Inc.
Take a deep dive into the core principles of building a great customer service agent experience with the Salesforce Console. During the webinar, our experts outlined the net impact of productivity metrics and customer satisfaction when the Salesforce Console is properly aligned with your company’s objectives.
We will also cover several key features, benefits and best practices for improving results with the new Agent Console:
-Easily spot important fields on records
-Limit switching between pages
-Quickly jot notes, actions and log interactions for each interaction
-Chat with customers in real time by integrating with Live Agent (Service Cloud only)
The session was packed with practical tips and insights from our real-world implementation experience.
Designing Enhanced Supervision for the Evolving Wealth Management Ecosystemaccenture
Converging and rapidly evolving industry trends are creating a new wealth management environment demanding Wealth Managers redefine supervisory governance to best support the firm’s growth strategies while balancing strong risk management. In this new Accenture Finance & Risk presentation we explore the evolving wealth management trends and challenges and outline four key business supervision design questions to support sustainable, long-term growth.
Peter Rasmussen, MD, Medical Director for Distance Health at Cleveland Clinic and Paddy Padmanabhan, CEO Damo Consulting Inc. shared 'Digitally Transforming Patient and Caregiver Experiences' at HIMSS 2019 on Feb 15th at Session 309. The session described the key elements of an enterprise digital transformation strategy, Illustrated success in digital transformation with the Distance Health program (Cleveland Clinic’s Telehealth Program), and discussed the key learnings from the ongoing digital transformation at the Cleveland Clinic
Protect Your Revenue Streams: Big Data & Analytics in TaxCapgemini
The game has changed since the onset of the financial crisis. Governments aiming to reduce budget deficits can only deliver so much through spending cuts. It is now even more vital that tax agencies ensure individuals and businesses pay the tax they owe, and that welfare fraud and error are minimised. Pretty will explain how he helps tax and welfare agencies tackle noncompliance, evasion and error. He will share client stories where billions of euros were saved, generating a return of at least 25 times the original investment.
By Ian Pretty,
Vice President, Global Tax & Welfare Leader
How Finance is driving growth in the Digital Age via OpenTextOpenText
In the digital age, finance business processes are shifting from batch to real-time, retrospective to predictive, and internally-focused to customer-centric. Innovative companies can drive growth by focusing on the revenue stream from an outside-in perspective. Learn more from OpenText at http://www.opentext.com/campaigns/rundigital/digitize-business/sap-finance/sap-finance-wod
Riding and Capitalizing the Next Wave of Information TechnologyGoutama Bachtiar
Delivered in guest lecture session for International Business Accounting Program, Faculty of Business and Management, Petra Christian University, Surabaya, East Java, Indonesia.
With recent acquisitions of master data management, process automation, and data governance capabilities, Precisely accelerates its leadership in data integrity with the broadest solution available from any one company. Join us in this webinar to learn about:
- The importance of data integrity for building business opportunities based on trusted data.
- How Winshuttle’s master data management and process automation products help achieve trust in data.
- How data governance capabilities from Infogix bridge the gap between business and IT to map your data integrity journey.
Advantages of an integrated governance, risk and compliance environmentIBM Analytics
Risk management is increasingly becoming a strategic, executive-sponsored solution that many organizations view as providing a competitive advantage. When companies have an aggregated view of all the different kinds of risk and compliance data, they can start to generate insights about how to run the business better. In this presentation, learn why and how to empower business leaders to make more risk-aware decisions with visibility across controls and associated issues and actions throughout the organization.
Insurance rating software is defined as an integrated software to handle the needs of insurers of all sizes. It is used to calculate the premium associated with a policy or other transactions. It stores the rating rules and algorithms, the base rates and associated factors, and the rules necessary to combine the rates and algorithms to calculate a premium.
Contego Fraud Solutions Ltd fin tech week 2014Rebecca1243
Data and Risk Management:A Match Made in FinTech.
Earlier this year Adrian Black, CEO of Contego, gave an insightful presentation on what data needs to be leveraged in the fight against fraud. Here at Contego we think that sharing the right intelligence reduces collective risk. So please take a look.
February 6, 2014 presentation to Community Bankers Association of Georgia's BSA Officer's School covering Money Services Businesses (MSBs), Bank Secrecy Act / Anti-Money Laundering (BSA/AML), Office of Foreign Asset Control (OFAC), and operational considerations.
Financial crimes compliance Brochure - BMR AdvisorsAbhishek Bali
BMR Advisors - Financial Crimes Compliance Services. These constitute - Anti-Money Laundering, Anti-Bribery Compliance, Fraud & Forensic Services and Data & Database Services. Their applicability is across countries, geographies and sectors,
Travel fraud kyc as fraud tool masha cilliers 210217Masha Cilliers
Leveraging KYC and Authentication technology for fighting fraud - fraud management techniques for retailers, airlines, online travel agents, hotels and other merchants. Looking at the tools and how they can fit with fraud management strategy.
Implementing Anti Money Laundering and Fraud Rules in BankingTriVersa
This presentation describes various financial crimes functional challenges and how to define and construct effective rules in support of Anti-Money Laundering (AML) or Electronic Fraud scenarios.
It is useful to those working in traditional or digital Banking sectors; especially working in departments such as Internal control, Compliance, Monitoring or Investigation.
Professionals in compliance or technology functions such as internal Control officers, compliance officer, rules developers, compliance supervisors and team leaders will also benefit as it aims to provide insight into effective rules that ensures their Banking operations remain compliant in line with ever-evolving electronic fraud and AML patterns.
Later sections of the presentation also describe Dixtior Compliance Solution as an effective solution to detect and combat money laundering in any banking institution.
To download the document, visit www.thetriversa.com/article.php
Today all organizations are subject to fraud risks. Large frauds have led to the downfall of entire organizations, massive investment losses, significant legal costs, incarceration of key individuals, and erosion of confidence in capital markets, Consequently as part of an organization’s governance structure, a fraud risk management program should be in place, including a written policy to convey the expectations of the board of directors and senior management regarding managing fraud risk.
Knowing present corporate focus and need for improved fraud risk governance & management, we’re pleased to launch our Fraud Risk Consulting services in addition to our existing bouquet of Risk advisory, Consulting, Training & Human Capital Services. Our services are offered through our multi location delivery centres in major metros with total presence in 11 Indian cities network.
Today all organizations are subject to fraud risks. Large frauds have led to the downfall of entire organizations, massive investment losses, significant legal costs, incarceration of key individuals, and erosion of confidence in capital markets, Consequently as part of an organization’s governance structure, a fraud risk management program should be in place, including a written policy to convey the expectations of the board of directors and senior management regarding managing fraud risk.
Knowing present corporate focus and need for improved fraud risk governance & management, we’re pleased to launch our Fraud Risk Consulting services in addition to our existing bouquet of Risk advisory, Consulting, Training & Human Capital Services. Our services are offered through our multi location delivery centres in major metros with total presence in 11 Indian cities network.
The Role of Regulations in the Development of Digital FinanceJohn Owens
This presentation focuses on the balancing act between innovation, safety and soundness of digital financial services as well as steps to support consumer protection. It also includes a review of the current guidelines and a checklist format to guide regulators and policy makers to compare their own regulations, policies, environments and supervisory capacity in relation to emerging developments in the field of DFS.
Webinar Presentation: Enhancing AML Compliance Regimes in MSB SectorsSecurefact
There has been a lot of debate in the media on the extent of the money service business (MSB) sectors’ adaptation and adherence to creating a solid compliance regime with respect to AML/CTF regulations. Many banks have decided to end long-term relationships with the MSB sector, refuse to open bank accounts for businesses that fall into FINTRAC’s/FinCEN’s definition of a MSB, or have adopted de-risking strategies to manage perceived compliance MSB risks. This webinar will provide further insight into MSB-sector issues such as unique compliance challenges and solutions when finding and retaining banking services, as well as implementing risk-based practices.
Tactics, plans and the whole meaning of fraud is evolving from day to day. Controlling and improving the processes is one of the steps in the fight against fraud. But what is the key to be effective against fraud in the payment industry?
Most business owners fail to understand that, just as there is a human life cycle, there is also a business life cycle. It begins with the conceptual or idea stage, which progresses to the start-up period, followed by the growth phase, then the well-established maturing years,and finally the exit or retirement phase. most common mistake most business owners make is that they don’t plan far enough in advance for the exit phase.
Similar to Navigate the Financial Crime Landscape with a Vendor Management Program (20)
The world is quite a different place than it was six months ago, and with the 2020 holiday season fast approaching, the pressure is on to meet revenue goals in what’s been an uncertain year.
In August, we surveyed 154 marketing executives to find out what they think is likely to happen this holiday season and how they are preparing for it. The results are fascinating, and we’ve distilled them into clear actions you can take right now to adapt and prepare for a very different 2020 holiday season.
In this webinar, Eric Enge (Principal, Digital Marketing at Perficient) and Jim Hertzfeld (Chief Strategist, Digital at Perficient) discussed:
How marketers have already adapted and where they see the most opportunity moving forward
What will be different this holiday season and how to adjust your strategy accordingly
Ways to identify and meet changing customer expectations, wants, and needs
How to determine if your priorities or investments should change
What actions you can take right now to be successful
Transforming Pharmacovigilance Workflows with AI & Automation Perficient, Inc.
Medical information call centers have an opportunity to transform the way they capture, code, and analyze adverse events (AEs) and product quality complaints (PQCs) with artificial intelligence (AI) and automation.
The use of such innovative technology improves data quality and consistency, compliance, and operational efficiency. It helps reduce the frequency of your pharmacovigilance (PV) operations resources going home, saying, “I have more to do at the end of the day than I did when I started."
Our one-hour, on-demand webinar shows you how you can use AI and automation to turbo-charge your end-to-end PV system. Use cases and demonstrations will include:
Analyzing safety data
Auto-coding verbatim terms to official medical dictionary terms
Auto-creating an AE case in your database
Converting speech to text
The Secret to Acquiring and Retaining Customers in Financial ServicesPerficient, Inc.
Data, when leveraged effectively, can help you segment and target customers, analyze spending habits, and can create a personalized experience that builds value and customer loyalty.
Without a 360-degree view of your customers, you can’t properly target them with real-time personalized offers, advice, and other services. In addition, lack of customer intelligence creates lost opportunities for banks and insurers to cross-sell and upsell new products and services.
Our one-hour webinar covered how customer intelligence platforms can help you engage, acquire, and retain customers.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Perficient, Inc.
The only thing certain about forecasting in a volatile economy is that the future is unpredictable. Historically, organizations have effectively utilized statistical techniques for short-term business planning, but leveraging actuals no longer allows us to predict the future. The ability to be prepared, responsive, and agile under these conditions is becoming a crucial success factor. Oracle Strategic Modeling can help you better navigate change to cope with uncertainty.
If your CFO’s questions regarding earnings, liquidity, and cash flow are unceasing and far-reaching, watch our on-demand webinar for a deep dive into strategic modeling. We modeled real-world scenarios to show how you can:
Quickly and easily develop a hierarchical model of your business
Leverage multiple pre-built functions to forecast key performance drivers
Provide transparency on forecasted financials via audit trail
Utilize goal seek to set financial targets and estimate the financials drivers necessary to achieve it
Perform sophisticated “what-if” analysis via simulations to improve the accuracy of your forecast
Use built-in dashboard functionality to deliver powerful reporting capabilities
While many stay-at-home orders have been lifted, consumers’ new digital buying behaviors and habits are here to stay. Watch our panel discussion on the accelerated need for commerce and learn how commerce and content can transform our digital economy.
Topics include:
-What is the “experience economy” and how do you leverage it? -If you move beyond product and price, what’s next?
-How business models have shifted and what you can do to break down silos and leverage new processes to capture the digital dollar.
-How organizations have built agile teams to address the ever-changing needs of customers, including responsive approaches that address the omnichannel consumer.
-Technologies that are best suited to enable your business and customers – and how headless commerce has changed the game.
-How the future of commerce is changing, and what you should do now to prepare.
Our panel features Jordan Jewell, IDC Research analyst known for his insight into the commerce industry. Joining him from Perficient is general manager Brian Beckham, who brings deep expertise in content management and empowering organizations in their digital transformations. Rounding out the panel is Episerver’s Joey Moore, who has spent the last decade helping organizations across the globe advance their digital maturity.
Centene's Financial Transformation Journey: A OneStream Success StoryPerficient, Inc.
Centene, a large multi-line managed care organization, was looking to modernize and streamline its corporate performance management (CPM) applications.
Centene had to move data between platforms multiple times during the close process so that close data could be fully consolidated and made available for reporting. This process had numerous challenges and inefficiencies that Centene wished to improve upon so that they could provide a more streamlined and more transparent process to the functional teams that leverage consolidated financials in their systems for reporting and analysis.
Centene chose OneStream XF for global and US consolidations, currency conversion, eliminations, and ownership percentage.
Michael Vannoni, director, financial systems solutions discussed the migration to OneStream XF including:
-Factors leading to the selection of OneStream XF
-Details of the solution design
-Benefits realized with global consolidation implementation
-Future planned enhancements
WHODrug Koda, developed by Uppsala Monitoring Centre (UMC), is an automated coding service, which uses artificial intelligence (AI) to automate the coding of drug names and ATC selections, improving consistency and operational efficiency. It can also be used to accelerate dictionary upgrades, including the transition from WHODrug B2 format to B3.
Through API (Application Programming Interface) web services, the coding engine can be integrated with custom or off-the-shelf drug safety, medical coding, or data management systems.
In this webinar, Perficient and UMC discussed WHODrug Koda and how you can integrate it into your medical coding activities.
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPerficient, Inc.
There are multiple reasons why companies migrate to a new clinical trial management system (CTMS). Still, the two most common are mergers and acquisitions (i.e., CTMS consolidation) and the desire to switch CTMS vendors. Regardless of the reason, many of the best practices, processes, and tools are the same.
In this webinar, we looked at the migration approaches taken across several case studies. You’ll come away with an understanding of:
Pros and cons of each CTMS migration method
Types of migration tools, including APIs, ETL tools, and adapters
Approximate timelines and costs associated with each migration method
The topics discussed in this webinar can be applied to any CTMS migration project, whether you’re moving to or from Oracle’s Siebel CTMS, Medidata’s Rave CTMS, and Veeva’s Vault CTMS.
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Perficient, Inc.
The pandemic has ushered in a new normal for manufacturers, and the impact of digital communication is more important than ever.
View our on-demand webinar with Tony Kratovil, Regional Vice President of Manufacturing at Salesforce, and Eric Dukart, National Sales Executive at Perficient. They covered why the right digital strategies are critical for manufacturers in the wake of COVID-19.
Our webinar covered:
Current challenges with forecasting, collaboration, and disruptions to distribution networks.
Insights for stabilizing operations, accelerating partner management, and developing a digital strategy that differentiates your business.
Candid Q&A with real-world examples.
New Work.com resources to help manufacturers restart safely and rebuild.
Tools and resources to move forward – fast.
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinPerficient, Inc.
Things move quickly in marketing. How do you identify what your customers need and how you can help? Now more than ever, audience intelligence is the key.
Audience intelligence is about understanding your target customers, their needs, what resonates with them, and how you can reach them. Eric Enge (Digital Marketing Principal, Perficient) and Rand Fishkin (Co-Founder & CEO, SparkToro) discussed this topic live on May 7, 2020. Watch to hear tactics for gaining a better understanding of your customers, how to use audience intelligence to optimize your marketing now, and more.
Cardtronics, the global leader in ATM deployment and management, decided to retire its on-premises Hyperion solution to gain the operational efficiencies, features, and functionality provided by a best-in-class cloud solution.
Cardtronics chose Oracle EPM Cloud including Financial Consolidation and Close, Planning, Management Reporting, Account Reconciliation, Enterprise Data Management, as well as Oracle Analytics Cloud.
In this video, project owner Richard Ng, director, financial systems, Cardtronics, discusses the migration to Oracle EPM Cloud including:
Multi-release 18-month deployment schedule across multiple countries
Benefits of a global Chart of Accounts for ERP and EPM
Seamless integration across ERP Cloud, HCM Cloud, and EPM Cloud
Preparing for Project Cortex and the Future of Knowledge ManagementPerficient, Inc.
Microsoft has turned traditional enterprise content management on its head with its recent announcement of Project Cortex.
Project Cortex uses advanced artificial intelligence to harness collective knowledge from across the enterprise and automatically organize it into shared topics like projects, products, processes, and customers. Using AI, Cortex creates a knowledge network based on relationships among topics, content, and people and delivers it in the apps you use every day – Office, Outlook, and Teams.
This webinar examined Project Cortex in more detail, including:
• What is Project Cortex?
• Why is Project Cortex different than other knowledge network projects previously introduced?
• How does incorporating AI and automation change the game?
• What is possible with Project Cortex?
• What can you do to prepare?
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
With an increasingly mobile workforce, and the spread of shadow IT, the rapid rise of cybercrime - companies must find unique ways to effectively manage their sprawling SaaS portfolio.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3
Navigate the Financial Crime Landscape with a Vendor Management Program
1. NAVIGATING THE FINANCIAL CRIMES
LANDSCAPE WITH AN EFFECTIVE VENDOR
MANAGEMENT PROGRAM
JANUARY 15, 2015
2. 2
ABOUT PERFICIENT
Perficient is a leading information technology consulting firm serving clients throughout
North America.
We help clients implement business-driven technology solutions that integrate business
processes, improve worker productivity, increase customer loyalty and create a more agile
enterprise to better respond to new business opportunities.
3. 3
GlobalDeliveryCenters/OffshoreDelivery
Deep Financial Services Domain Expertise
Enterprise
Information Solutions
Finance
Enterprise Insights
Portal
Web Content
Social Solutions
SOA
Cloud
API Solutions
Company Wide Practices
Deep Financial Services Domain Expertise
BANKING
Wholesale
Consumer
Credit Unions
Payment Processing
Trust & Custody
Trade Services
Treasury Services
ASSET & WEALTH
MANAGEMENT
Equities & Fixed Income
SMA & Wrap
Hedge Funds
OMS & EMS
Portfolio Modeling
Portfolio Accounting
CAPITAL
MARKETS
Equities & Fixed Income
FX & Commodities
Future & Options
Electronic Trading
INSURANCE
Investments
Customer Acquisition
Property & Casualty
Life Annuities Services
Claims Evaluation
Underwriting
Consumer Direct
Business/
Technology Solution
Rationalization
and Delivery
Business Process
Improvement
Program Value,
Quality and
Cost Management
Client
Centricity
Risk and Regulatory
Compliance
Finance
Transformation
Solutions & Services
INDUSTRY DRIVEN SOLUTIONS
4. 4
ABOUT THE SPEAKER
Richard Brownstein, Director of Risk and Compliance, Perficient
Rich leads Risk and Compliance in Perficient’s Financial Services national
practice. He has more than 20 years of experience working for and with large
financial institutions in the areas of operational risk management, legal and
compliance, IT governance, and project portfolio management. He has a deep
understanding of industry challenges and best practices. Rich has a proven
track record leading strategic business, product and technology initiatives to
minimize risk and maximize effectiveness and efficiency for organizations.
5. 5
WHAT WE WANT TO TALK ABOUT TODAY
• Introduction
• Financial Crimes on the Rise / Increased
Regulatory Pressure
• Taking an Enterprise View of Risk
• Know Your Vendor – KYV
• Vendor Assessment
7. 7
HIDDEN COSTS OF NONCOMPLIANCE*
*In 2014 alone…
$12.4 B
in monetary fines as disclosed
in trade publications.
Unknown Costs
Lost Business
Reputational
Damage
Third-Party &
Vendor RisksSource: “AML & Sanctions Enforcement and the
Price of Dirty Money” Infographic 2014
8. 8
2015 RISK & COMPLIANCE CHALLENGES
Agencies and the self-regulatory organizations are continually revising
and adopting new rules and regulations
9. 9
GOALS OF FINANCIAL CRIME PREVENTION
Current Compliance Goals
• Meet regulatory requirements
• Prevent fraud losses
• Reduce false positives
• Manage reputational risk
• Streamline operations and reduce costs
New Compliance Goals
• Governance and enterprise view
• Integrated risk controls and framework
• Data quality and standards
• Risk intelligence
• Vendor risk management
10. 10
AREAS CONTROLS SHOULD BE PUT IN PLACE
Electronic Communication
Surveillance
Information Security
SEC Trade Surveillance
Rules Compliance
AML, KYC
Transaction Monitoring
PATRIOT ACT / CFT
Client Suitability / Broker Fraud
Sales Practice Abuse
Fraud Detection & Surveillance
Corruption / Collusion / Bribery
FACTA Identity Theft Prevention
Regulatory Red Flags
Regulatory Assessment
and Review
Regulatory
Impact Analysis
11. 11
THE VAST
LANDSCAPE OF
FINANCIAL CRIMES
Financial crimes have been increasing at a disturbing
rate causing increased scrutiny by regulatory bodies and
greater due diligence applied by business risk officers.
Fraudsters are finding more ways to fund activities or profit
by multifarious means both internally and externally.
12. 12
ALTERNATE
CHANNELS
New ways of gaining access to customer
information have increased the ways of
committing financial crimes
• Cross-channel and cross-product fraud
• Online banking and bill pay services
• Mobile banking
• Mobile payments
• Virtual currency
• Gift card theft and scams
• Email scams
13. 13
INTERNAL
THREATS
Internal Threats are on the rise
• Identity theft
• Embezzlement
• Fraud
• Bribery
• Gifts and entertainment
• Vendor relations
• Information security breaches
14. 14
EXTERNAL
THREATS
External threats continue to be on the rise as well,
even with existing regulatory demands increasing
• Fraud
• Trading Violations
• Brokerage Fraud
• Client Suitability / Sales Practice Abuse
• AML / CFT – AML & Countering Funding for
Terrorism
• OFAC / FinCen Sanctions & BSA Requirements
violations
• Mutual Fund Abuses
• Vendor Services SLA breaches / Vendor KYC / Data
breaches
• FATCA – Foreign Account Tax Compliance Act
• FACTA – Fair and Accurate Credit Transaction Act
• Identity Theft
15. 15
CURRENT AML/FRAUD DETECTION FUNCTIONS
Alert / Case
Management
Regulatory
Compliance
Risk Rating / Enhanced
Due Diligence / CIP
Surveillance and
Supervision
KYC / New Account Opening
(NAO) / Client On-boarding
FRAUD SOUCE DETECTION FUNCTIONS
Broker Fraud Misrepresentation KYC Failures Employee Fraud – Internal Controls
Data Security Breaches Information Security Identity Theft
Integrated
AML Compliance
Program
• Identify verification
• Validate source of funds and
product suitability
• Confirm no negative news ,
watch list and PEP
• Central and standardized
Customer, LEI & Account data
• Cross enterprise activity view
• Review changes
• Vet activity against scenarios
• Extended customer behavior
patterns detection
• Alert tuning to increase
accurate/efficient detection
• Alert manager driven by alert
type & research
• SLA and escalation
• Role based workflow
• Procedures and Training
• Reporting, logging, audit
• SAR investigation contents
• Regulatory review and audit
coordination / Exception investigation
• CCO Governance & Control Standards
• AML & Sanction Policy & Procedure
Manager
… evolving process and solutions to
meet evolving Fraud, AML & Sanctions
management objectives …
16. 16
AREAS OF SYNERGY WITH EXISTING FRAMEWORK
Financial Crime and Compliance Technology Environment
17. 17
ENTERPRISE VIEW OF RISK
The current regulatory climate is giving new meaning to the
term‘Governance’.
By focusing on compliance with individual regulations, banks and
insurance companies risk developing a requirements-based, siloed,
myopic approach and creating overlapping, uncoordinated
bureaucracies (and cost centers) that deal
with disparate regulations inconsistently.
“Governance takes a holistic, flexible, and forward-thinking approach
that addresses all areas of the business to create value beyond mere
compliance and minimize risk on an enterprise level.”
– CEB Towergroup
18. 18
ENTERPRISE INTEGRATED RISK & COMPLIANCE
Definition: The ability to integrate All Risk
Management and Compliance activities
Enterprise-Wide.
• Driven from Policies
• 3 Lines of Defense / Front to Back
• Bottom-Up & Top-Down Risk Identification
• GRC Model
Business Process and Assurance
Operational Risk
Operations Risk Control
Validate &
Remediate
Enterprise
Integrated
Compliance &
Risk Mgmt.
19. 19
POLL: How are you currently
managing and identifying vendor
risks?
20. 20
VENDOR PRODUCT / SERVICES POTENTIAL RISK AREAS
Risk Control Self Assessments drive increased management awareness
into strong controls, potential blind spots and key control issues
21. 21
KYV TYPICALLY NOT INCLUDED IN SRM
DUE DILIGENCE ACTIVITY
SUPPLIER RISK
MANAGEMENT
KYV
Assist or lead RFP/Proof of concept/ Selection Process
Confirm financials and references
Negotiate MSA / Contract / Pricing
Ensure performance measures / SLAs are set Ideally
Ensure SLAs are achieved Rarely
Assure appropriate control entitlements and IT access
Validate Vendor Party ID
Perform upfront on ongoing Sanctions and Watch List
monitoring
Perform Activity Monitoring
Screen Vendor Payments (A/P)
22. 22
INHERENT RISK VS.
RESIDUAL RISK
There are two ways to look at vendor risk:
Inherent Risk – The risk that activity would pose if
no controls were in place
• What is the vendor doing for your company?
• How critical are they to your business?
• Where are they located?
• What data are they handling?
• What naturally occurring threats do they face?
Residual risk – The risk that remains after controls
are taken into account
• Cybersecurity/data breaches/InfoSec
• IT Services/IT vendors
• Labor issues
• Bribery and corruption
• Fiduciary responsibility
• Vendor transaction monitoring
23. 23
US Foreign Corrupt Practices Act:
• Offense to bribe public officials.
• Does not cover bribery on a private level.
• Only covers active bribery (the giving of a bribe).
• Companies subject to US jurisdiction can be held
vicariously liable for acts of its employees and
agents.
• Must be proved that the person offering the bribe did
so with a “corrupt” intent.
• FCPA creates an exemption for facilitation payments.
REGULATORY IMPLICATIONS FOR 3rd PARTY
SERVICES
UK Bribery Act
• Offense to bribe public officials.
• Covers bribery on a private level.
• Covers the giving (active) and taking (passive) of a
bribe.
• Creates a strict liability corporate offence for failure to
prevent bribery (no vicarious liability).
• No requirement for a “corrupt” or “improper” intent.
• The Bribery Act makes no such exception.
24. 24
A COMBINED VIEW
OF RISK
The convergence of Supplier Risk
Management and Compliance in Vendor
acceptance is key:
• Vendor Procurement/Supplier Risk
Management to interface with Compliance
and the business to conduct KYV and more in
depth due diligence
• Risk-rate new and existing vendors
periodically to perform risk-based approach to
support departmental functions…
• Support the departmental functions as well as
protect the enterprise
Supplier Risk
Mgmt. Office
Department
KYV
25. 25
THIRD PARTY VENDOR RISKS CONSIDERATIONS
Several typical Financial Crimes could be sourced at the Third Party Vendor level.
Avoid potential risks and threats from vendor products and service providers by:
• Increasing Third Party Vendor Due Diligence during selection process
• Reviewing and updating Third Party Vendor Contracts
• Inspecting all Third Party Vendor Service Level Agreements (SLAs)
– Make sure all regulatory considerations have been covered
– Make sure Vendor financial viability is strong
– Evaluate Third Party Vendor business and data processes and controls
– Consider data location and access follows strict controls
– Require that vendors endure the same due diligence as customers and employee
• Financial, Reputational, and Legal Risks
– Information security for companies handling sensitive information
– Social responsibility and labor standards, especially in third‐world countries
– Bribery and corruption
– Financial stability of critical suppliers
– Geopolitical risks that threaten to disrupt business
Your comfort with the level of residual risk determines what you do next: continue the business
relationship by working with the vendor to further reduce that risk, or sever the relationship and
find an alternate supplier
26. 26
• Internal controls
– Adopt rigorous accounting policies, procedures and controls, including dual signoff
– Conduct due diligence on suppliers and vendors (special attention and possibly EDD on off-shore providers).
– Establish a system for monitoring transactions and developing review processes to ensure that transactions “fit the business” of
the vendor.
• Regulatory guidance
– Adopt risk management processes commensurate with the level of risk and complexity of its third-party relationships.
• Ensure comprehensive risk management and oversight of third-party relationships involving critical activities.
• An effective risk management process throughout the life cycle of the relationship includes, but is not limited to:
– Planning
– Due diligence and third-party selection
– Contract negotiation
– Ongoing monitoring
– Termination
– Oversight and accountability
– Documentation and reporting
– Independent reviews
OCC SR 2013-29 RISK MANAGEMENT GUIDANCE
28. 28
KYV DUE DILIGENCE: HOW WE CAN HELP
• Regulatory Compliance Program
Management
• Vendor Assessments, Solution
Rationalization & Project Roadmaps
• Risk & Controls Assessments
• Business Requirements
• Data Governance & Data Quality
• Testing & Validation
Our risk and compliance expertise,
management consulting experience, reusable
assets, and client track record in the industry,
enable us to delivery business value for firms
leveraging existing sanctions platforms and
evolve their culture of compliance through KYV
processes and controls.
29. 29
VENDOR SELECTION APPROACH
Obtain
Management
Approval to
Proceed
Conduct
Management
Interviews
Identify Unique
Requirements
Review Existing
Requirements
Document
Develop
Solution
Architecture
Develop
Product
Information
Request
Manage Project--Quality Assurance
Select Software
Package
Finalize
Hardware
Requirements &
Costs
Develop
Implementation
Plan
Organize
Project/
Research
Software
Options
GATHER REQUIREMENTS ANALYZE OFFERINGSDEVELOP EVALUTATION
CRITERIA
SELECT SOFTWARE
Refine Scoring
Methodology
Develop Demo
Scripts
Check
References
Facilitate
Interactive
Demos
Score PRI
A rigorous approach to the Third Party Vendor Product or Service is focused around the concept of high-impact and fast-response,
understanding broad requirements, identifying vendor landscape, due diligence and selection process. Perficient uses a packaged
selection methodology and assets where applicable to accelerate the selection. The approach is flexible based on individual client
requirements for vendor selection and is customized to establish a strong and low risk exposure selection.
The approach is modular and can be easily adapted to client-specific circumstances
Proof of
Concept Test
KNOW-YOUR-VENDOR
Party
Identification
Risk Rating
Enhanced Due
Diligence
30. 30
VENDOR SELECTION BASED ON KEY CRITERIA
Short List of VendorsLong List of Vendors
1. Vendor X
2. Vendor Y
3. Vendor Z
Prioritized Client Criteria
Institutions are challenged in identifying their most suitable partners. The risk and compliance space
requires a diligent yet efficient vendor assessment.
Vendor 1
Vendor 2
Vendor 3
Vendor 4
Functional
Capabilities
Cost
Company/Client base
Technology
NumberofVendors
VendorsVendors Vendors Vendors
Complete
Enhanced SRM
& KYV
To RFP or
Quick
Selection
31. 31
INTEGRATED RISK MANAGEMENT FRAMEWORK
FRAUD SOUCE DETECTION FUNCTIONS
Broker Fraud Misrepresentation KYC Failures Employee Fraud – Internal Controls
Data Security Breaches Information Security Identity Theft
Alert / Case
Management
Surveillance and
Supervision
Integrated
AML Compliance
Program
Regulatory
Compliance
Risk Rating / Enhanced
Due Diligence / CIP
KYC / New Account
Opening (NAO) / Client
On-boarding
32. 32
2015 RISK & COMPLIANCE SERIES
How to Drive Value from
Operational Risk Data
Thurs., January, 29 12:00 – 1:00 ET
Registration details will follow in post-
webinar email communications or
visit www.perficient.com.
Editor's Notes
Matching short-term and long-term AML/Fraud risk management goals with specific technology solutions is a priority in rationalizing Monitoring and Reporting tools
Perficient takes a holistic view of Business Risk across an entire enterprise. This integrated view makes overall risk management more effective and comprehensive
Inherent risk example
For example, a company that processes your credit card payments has a higher inherent risk than a vendor who provides office supplies. A vendor’s low inherent risk rating can save you the time and expense of doing further assessment.
OCC’s Guidance for 3rd Party Risk Management – Risk Lifecycle
Planning - Plans that outline the institution’s strategy, identify the inherent risks of the activity, and detail how the bank selects, assesses, and oversees the third party.
Due Diligence - Proper due diligence in selecting a third party.
Contract Negotiation - Written contracts that outline the rights and responsibilities of all parties.
Ongoing Monitoring - Ongoing monitoring of the third party’s activities and performance.
Termination - Contingency plans for terminating the relationship in an effective manner.
Oversight & Accountability - Clear roles and responsibilities for overseeing and managing the relationship and risk management process.
Documentation & Reporting - Documentation and reporting that facilitates oversight, accountability, monitoring, and risk management.
Independent Reviews - Independent reviews that allow bank management to determine that the institution’s process aligns with its strategy and effectively manages risks