2018 Cyber Risks: 4 Key Threats CISOs are Worried About

Chief information security officers (CISOs) now play an integral role in business, not just in securing internal data, but as key organizational decision makers. The shift makes sense, as digital transformation continues to present businesses with new cybersecurity and data protection challenges. Just how big are those challenges? In partnership with the Ponemon Institute, Opus [...]
  • January 11, 2018
  • Pat McParland
  • 11 Best Practices for Third-Party and Supplier Risk Management

    Third-party and supplier risk management has come into the spotlight this year, as businesses face growing concerns about a third-party data breach and cyber security regulations tighten. Despite the increasing threats, setting up an effective risk management program is a proven way to get ahead of looming cyber security challenges and increase business growth. Here […]

    • December 22, 2017
    • David Giat
  • What We Learned at RegTech New York: 3 Key Themes for Financial Institutions

    2018 is almost here, along with several much-anticipated regulations. Though it can be complex, technical, and let’s face it, sometimes even a little dry, compliance isn’t something that can be overlooked. In November, the Opus team had the opportunity to attend the 2017 RegTech New York Summit, a sister conference to RegTech London. It was […]

    • December 20, 2017
    • Sara Rona
  • International Anti-Corruption Day: How Companies Can Fight Back Against Bribery & Corruption

    On December 9th, governments, the private sector, NGOs, the media and citizens around the world are joining forces to fight corruption as part of the United Nation’s annual International Anti-Corruption Day. This year’s theme is “United Against Corruption,” in recognition of corruption being a global concern that affects rich and poor countries and businesses and […]

    • December 8, 2017
    • Lee Kirschbaum
  • Regulations at Odds: How Firms are Reacting to Potential MiFid II and GDPR Conflicts

    The Markets in Financial Instruments Directive II  (MiFID II) goes into effect in January 2018 with an emphasis on transparency to help protect investors. But in May 2018, the General Data Protection Regulation (GDPR) also goes live with its own strict requirements and penalties regarding data privacy. This year, the scope for penalties is significantly […]

    • December 6, 2017
  • Uber Hacked: Third-Party Data Breaches Continue to Hit Major Companies

    Last week, Uber disclosed a data breach that occurred at the popular ride-hailing company in October 2016. Hackers stole confidential information of 57 million Uber users globally, including 600,000 U.S. drivers who had their names and driver’s license numbers taken. Much attention, and rightly so, has centered on the extent and type of confidential information […]

    • December 1, 2017
    • Pat McParland
  • Vendor Risk Assessment: 11 Best Practices to Help Manage and Mitigate Third-Party Risk

    A vendor risk assessment, also known as a vendor risk review or a vendor assessment questionnaire, allows your company to gauge the amount of risk involved in your relationship with a third party vendor. Why is a vendor risk assessment so important? It’s the first step in a strong vendor risk management program, and it […]

    • November 22, 2017
    • David Giat
  • 5 Key Benefits of the ISO 37001 Anti-Bribery Standard

    We are privileged to have Leslie Benton, VP for Advocacy and Stakeholder Engagement of CREATe.org, share her thoughts on ISO 37001 and the impact that the global anti-bribery standard can have as companies work to combat bribery. Leslie is also one of the drafters of the standard as a member of the U.S. Technical Advisory […]

    • November 20, 2017
    • Leslie Benton
  • Bank Secrecy Act Compliance: Lessons from the Lone Star Bank AML Violation

    Earlier this month, Lone Star National Bank in Texas was fined $2 million for failure to meet Bank Secrecy Act anti-money laundering requirements from 2010-2014. The U.S. Treasury Department’s Financial Crimes Enforcement Network (FinCEN) determined that Lone Star willfully violated Bank Secrecy Act requirements after taking on a Mexican bank as a customer. Over two […]

    • November 17, 2017
    • Lee Kirschbaum
  • RegTech London Reveals that KYC and GDPR are Top Regulatory Concerns for Financial Institutions

    This October, Opus attended the RegTech Summit for Capital Markets, a one-day event for practitioners of regulatory change organized by the A-Team Group. The COOs, CDOs, CTOs, and heads of regulatory reporting, compliance, and data operations gathered at RegTech London learned about new approaches to regulatory change and innovative technology solutions for today’s regulatory challenges. […]

    • November 7, 2017
    • Ben Gould
  • Preparing for GDPR: Are Companies Overlooking Third-Party Risk?

    This past summer, British pub and hotel chain J.D. Wetherspoon shocked the marketing world by deleting its entire customer email database. Two years after the company’s data was breached, affecting more than 650,000 customers, a spokesperson for Wetherspoon explained that the company “felt, on balance, that we would rather not hold even email addresses for […]

    • November 2, 2017
    • Richard Saville
  • How to Determine the Most Effective Third-Party Risk Management Strategy for Your Company

    If third-party data breaches were once a little-known risk for companies doing business online, they shouldn’t be anymore. A growing number of major companies are making headlines as a result of data breaches caused by third parties, most recently, Hyatt Hotels and Domino’s and Pizza Hut. Though companies are aware of the risk of sharing […]

    • October 27, 2017
    • Dov Goldman
  • Hacks at Domino’s and Pizza Hut Highlight the Growing Costs of Third-Party Data Breaches

    Domino’s and Pizza Hut both delivered bad news to their customers last week as back-to-back third-party data breaches hit the two major pizza chains. And customers felt the impact. Following the Domino’s data breach, customers received spam emails containing personally identifying information obtained from the data breach, lending legitimacy to a targeted phishing attack. At […]

    • October 24, 2017
    • Pat McParland

Next Page »