To KYD or Not to KYD: It Is Hardly a Question

The Protiviti View

Matt McGivernShaheen DilBy Matt McGivern and Shaheen Dil,
Managing Directors

Protiviti’s Data and Analytics practice

The importance of “know your customer,” or KYC, activities to any AML compliance program is well known. A much less known – but equally crucial – component of an AML program is “know your data,” or KYD, which feeds into KYC and other AML compliance modules.

To run their AML compliance programs, financial firms use a variety of software to review customers, analyze transactions to identify suspicious activities and provide analytical and research capabilities to support suspicious activity reports (SARs). Both SARs and KYC rely on the quality and accessibility of data, which requires knowledge of that data – where it resides, who uses it, what actions are performed on it, etc. While over-stretched AML departments may not want to hear that they now need now to be more proficient in data management, KYD activities are needed…

View original post 361 more words

A Country Default: What Does It Mean?

The Protiviti View

Eyes have been on Greece and its debt crisis for a long time. The downward spiral of the Greek economy began some 35 years ago with fiscal policies that expanded the country’s debt-to-GDP ratio four-fold over the ensuing decade and into the early 1990s. After stabilizing its economy and holding the debt-to-GDP ratio relatively constant until the advent of the Great Recession, Greece has experienced a 50 percent increase in the ratio to its present unsustainable level. Structural weaknesses in the economy, the recent default on debt obligations, and lost confidence among lenders regarding Greece’s ability to take responsibility for its fiscal issues have led to the present crossroads.

After the initial 2010 bailout and subsequent bailout extensions, coupled with extensive debt restructuring involving principle reductions, extended maturities and lower rates, the present crisis has been marked by weeks of debate and posturing between Greece and the eurozone in which…

View original post 1,052 more words

Strategic BYOD: “D” Is NOT for Doom

The Protiviti View

Jeff SanchezBy Jeff Sanchez, Managing Director
IT Security and Privacy

For IT security managers, Bring Your Own Device, or BYOD, is a four-letter acronym guaranteed to strike fear into their hearts by conjuring up visions of a data proliferation doomsday. But it doesn’t have to be that way. There is a way to create business benefits through the use of individuals’ devices while still maintaining control on data and reducing security and privacy risk.

The risks posed by employee devices with ever-increasing capabilities, such as tablet PCs and smartphones, are hardly new. Financial firms and other highly-regulated industries with a duty to protect sensitive customer data have been concerned about this for years, and many firms have BYOD policies in place to control the risk of data proliferation. But to be truly successful in this effort, organizations need to do more: They need to design and implement a BYOD strategy that…

View original post 380 more words