Loading package members
Will an ICA qualification get me a job? (14268)
Words by Lily Harwood-Millar
How do I land my first compliance or AML role? (11223)
Words by Phil Perchard
EBA proposed guidelines on the risk based approach and CDD risk factors (5746)
Words by Roland Guennou
Interpreting ICA Assignment Feedback (5739)
Words by Dave Robson
5 reasons why your employer should sponsor you to do an ICA qualification (5100)
Words by Lily Harwood-Millar
24 October 2017
Privacy and Switzerland are often seen as synonymous, and whilst Switzerland is no longer seen as a secrecy haven, protecting client data is still a badge of honour for the country. Data protection law in Switzerland has a level of protection like that of the EU Data Protection Directive, and in some respects, is reported to even go beyond EU Law, especially in relation to the protection of data pertaining to legal entities. But in an age of cyber-enabled crime, can Switzerland ensure that data is secure?....More
Words by Sarah Reynolds
28 September 2017
Anonymity, discretion and confidentiality: terminology often associated with shell companies incorporated in jurisdictions with high secrecy laws. However, does the virtual economy – notably Bitcoin, the de facto currency of choice – facilitate the very same mechanisms that criminals attempt to abuse? This brief article will explore some of the key similarities between a shell company and a Bitcoin address, with a view to answering the question ‘Are Bitcoin addresses shell companies in disguise?’....More
Words by Kane Pepi
22 September 2017
New York has been capturing the imagination and the attention of the world for well over 100 years. It’s a city like no other; its intoxicating pull is felt by both residents and non-residents alike. It has also long been a source of inspiration for those looking to fight crime: in the Superhero world, Marvel’s Spiderman, The Avengers and The Defenders all call New York home. Some people believe that Metropolis and Gotham, home to Superman and Batman, are also based on New York.....More
Words by Simone Jones
19 January 2017
A large number of global information, communication and technology (ICT) companies are based in Ireland.....More
Words by Guillermo Iribarren
17 December 2015
With the rising cost of data breaches and the rising volume of attacks, cyber security was one of the highest profile issues facing businesses in 2015. Cyber attacks are currently believed to cost business anywhere between $400-500bn a year and show little sign of abating.....More
Words by James Thomas
2 November 2015
The details that have emerged since the 21 October cyber attack on TalkTalk raise some serious questions not only for the broadband provider itself but for any business holding sensitive customer information.....More
Words by James Thomas
17 January 2013
Can traditional risk management frameworks protect a firm from the ever increasing cyber threat? What role do financial crime systems and controls, requirements, business continuity, data loss prevention and traditional fraud prevention techniques play in the defence against sophisticated and targeted cyber attacks?....More
Words by Andy Caines
26 November 2012
How some websites are using a combination of crowd sourcing, Cloud services and Internet marketing techniques to sell illegal system access and other criminal cyber services online.....More
Words by Mark Johnson
14 September 2012
A Jumbo Jet only travels fifty times faster than a horse and buggy.....More
Words by Mark Johnson
10 May 2012
I recently delivered a presentation in Stockholm to corporate staff on the risks arising from poor social media use. During the Q&A I was asked about guidance for parents and teachers in relation to child online activities. The audience, drawn from a leading Swedish high-tech firm, told me that an estimated 50% of Swedish three-year-olds are regular Internet users with their own online identity in some shape or form. I found this statistic alarming.....More
Words by Mark Johnson
11 April 2012
After 40 years teaching and training in universities and professional bodies, I was recently asked a question by a student about how, after so much time, it was possible to maintain keenness and enthusiasm about the subject matter of the class.....More
Words by Bill Howarth
13 March 2012
TRMG has been working with Legal and General to produce that firm’s Digital Criminal 2012: CyberSafety report. One of the report’s key findings is that criminals are targeting social media users online by setting up fake profiles, ‘friending’ potential targets and then tricking them into giving up sensitive personal information. The information gleaned in this manner is being used to commit identity theft, fraud and to plan burglaries.....More
Words by Mark Johnson
RESOURCES
QUICK LINKS
ICA INFORMATION
LEGAL INFORMATION
MAILING LIST SIGN-UP
Complete this form to join the ICA Mailing List
*These updates may come from us or our training partners.
© International Compliance Association I Company registration 4429302 I Registered office 5th Floor, 10 Whitechapel High Street, London, E1 8QS, United Kingdom