Results for

Sort by:
  • Whitepaper
    March 22, 2022
    Financial institutions face significant legal, regulatory, operational and reputation risks related to their implementation of the Russian-Belarussian sanctions and the world events that have led to these sanctions. These risks have implications across the financial crime compliance programme and, more broadly, the entire organisation. Not all financial institutions will face the same challenges…
  • Whitepaper
    May 1, 2022
    “To put it bluntly, will companies enact courageous ESG policies only when it does not hurt?…This is a moment of truth. Stakeholders have been increasingly mobilised to question the premises of companies’ professed ESG activities. All too frequently, corporations and their executives engage in marketing or obfuscation of what they’re actually doing — what could more accurately be called ‘ESG-…
  • Podcast
    May 4, 2022
    The fear of a quantum cryptographic apocalypse has been with us since the 90s and has launched quite a few careers and companies. Post-Quantum, no relation to this show, has been developing end-to-end solutions for quantum-secure communications since 2009, and they recently participated in a year-long proof of concept with NATO. Join host Konstantinos Karagiannis for a chat on practical solutions…
  • Blogs
    March 25, 2021
    Is Your Organisation Underpaying or Overpaying its Employees? No organisation wants to be headline news for underpaying its employees. However, many businesses are being publicly ostracised for violating enterprise agreements (EAs) in Australia. Not only are EAs incredibly complicated, wage law is also evolving rapidly, with Victoria and Queensland passing legislation in 2020. Unfortunately,…
  • Survey
    April 1, 2021
    In the annual top risks survey conducted by Protiviti and NC State University’s ERM Initiative, retail executives identified pandemic-related government policies as their top risk issue for 2021 and beyond. Retailers also listed a deterioration in market and economic conditions, and talent retention and acquisition challenges among their top risks. Overall, the survey results reveal significant…
  • Survey
    April 1, 2021
    In the annual top risks survey conducted by Protiviti and NC State University’s ERM Initiative, technology, media and telecommunications executives ranked pandemic-related government policies, adoption of digital technologies, data privacy and information security, cyber threats, and diminished economic activity among their top risk issues for 2021 and beyond. The survey results reflect…
  • Whitepaper
    January 28, 2022
    As we consider the compliance challenges that will be top of mind for financial institution compliance officers in 2022, one thing is very clear: More and more often, they are being expected to play a significant role in managing risks that extend beyond what we have traditionally considered the purview of compliance. Coupling this reality with ongoing innovation, both in the industry and in…
  • Podcast Transcript
    May 4, 2022
    The fear of a quantum cryptographic apocalypse has been with us since the 90s and has launched quite a few careers and companies. Post-Quantum, no relation to this show, has been developing end-to-end solutions for quantum-secure communications since 2009, and they recently participated in a year-long proof of concept with NATO. Join host Konstantinos Karagiannis for a chat on practical solutions…
  • Podcast
    April 28, 2022
    The current and future state of risk analytics is bedrock to empowering the compliance function’s forward-looking agenda. With the evolution of enterprise risks, advancements in analytics, and the ever-morphing regulatory landscape, compliance can be transformed by being further data driven, and monetise the deployment of advanced analytics in empowering intelligent decision-making and risk…
  • Newsletter
    September 8, 2021
    Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly. By contrast,…
Loading...