Human error remains a significant security threat to businesses of all sizes.
An endpoint is any device connected to your enterprise network — laptops, PCs, and printers, for example.
The 21st Annual GIPS Standards Conference was held in San Diego on September 14-15 with over 300 attendees. A number of topics were covered, including important aspects of the proposed 2020 GIPS Standards updates.
Cyber threats continue to increase year over year and attack techniques are more sophisticated than ever.
The SEC has demonstrated ongoing commitment to developing its technological capabilities for detecting financial crimes is impacting investment advisers across the industry. Here are 5 things investment advisers need to know.
Communications record keeping obligations which include phone taping, are likely to prove particularly challenging when it comes to the cost of compliance and complexity of systems requirements.
ACA Compliance Group's 2017 Spring Compliance Conference was held from May 3rd through 5th at the luxurious PGA National Resort & Spa in Palm Beach Gardens, Florida.
Financial institutions (“FI’s”) are required by Anti-Money Laundering (“AML”) regulations to perform risk-based due diligence for their customers and prospective customer. This due diligence is referred to as Customer Due Diligence (“CDD”).
The electronic communication mediums that investment advisers use to conduct business continue to evolve, posing a challenge to the compliance community’s ability to retain and adequately supervise the appropriate books and records.
Earlier this month, ACA announced that it is set to acquire Ashland Partners & Company, LLP's GIPS compliance verification and performance practice. When this transaction closes in June, ACA Performance Services will offer the most experienced team of GIPS compliance verifiers in the world, servicing over 1,000 clients annually, including 49% of the top 100 managers of institutional assets worldwide (as determined by Pensions & Investments magazine).
Cyber incidents can have devastating effects on business of all sizes. A breach or malware attack could cripple business operations, lead to financial losses, expose sensitive data, and cause reputational damage.