ebook img

Let ACA become the heavy lifter for your compliance tasks PDF

59 Pages·2017·15.67 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Let ACA become the heavy lifter for your compliance tasks

Let ACA become the heavy lifter for your compliance tasks We can help with: • Compliance program reviews • Anti-Money laundering testing • Supervisory control testing • Written supervisory procedures • Email surveillance • Marketing reviews • Cybersecurity reviews • Trade surveillance For more information on ACA Compliance Group, contact Dee Stafford by phone at +1 (561) 628-5288 or by email at [email protected] acacompliancegroup.com FINRA-2016-Graphic-print.pdf 1 3/31/2017 10:33:55 AM U N L E A S H S O C I A L B U S I N E S S C M Y CM MY CY CMY K There are thousands of alternative investments — and they’re not all created equal. How do you choose and manage ongoing client expectations? Alternative Investment Insight through Training, Let AI Insight help. Education and Increased Efficiency Hard-to-find product information... AT YOUR FINGERTIPS • Review independent, unbiased program summaries for hundreds of alternative investments. • Create powerful comparison reports based on offering price, distribution rates, compensation, fees, net proceeds and more. • Keep up-to-date with the financial performance of products with report data directly from quarterly and annual filings. Set custom email alerts to stay abreast of changes throughout the investment’s lifecycle. Customizable training... MADE EASY • Provide advisors with regulatory-compliant training on product features, risks and suitability using prospectus- and PPM-based modules. • Create customized training for each approved product on the platform, incorporating firm-specific requirements. • Review all aspects of offering fee structures to assist with DOL Best Interest Contract Exemption requirements. Centralized compliance documentation... STREAMLINES YOUR COMPLIANCE EFFORTS • Document your training for advisors per regulatory notices and support your DOL fiduciary rule requirements for reasonable compensation review. • Download on-demand compliance reports, including consolidated training and research logs, failed question analysis and current or past selling agreements  Compliance Program Reviews  IA / BD Formation & Filings  Risk Management Assessments  Ongoing Reviews of Employee and  AML Policy & Procedures Proprietary Trading  AML Regulatory Response  Onsite Inspection Support  AML Lookbacks, BAU Transactions  13F, 13G, and 13H Report Filings  Forms and WSPs  IARD Administration  Regulatory Filings Support and  Expense Allocation Practices Reviews  Supervision  SEC and State Registrations  Ongoing Compliance Support Contact BCS by phone at (503) 670-7772 or email [email protected] Visit Bates Group at Booth # 51    www.batesgroup.com FINRA ANNUAL CONFERENCE Bloomberg, the global business and financial information and news leader, gives influential decision makers a critical edge by connecting them to a dynamic network of information, people and ideas. The company’s strength — delivering data, news and analytics through innovative technology, quickly and accurately — is at the core of the Bloomberg Professional® service. For more information, visit bloomberg.com/vault or request a demo. ©2017 Bloomberg L.P. S777696445 0417 Cybersecurity and Compliance Solutions Investors put their trust in the 635,000 broker-dealers regulated by FINRA and the SEC. That trust includes their fi nancial assets, and their highly confi dential information placed in broker-dealer custody. Identifi cation Services »Asset Inventory and Risk The objective of compliance with FINRA rules and SEC regulations is not to pass Classifi cation an audit – it is to earn your investors’ trust by effectively protecting fi nancial and »Threat Notifi cations information assets in your custody. »Security Scanning, Testing, and Audits have identifi ed key areas that are essential for broker-dealers to manage Monitoring cybersecurity risk. »Third Party Vendor Risk Management »The need for cybersecurity governance with strong executive leadership Protection Services »Identifi cation and assessment of risks to systems, networks and information »Security Awareness Training »Endpoint Protection »Implementation of controls to prevent and detect unauthorized access »Multi-Factor Authentication (2FA) »Development, implementation and testing of incident response plans Detection Services »Contractual management of 333rrrddd pppaaarrrtttyyy rrriiissskkk ffrroomm sseerrvviiccee pprroovviiddeerrss »Intrusion Detection and Prevention »Security training programs for employees and customers »Managed Firewall/UTM »Ongoing awareness of concerns and threats in the industry Response and Recovery Services »Insurance coverage for cybersecurity-related events »Incident Response Support »Recovery Services BlueAlly has the people, processes and technology to provide cost-effective, managed Supporting Services security services to broker-dealers that address each of these key areas. »General Call Center Support BlueAlly has subject matter experts to assist you with establishing governance, risk »Issue Tracking assessment, controls implementation, planning for incident response, managing 3rd party »Analytics & Metrics risk, executive training, threat intelligence and guidance regarding insurance. Consulting Services BlueAlly also provides a 7x24x365 security operations center that continuously monitors the Internet for threats, monitors our customers for indications of compromise, and »FINRA, SEC, NYDFS, PCI-DSS assists our customers with prompt response and recovery of security events. Compliance »Gap Analysis and Risk Assessments BlueAlly does this with cost-effective starter service subscriptions that can grow with »Policy Development your business. »Virtual CISO Establishing and operating an effective cybersecurity program will protect the fi nancial and information assets that your investors have placed in your custody and earn their trust. [email protected] | 1.888.768.2060 8609 Westwood Center Drive, Suite 100 We are BlueAlly. We can help you succeed. BlueAlly simplifi es cybersecurity Vienna, VA 22182 compliance. 1255 Crescent Green, Suite 300, Cary, NC 27518 2160 Kingston Ct., Ste D, Marietta, GA 30067 About BlueAlly Headquartered in the Tysons technology corridor of metropolitan Washington, DC, BlueAlly is a premier provider of IT and Managed Services to many Fortune 500 companies, including three of the top fi ve media companies, six of the top ten manufacturers, four of BlueAlly, BlueAlly Direct, BlueAlly Technology Solutions and BlueAlly the top ten fi nancial services fi rms and the world’s top network infrastructure company. BlueAlly helps our clients achieve and manage Professional Services are trademarks owned by BlueAlly, LLC. an optimized and scalable IT portfolio and Security Program, by providing Infrastructure Optimization Solutions, Managed Network All other referenced brands, product names, service names and/or Services, Managed Security Services and Contingent Workforce Solutions. BlueAlly is an NMSDC certifi ed minority owned business trademarks are the property of their respective owners. enterprise and has a formal initiative in place to engage and mentor various certifi ed minority, local, small and disadvantaged business 2017 BlueAlly, LLC. All rights reserved. 201704 enterprises. www.blueally.com 1.888.768.2060 AccessCompliance WHERE CONTENT MEETS TECHNOLOGY VISIT US AT BOOTH #36 OR ONLINE AT ACCESSCOMPLIANCE.COM World-Class Software Solutions Compliance & Ethics Software Development E You own the Source Code & IP - No Licensing Compliance, Ethics, & Risk Management Data Governance Business Process Management Centralized Data & Data Localization Business Rules, Policy, & Exceptions Management Cloud, Extranet, Intranet, & Network Management Decision Support Systems (DSS) Data Warehouse Development Knowledge Management & Collaboration Tools Data Discovery, Storage, & Processing Audit Trails, Archiving, & Retention Internal Controls Management Best Practices Library Custom Workflows, Dashboards, & Reporting Change Management Business Intelligence, Analytics, & Metrics Tracking Incident Management & Reporting Project & Program Management Real-Time Data & Predictive Analytics Mergers & Acquisitions (M&A) Management Risk Analytics, Assessments, & Alerts Digital Assets & Document Management Conflict of Interest Management Compliance Training Platforms ISO 19600 & ISO 31000 Compliant Development Enterprise System Integrations Compliance with HIPAA, FDA, SOX, PCI-DSS, PA-DSS, & More Legacy System Modernizations & Migrations IT Compliance Information Security (InfoSec) Other Database Management Network, Server, & Applications Security Backup & Recovery Secure Socket Layer / Transport Layer Security (SSL / TLS) Data Replication, Migration, & Integrity Identity Access Management (IAM) Database Conversions & Virtualizations User Authentication, Authorization, & Provisioning Bring-Your-Own-Everything (BYOx) Management Role-Based Access Control (RBAC) Mobile Device Management (MDM) Two-Factor & Multifactor Authentication (2FA / MFA) Activity Monitoring & Fraud Prevention One-Time Passwords (OTP) & Single Sign-On (SSO) Social Media Monitoring Biometrics Programming Application & System Performance Management Tokenization & Cryptography Application Maintenance & Re-engineering End-to-End (E2E) & Point-to-Point (P2P) Encryptions EInntteegrrpartiesed FWeeodrkbpalcakc eM Manaangaegmemenetn (tE SFyMst)ems (IWMS) KInntoruwslieodng Per eDviescnotivoenr y& i nD eDtaetcatbioanse Ssy (sKteDmDs) (IPS / IDS) OMP-1216 Enterprise Asset Management (EAM) Systems Firewalls, Antivirus, Anti-Spyware, & Anti-Malware GLA-C F-L 10167 West Sunrise Blvd, STE 200, Plantation, FL 33322 Voice (954) 342-5676, Fax (305) 832-5987 [email protected], www.chetu.com

Description:
NetBeans, Eclipse, Glass Fish. Weblogic, Websphere, .. INCIDENT RESPONSE. If you suspect malicious activity, insider or outsider, Roka will.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.