{"id":311,"date":"2004-11-16T00:00:00","date_gmt":"2004-11-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/16\/oracle-releases-risk-hub\/"},"modified":"2021-12-30T11:37:00","modified_gmt":"2021-12-30T11:37:00","slug":"oracle-releases-risk-hub","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/16\/oracle-releases-risk-hub\/","title":{"rendered":"Oracle Releases Risk Hub"},"content":{"rendered":"<p>At Sibos in Atlanta, Oracle announced its &#8220;Regulatory Capital Manager&#8221; product to help banks address the needs and requirements of Basel II.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With this product, Oracle would be used as the consolidation point for offerings from other risk management providers.<\/p>\n<p>On the operational risk side, Oracle has a dashboard product called &#8220;Internal Controls Manager&#8221; that allows drill-down access to data and events being tracked for regulatory compliance.  &#8220;It&#8217;s a single place to integrate information that&#8217;s related to every one of the regulatory mandates, so that you can drill down through the same dashboard in Sarbanes-Oxley information, Basel II information, Patriot Act information, and see the relationships,&#8221; says Andrea Klein, vice president of financial services industry marketing for Oracle.<\/p>\n<p>Getting a handle on enterprise risk does more than help satisfy regulatory mandates stemming from Basel II.<\/p>\n<p>&#8220;In the same way that the Basel II guidelines are going to make the banks more aware of their capital position so they can manage their money more effectively, you can do that same kind of better management on each one of your corporate accounts,&#8221; she says.<\/p>\n<p>http:\/\/www.banktech.com\/story\/news\/showArticle.jhtml?articleID=53200242<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-311","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/311\/revisions"}],"predecessor-version":[{"id":2798,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/311\/revisions\/2798"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}