Discover more about our courses.
ICA is the trusted partner for you and your organisation.
There are downsides to every new technology, and artificial intelligence and machine learning are no exception. Experts discussed the importance for compliance professionals to understand the risks of such tools at Compliance Week’s virtual Cyber Risk & Data Privacy Summit..... More
The cost of living has rocketed – which means firms must prepare for a rise in fraud
This Insight article explores the importance of adaptability as a soft skill for compliance professionals, focusing on the different types of adaptability skills, the reasons why adaptability is so important for compliance professionals and the ways in which to improve upon your adaptability..... More
Arrogance is an unpleasant trait to deal with in our career. It is, however, everywhere. Learning how and when to face it will be a long-term useful skill.
Words matter, as risk and compliance professionals it is vital that this is understood and acted upon. A misunderstanding can lead to a costly mistake so by understanding the nuances of language you can be better placed to communicate well with colleagues and stakeholders..... More
Criminals are always early adopters of new technology; it is up to compliance to ensure they do not gain a foothold in the metaverse.
This Insight article focuses on the recent surge in popularity of NFTs, specifically detailing what NFTs are, the risks associated with them and what the future holds for the technology..... More
The regulation of virtual assets will be high on the agenda at ICA Live: MENA, with a current and a former regulator driving the conversation.
Romance fraud is a crime that often avoids the headlines when compared to tax or credit card fraud, but it is on the rise and can leave victims with not just a loss of money but can also be a big hit to their self-esteem, if not very emotionally damaging. This piece will look at how it happens, how people can protect themselves and also what to do if you or someone you know has been a victim..... More
The release of Transparency International's Corruption Perceptions Index (CPI) is always a significant event in the financial crime compliance calendar, compiling as it does a ranking of perceived corruption across countries around the globe. This year's index will make interesting, if dispiriting, reading for compliance professionals, and this piece argues of the need to look beyond the CPI to inform their own judgements based on curiosity and looking beyond the obvious.
Are you inadvertently contributing to criminality? As we acclimatise to the ‘new normal’, we examine how the global pandemic has helped facilitate unprecedented growth in the UK’s counterfeit market and how compliance professionals utilise their skills to combat it..... More
The UK has completed the process of leaving the European Union. This article is a follow up to a previous piece where the complicated relationship between sanctions and the UK’s transition from the EU was assessed. Here we will look at the reality of post-transition UK sanctions and the new sanctions landscape in the UK.
James Thomas considers fraud risks associated with cryptocurrencies in the context of COVID-19.... More
2020 has been a year that most of us would gladly forget. Nevertheless, as we look towards 2021, it is worth considering the lessons learned over the last 12 months, assessing the evolving landscape, and (where possible) drawing on any positives that have come to light. This article considers some of the main features of fraud in 2020 and highlights potential trends for the coming year.
Cryptocurrency has burst front and center onto the world stage, and we all need to better understand it and the technology behind it. This article will illustrate some of the challenges, even mysteries, of cryptocurrency and highlight the importance of everyone in compliance staying on top of it all..... More
A crisis will bring out the best and worst of society and the current COVID-19 pandemic is no different. A crisis like this challenges us all to consider our actions and how we respond, this article looks at the positive ways that people have responded but also how criminals have sought to take advantage of it, in particular with the rise in identify theft.
The US Data Privacy Shield was in place to protect personal data of EU citizens when transferred out of the EU to the US. The CJEU’s conclusion that the Shield does not provide “essentially equivalent” protection of personal data to that under GDPR and EU law has potentially serious implications, some of which we explore in this analysis..... More
The hack of around 130 high-profile Twitter accounts reveals that nobody is immune from cybercrime. Here’s what you can do to protect your firm’s cyber defences.
With governments around the world having intervened to curtail non-essential travel and social gathering to minimise the spread of COVID-19, more of us than ever are now working from home..... More
Italy, a region in quarantine, is experiencing a spike in attempted cyber-attacks to capture the login credentials of employees working remotely during the coronavirus pandemic. But not all the attacks have been successful, and that’s where the lessons lie.
Unpredictability is the new normal. What does 2018 hold for our industry?.... More
Privacy and Switzerland are often seen as synonymous, and whilst Switzerland is no longer seen as a secrecy haven, protecting client data is still a badge of honour for the country. Data protection law in Switzerland has a level of protection like that of the EU Data Protection Directive, and in some respects, is reported to even go beyond EU Law, especially in relation to the protection of data pertaining to legal entities. But in an age of cyber-enabled crime, can Switzerland ensure that data is secure?
Anonymity, discretion and confidentiality: terminology often associated with shell companies incorporated in jurisdictions with high secrecy laws. However, does the virtual economy – notably Bitcoin, the de facto currency of choice – facilitate the very same mechanisms that criminals attempt to abuse? This brief article will explore some of the key similarities between a shell company and a Bitcoin address, with a view to answering the question ‘Are Bitcoin addresses shell companies in disguise?’.... More
New York has been capturing the imagination and the attention of the world for well over 100 years. It’s a city like no other; its intoxicating pull is felt by both residents and non-residents alike. It has also long been a source of inspiration for those looking to fight crime: in the Superhero world, Marvel’s Spiderman, The Avengers and The Defenders all call New York home. Some people believe that Metropolis and Gotham, home to Superman and Batman, are also based on New York.
Googled it? We offer insight to firms who vet their customers for ‘negative news’ or ‘adverse information’ through various methods of screening..... More
A large number of global information, communication and technology (ICT) companies are based in Ireland.
With the rising cost of data breaches and the rising volume of attacks, cyber security was one of the highest profile issues facing businesses in 2015. Cyber attacks are currently believed to cost business anywhere between $400-500bn a year and show little sign of abating..... More
The details that have emerged since the 21 October cyber attack on TalkTalk raise some serious questions not only for the broadband provider itself but for any business holding sensitive customer information.
Can traditional risk management frameworks protect a firm from the ever increasing cyber threat? What role do financial crime systems and controls, requirements, business continuity, data loss prevention and traditional fraud prevention techniques play in the defence against sophisticated and targeted cyber attacks?.... More
How some websites are using a combination of crowd sourcing, Cloud services and Internet marketing techniques to sell illegal system access and other criminal cyber services online.
A Jumbo Jet only travels fifty times faster than a horse and buggy..... More
I recently delivered a presentation in Stockholm to corporate staff on the risks arising from poor social media use. During the Q&A I was asked about guidance for parents and teachers in relation to child online activities. The audience, drawn from a leading Swedish high-tech firm, told me that an estimated 50% of Swedish three-year-olds are regular Internet users with their own online identity in some shape or form. I found this statistic alarming.
After 40 years teaching and training in universities and professional bodies, I was recently asked a question by a student about how, after so much time, it was possible to maintain keenness and enthusiasm about the subject matter of the class..... More
TRMG has been working with Legal and General to produce that firm’s Digital Criminal 2012: CyberSafety report. One of the report’s key findings is that criminals are targeting social media users online by setting up fake profiles, ‘friending’ potential targets and then tricking them into giving up sensitive personal information. The information gleaned in this manner is being used to commit identity theft, fraud and to plan burglaries.