SlideShare a Scribd company logo
OFAC’s	Sibling	– The	Commerce	Department’s	
Bureau	of	Industry	and	Security	and	How	Its	
Regulatory	and	Criminal	Powers	Are	Applied
©	All	rights	reserved.	2016	SanctionsAlert.com
1
Saskia	Rietbroek
222
Principal,	SanctionsAlert.com
Partner,	NoMoneylaundering.com
Former	Founding	Executive	Director,	
Association	of	Certified	Anti-Money	
Laundering	Specialists	
@sanctionsalert
2
Audio
33
If	you	cannot	hear	us:	
- Adjust	your	speakers,	or	
- Switch	from	“Use	Mic	&	Speakers”	to	“Use	
Telephone”
- To	access	Gotomeeting Support,	click:	
http://support.citrixonline.com/en_US/Me
eting/all_files/G2M030004,	or
- Call		+1	805-617-7000,	or
- Email	:	helpdesk@SanctionsAlert.com
Saskia	Rietbroek
3
444
An	independent	source	of	
knowledge,	delivering	vital	
compliance	training	worldwide
4
Become	a	Member	Now
SanctionsAlert.com
Special	Membership	Offer	valid	until	Dec.	1,	2016
$885	per	year	(you	save	$100).	
T:	305	433	7187
Email:	helpdesk@sanctionsalert.com
Web:	http://sanctionsalert.com/membership/membership/
5
Access	and	Certificates	of	Attendance
Saskia	Rietbroek
1.	Download	
GotoWebinar App
2.	Type	in	Webinar	ID	to	
use	the	GotoWebinar APP
6
1.25	CE	point
At	any	time,	type	your	
questions	in	the	
question	box	
How	You	Can	Participate
Saskia	Rietbroek
7
All	rights	reserved	©	2016	SanctionsAlert.com
OFAC’s	Sibling	– The	Commerce	
Department’s	Bureau	of	Industry	and	
Security	and	How	Its	Regulatory	and	
Criminal	Powers	Are	Applied
Expert	Speakers:	Theodore	Curtin	and	Peter	Jeydel
Led	by: Saskia	Rietbroek
Nov	10,	2016	12:00– 1:15	pm	ET
8
Theodore	Curtin	
999
Foreign	Policy	Division
Office	of	Nonproliferation	&	
Treaty	Compliance
Bureau	of	Industry	and	
Security
U.S.	Department	of	
Commerce
9
Peter	Jeydel
§ Associate,	Steptoe&Johnson LLP
§ Vice	Chair	of	the	American	Bar	
Association’s	Export	Controls	
and	Economic	Sanctions	
Committee	of	the	International	
Law	Section
§ (202)	429-6291	
10
Agenda
BIS	Overview
Comparison	
BIS-OFAC
Mission	and	
Jurisdiction
Enforcement
Financial	
Sector	Risk
Case	Study
Key	Take	
Aways,	Q&A
11
Question	for	Attendees
12
Submit	your	answer	in	
the	poll	window	in	the	
Control	Panel
What	sector	are	you	in?
Financial	sector
Government
Legal/Consulting/Software
Tech/Medical
Oil	gas/Mining/Offshore
Other
Saskia
Rietbroek
12
Agenda
BIS	Overview
Comparison	
BIS-OFAC
Mission	and	
Jurisdiction
Enforcement
Financial	
Sector	Risk
Case	Study
Key	Take	
Aways,	Q&A
13
Bureau	of	Industry	and	Security	
Overview
Ted	Curtin
Sr.	Export	Policy	Analyst
Webinar	– November	10,	2016
14
Bureau	of	Industry	and	Security		
Mission
Advance	U.S.	national	security,	foreign	
policy,	and	economic	objectives	by	
ensuring	an	effective	export	control	and	
treaty	compliance	system	and	promoting	
continued	U.S.	strategic	technology	
leadership.
15
Export	Administration	Regulations
13	C.F.R.	730	to	774
Items	Subject	to	the	EAR
• Items	
– Goods
– Software
– Technology
• Subject	to	the	EAR
– Made	in	U.S.	wherever	
located
– Located	n	the	U.S.	wherever	
made
– Made	abroad	but	above	
deminims U.S.	content
Exports	and	Reexports
• Physical	Movement
• Deemed	Exports
16
Decision	Tree
• Determining	if	a	license	
is	required.	
– List	Based	
– End	use/End	user	based
17
List	Based	Controls
On	the	CCL	&	EAR99
1A202 Composite structures, other than
those controlled by 1A002, in the form of
tubes and having both of the following
characteristics (see List of Items Controlled).
License Requirements
Reason for Control: NP, AT
Control(s) Country Chart (See Supp.
No. 1 to part 738).
NP applies to entire entry NP Column 1
AT applies to entire entry AT Column 1
List Based License Exceptions (See Part 740
for a description of all license exceptions)
LVS: N/A
GBS: N/A
CIV: N/A
List Based License Exceptions (See Part 740
for a description of all license exceptions)
LVS: N/A
GBS: N/A
CIV: N/A
List of Items Controlled
Related Controls: (1) See ECCNs 1E201
(“use”) and 1E202 (“development” and
“production”) for technology for items
controlled by this entry. (2) Also see ECCNs
1A002, 1C010, 1C210, 9A010, and 9A110.
(3) “Composite” structures “specially
designed” or prepared for use in separating
uranium isotopes are subject to the export
licensing authority of the Nuclear
Regulatory Commission (see 10 CFR part
110).
Related Definitions: N/A
Items:
a. An inside diameter of between 75 mm and
400 mm; and
b. Made with any of the “fibrous or filamentary
materials” specified in 1C010.a or .b or 1C210.a
or with arbon prepreg materials specified in
1C210.c.
18
List	Based	Controls	
Commerce	Country	Chart
19
End	Use/User	and	Other	Controls
End	Use	and	End	User	
Controls	(EAR	Part	744)
• Entity	List
• Unverified	List
• WMD	and	Missile	uses
• Military	end	uses	(China,	
Russia,	Venezuela)
• Denied	Parties	List
Embargoes	and	Other	Special	
Controls	(EAR	Part	746)
Cuba §746.2
Iran §746.7
N.	Korea §746.4
Sudan §742.10
Syria §746.9
Iraq §746.3
Occupied	
Crimea
§746.6
Russia	 §746.5	&	§746.6
Russia	&	
Venezuela
§744.21
20
License	Exceptions	
(EAR	Part	740)
• Read	carefully	– must	meet	all	the	criteria	
described	in	Part	740.
• Not	all	license	exceptions	apply	to	all	
destinations,	or	ECCNs,	or	transactions
• Restrictions	apply	
21
Question	for	Attendees
22
Submit	your	answer	in	
the	poll	window	in	the	
Control	Panel
Have	you	ever	had	a	compliance	issue	
that	arose	out	of	EAR?
Yes
No
Not	applicable/don’t	know
Saskia
Rietbroek
22
Agenda
BIS	Overview
Comparison	
BIS-OFAC
Mission	and	
Jurisdiction
Enforcement
Financial	
Sector	Risk
Case	Study
Key	Take	
Aways,	Q&A
23
Overview	- BIS	
EAR:	Export	controls	
and	antiboycott rules
Other	functions:	
Regulating	US	defense	
industrial	base	(e.g.,	
DPAS	priority	rated	
orders),	offset	
reporting,	defense	
stockpiles
EAR	commonly	called	
“dual-use”	export	
controls	
Export	Control	Reform	
(ECR)	brought	more	
military	items	under	
the	EAR	from	the	State	
Dept.’s	International	
Traffic	in	Arms	
Regulations	(ITAR)/US	
Munitions	List	(USML)
Peter	Jeydel
Administers	and	enforces	the	Export	Administration	Regulations	
24
Overview	– OFAC
Geographic
sanctions	programs,	
e.g.	Cuban	Assets	
Control	Regulations,	
Iranian	Transactions	
and	Sanctions	
Regulations	
Targeted	sanctions,	
e.g.	Foreign	
Narcotics	Kingpin	
Sanctions	
Regulations,	WMD	
Trade	Control	
Regulations	
Unique sanctions,	
e.g.	Cyber-Related	
Sanctions	
Regulations,	Russia	
Sectoral	Sanctions	
Identifications	(SSI)	
List,
Specially	Designated	
Nationals	and	
Blocked	Persons	
(SDN)	List
Peter	Jeydel
Administers	and	enforces	regulatory	regimes	at	31	CFR	Ch.	V
25
Agenda
BIS	Overview
Comparison	
BIS-OFAC
Mission	and	
Jurisdiction
Enforcement
Financial	
Sector	Risk
Case	Study
Key	Take	
Aways,	Q&A
26
Mission	/	Approach
§ BIS falls	under	the	Commerce	Dept.	
§ Mission	to	promote	foreign	trade	within	confines	of	
US	law
§ Primarily	impacts	manufacturing/tech	industries	
§ Licensing	often	relatively	quick	and	simple
§ Relatively	well	staffed
§ OFAC falls	under	the	Treasury	Dept.	
§ OFAC’s	historical	mission	to	cut	off	trade	with	
enemy	states,	primarily	through	the	US	financial	
sector	
§ Staffing	shortages
§ Licensing	process	often	time	consuming
§ These	OFAC	stereotypes	are	improving	but	still	exist	
27
Peter	Jeydel
BIS	Jurisdiction
Exports,	reexports and	
transfers	(in-country)	of	goods,	
software	and	technology	
(“item	/	destination”	controls)	
••Traded	from	the	US	
••Traded	from	abroad	with	US-
origin	content	
End-use	/	end-user	controls
••WMD	proliferation	
••Nuclear	sector	
••Missiles	/	UAVs	
••Military	end-uses/end-users	
••Targeted	sanctions	
Peter	Jeydel
Regulates	trade	worldwide,	not	just	with	sanctioned	countries	
28
OFAC	Jurisdiction
Primary	sanctions:	prohibitions	
directly	enforceable	under	US	
law	
••US	persons	
(citizens/permanent	residents,	
entities	organized	under	US	
law,	any	individual/entity	
physically	located	in	the	US)		
••Foreign	subsidiaries	(not	
technically	subject	to	all	OFAC	
prohibitions)	
••Property	subject	to	US	
jurisdiction	(not	applicable	in	all	
OFAC	programs)	
Secondary	sanctions
••Cut	off	“listed”	foreign	persons	
from	the	US	market	and	
financial	system	by	imposing	
restrictions	on	US	persons	
Peter	Jeydel
29
Agenda
BIS	Overview
Comparison	
BIS-OFAC
Mission	and	
Jurisdiction
Enforcement
Financial	
Sector	Risk
Case	Study
Key	Take	
Aways,	Q&A
30
BIS	Enforcement
§ Civil,	administrative	and	criminal	authorities	
§ BIS	can	arrest	you;	OFAC	cannot	(FBI	or	other	
agencies	do	that	for	them)	
§ Tips	from	industry,	US	customs,	other	law	enforcement	
agencies,	intelligence	community,	independent	sources
§ Administrative	penalties	(licensing	restrictions)	
§ Entity	List	
§ Denied	Persons	List	
§ Unverified	List	
31
Peter	Jeydel
Question	for	Attendees
32
Submit	your	answer	in	
the	poll	window	in	the	
Control	Panel
In	your	automated	sanctions	screening,	
do	you	include	BIS-issued	lists?	
Yes
No
Don’t	know
Not	applicable
Saskia
Rietbroek
32
OFAC	Enforcement
§ No	criminal	investigative	authority	- refer	
criminal	cases	to	Dept.	of	Justice;	
§ Large	proportion	(but	not	all)	cases	are	financial	
sector;	
§ Cases	stem	from	mandatory	financial	sector	
reporting,	intelligence	community	and	even	press	
reports	.
Peter	Jeydel
33
Similarities	in	Enforcement	– BIS/OFAC
§ Strict	liability	(no	knowledge	or	intent	required)	for	most	
civil/administrative	enforcement	
§ Broad/discretionary	application	of	rules	
§ Courts	defer	to	agency	interpretations	of	regulations
§ Most	cases	settled,	not	litigated	
§ Little	“case	law”	or	“precedent”	
§ Potential	(but	not	guaranteed)	leniency/credit	for	timely	
voluntary	disclosure,	cooperation	and	remediation	
§ Both	agencies	decline	formal	enforcement	action	for	
vast	majority	of	voluntary	disclosures	
§ Large	proportion	of	cases	involve	interagency/foreign	
cooperation		
Peter	Jeydel
34
Agenda
BIS	Overview
Comparison	
BIS-OFAC
Mission	and	
Jurisdiction
Enforcement
Financial	
Sector	Risk
Case	Study
Key	Take	
Aways,	Q&A
35
BIS	Financial	Sector	Risk
••UK	financial	firm	designated	in	2011	for	
involvement	in	aircraft	leasing	to	Iran/Syria	(A.P.	
Finance	Ltd.)	
Entity	List	criteria	include	
supporting/financing	activities	
contrary	to	US	national	security	/	
foreign	policy	interests	
••Includes	financing	and	other	trade-related	
services	
General	Prohibition	10:	acting	
with	knowledge	a	violation	has	
occurred	or	is	about	to	occur
••Prohibits	US	persons	from	knowingly	financing	
or	supporting	certain	types	of	transactions	
without	a	required	BIS	license	
General	Prohibition	7	/	Section	
744.6:	
••Conspiracy	/	accomplice	liabilityOther	Risks
Peter	Jeydel
36
Example
ING	Bank	
Aviation	Services	
International	BVBIS
Investigation
Iranian	clients
Trade-services
Procurement	
dual-use	goods
OFAC
Investigation
DOJ
Investigation
Peter	Jeydel
37
BIS	Sanctions	Enforcement
Part	746	restrictions	on	trade	
with	sanctioned	destinations
••Cuba
••Iran
••Syria
••Sudan
••N.	Korea
••Crimea,	and
••Russian	oil/gas	industry	
Part	744	end-user	/	end-use	
controls	
••Nuclear	end-uses	
••Missile/rocket	/UAV	end-
uses
••Chemical	/	biological	
weapons	end-uses	
••China	military	end-uses
••Russia/Venezuela	military	
end-users	/	end-uses	
••Certain	SDNs	
••Entity	List	/	Unverified	List	
Peter	Jeydel
38
Agenda
BIS	Overview
Comparison	
BIS-OFAC
Mission	and	
Jurisdiction
Enforcement
Financial	
Sector	Risk
Case	Study
Key	Take	
Aways,	Q&A
39
BIS/OFAC	Joint	Enforcement	- Weatherford
Swiss	oilfield	
services	company	
Complex	2013	
settlement:	DoJ,	
SEC,	OFAC,	BIS	and	
S.D.	Texas	
Bribery,	accounting	
violations,	export	
controls	and	
sanctions	
Two	deferred	
prosecution	
agreements	
One	settled	civil	
complaint	against	
parent	company	
Three	criminal	plea	
agreements
Two	administrative	
settlements	by	
subsidiaries
Peter	Jeydel
40
Agenda
BIS	Overview
Comparison	
BIS-OFAC
Mission	and	
Jurisdiction
Enforcement
Financial	
Sector	Risk
Case	Study
Key	Take	
Aways,	Q&A
41
Key	Take	Aways
§ BIS	administers	"export	controls"	;	OFAC	administers	
"sanctions	programs"
§ BIS	primarily	regulates	the	manufacturing	and	tech	
sectors,	but	BIS/EAR	risks	are	present	in	the	financial	
sector	as	well	
§ BIS	focuses	on	"items"	-- goods,	software	and	
technology;	OFAC	focuses	on	persons,	property,	
transactions
§ Both	regulate	through	licensing	requirements
§ Both	work	together	to	regulate	commerce	according	to	
US	national	security	and	foreign	policy	priorities
42
Your	Questions
Type	your	question	in	
the	question	box	and	
press	“Send”
43
SanctionsAlert.com	thanks	you	for	attending
Please	stay	logged	in	for	brief	announcements
Saskia
Rietbroek
44
Next	Live	Webinar:
December	1
Compliance	Processes	and	
Procedures	That	May	Help	
Reduce	Criminal	and	
Regulatory	Sanctions	Problems
Register	at
45
An	independent	source	of	
knowledge,	delivering	vital	
compliance	training	worldwide
46
Become	a	Member	Now
Special	Membership	Offer	valid	until	Dec.	1,	2016
$885	per	year	(you	save	$100).	
T:	305	433	7187
Email:	helpdesk@sanctionsalert.com
Web:	http://sanctionsalert.com/membership/membership/
We	hope	this	SanctionsAlert.com	webinar	
helped	your	compliance	program	
SanctionsAlert.com Members	can	attend	a	
recorded	version	of	this	webinar	at	
SanctionsAlert.com.	
Please	help	us	improve	our	webinars	by	
answering	the	brief	survey	which	starts	when	
you	close	this	window.
Thank	you.	Please	stay	in	touch.
Saskia Rietbroek:	sr@sanctionsalert.com Saskia
Rietbroek
47

More Related Content

Viewers also liked

NONSTOP_PRESENTATION_PACKAGING
NONSTOP_PRESENTATION_PACKAGINGNONSTOP_PRESENTATION_PACKAGING
NONSTOP_PRESENTATION_PACKAGINGAntonis Vaporidis
 
4.O θυμός του Aχιλλέα
4.O θυμός του Aχιλλέα4.O θυμός του Aχιλλέα
4.O θυμός του Aχιλλέαolgaporpori
 
Scan 20150126 193218753
Scan 20150126 193218753Scan 20150126 193218753
Scan 20150126 193218753SARAEDITF
 
Norman CV with Refference
Norman CV with RefferenceNorman CV with Refference
Norman CV with RefferenceNorman Jumbe
 
Oι συνθήκες ζωής των υπόδουλων
Oι συνθήκες ζωής των υπόδουλωνOι συνθήκες ζωής των υπόδουλων
Oι συνθήκες ζωής των υπόδουλων
olgaporpori
 
Η επανάσταση στα νησιά του Αιγαίου
Η επανάσταση στα νησιά του ΑιγαίουΗ επανάσταση στα νησιά του Αιγαίου
Η επανάσταση στα νησιά του Αιγαίου
olgaporpori
 
“Song” by lady mary wroth
“Song”  by lady mary wroth“Song”  by lady mary wroth
“Song” by lady mary wroth
vickyquiroga
 

Viewers also liked (8)

NONSTOP_PRESENTATION_PACKAGING
NONSTOP_PRESENTATION_PACKAGINGNONSTOP_PRESENTATION_PACKAGING
NONSTOP_PRESENTATION_PACKAGING
 
4.O θυμός του Aχιλλέα
4.O θυμός του Aχιλλέα4.O θυμός του Aχιλλέα
4.O θυμός του Aχιλλέα
 
Scan 20150126 193218753
Scan 20150126 193218753Scan 20150126 193218753
Scan 20150126 193218753
 
Thulasinath CV_IM
Thulasinath CV_IMThulasinath CV_IM
Thulasinath CV_IM
 
Norman CV with Refference
Norman CV with RefferenceNorman CV with Refference
Norman CV with Refference
 
Oι συνθήκες ζωής των υπόδουλων
Oι συνθήκες ζωής των υπόδουλωνOι συνθήκες ζωής των υπόδουλων
Oι συνθήκες ζωής των υπόδουλων
 
Η επανάσταση στα νησιά του Αιγαίου
Η επανάσταση στα νησιά του ΑιγαίουΗ επανάσταση στα νησιά του Αιγαίου
Η επανάσταση στα νησιά του Αιγαίου
 
“Song” by lady mary wroth
“Song”  by lady mary wroth“Song”  by lady mary wroth
“Song” by lady mary wroth
 

Similar to Nov10_2016_presentationV3

Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App House
TechSoup
 
SMi Group's Cyber Security in Defence Masterclass
SMi Group's Cyber Security in Defence Masterclass SMi Group's Cyber Security in Defence Masterclass
SMi Group's Cyber Security in Defence Masterclass
Dale Butler
 
FinCEN’s Anti-Money Laundering Developments: A 2015 Update LIVE Webcast
FinCEN’s Anti-Money Laundering Developments: A 2015 Update LIVE WebcastFinCEN’s Anti-Money Laundering Developments: A 2015 Update LIVE Webcast
FinCEN’s Anti-Money Laundering Developments: A 2015 Update LIVE Webcast
Thomas LaPointe
 
Fraud Investigation Case study
Fraud Investigation Case studyFraud Investigation Case study
Fraud Investigation Case study
CGI
 
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Blancco
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Withum
 
S&S En
S&S EnS&S En
S&S En
Frank Lahti
 
Supplier Quality Management: Best Practices and Practical Insights in 2015 LI...
Supplier Quality Management: Best Practices and Practical Insights in 2015 LI...Supplier Quality Management: Best Practices and Practical Insights in 2015 LI...
Supplier Quality Management: Best Practices and Practical Insights in 2015 LI...
Thomas LaPointe
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
Jeremy Quadri
 
TFS Brochure 7_FinancialTrading
TFS Brochure 7_FinancialTradingTFS Brochure 7_FinancialTrading
TFS Brochure 7_FinancialTradingAnthony Whittle
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_FinancialAnthony Whittle
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
PECB
 
Coit20263 information security management assignment 2
Coit20263 information security management assignment 2Coit20263 information security management assignment 2
Coit20263 information security management assignment 2
Sandeep Ratnam
 
The growing mandatory requirements to protect data- secure PostgreSQL
The growing mandatory requirements to protect data- secure PostgreSQLThe growing mandatory requirements to protect data- secure PostgreSQL
The growing mandatory requirements to protect data- secure PostgreSQL
Rajni Baliyan
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today
Ghostery, Inc.
 
Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Tony Richardson CISSP
 
Setting course for the future the road ahead for charities and volunteering
Setting course for the future the road ahead for charities and volunteeringSetting course for the future the road ahead for charities and volunteering
Setting course for the future the road ahead for charities and volunteering
NCVO - National Council for Voluntary Organisations
 
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
SurfWatch Labs
 

Similar to Nov10_2016_presentationV3 (20)

Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App House
 
SMi Group's Cyber Security in Defence Masterclass
SMi Group's Cyber Security in Defence Masterclass SMi Group's Cyber Security in Defence Masterclass
SMi Group's Cyber Security in Defence Masterclass
 
FinCEN’s Anti-Money Laundering Developments: A 2015 Update LIVE Webcast
FinCEN’s Anti-Money Laundering Developments: A 2015 Update LIVE WebcastFinCEN’s Anti-Money Laundering Developments: A 2015 Update LIVE Webcast
FinCEN’s Anti-Money Laundering Developments: A 2015 Update LIVE Webcast
 
Fraud Investigation Case study
Fraud Investigation Case studyFraud Investigation Case study
Fraud Investigation Case study
 
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
 
S&S En
S&S EnS&S En
S&S En
 
Supplier Quality Management: Best Practices and Practical Insights in 2015 LI...
Supplier Quality Management: Best Practices and Practical Insights in 2015 LI...Supplier Quality Management: Best Practices and Practical Insights in 2015 LI...
Supplier Quality Management: Best Practices and Practical Insights in 2015 LI...
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
TFS Brochure 7_FinancialTrading
TFS Brochure 7_FinancialTradingTFS Brochure 7_FinancialTrading
TFS Brochure 7_FinancialTrading
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_Financial
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Coit20263 information security management assignment 2
Coit20263 information security management assignment 2Coit20263 information security management assignment 2
Coit20263 information security management assignment 2
 
sc_can0315_28373
sc_can0315_28373sc_can0315_28373
sc_can0315_28373
 
The growing mandatory requirements to protect data- secure PostgreSQL
The growing mandatory requirements to protect data- secure PostgreSQLThe growing mandatory requirements to protect data- secure PostgreSQL
The growing mandatory requirements to protect data- secure PostgreSQL
 
The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today The State of Marketing Technology Today
The State of Marketing Technology Today The State of Marketing Technology Today
 
Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Meeting your information security obligations april 2012
Meeting your information security obligations april 2012
 
Setting course for the future the road ahead for charities and volunteering
Setting course for the future the road ahead for charities and volunteeringSetting course for the future the road ahead for charities and volunteering
Setting course for the future the road ahead for charities and volunteering
 
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
 

Nov10_2016_presentationV3