{"id":353,"date":"2006-06-12T00:00:00","date_gmt":"2006-06-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/12\/banks-should-check-risk-controls-bies-says\/"},"modified":"2021-12-30T11:37:05","modified_gmt":"2021-12-30T11:37:05","slug":"banks-should-check-risk-controls-bies-says","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/12\/banks-should-check-risk-controls-bies-says\/","title":{"rendered":"Banks should check risk controls, Bies says"},"content":{"rendered":"<p>Managers of U.S. banks should evaluate their policies at least once a year for controlling risk of financial losses or illegal activities, Federal Reserve Gov.  In remarks prepared for delivery to a financial group, Bies also said banks should guard against information-security breaches by controlling access to fund-transfer systems.  By law, banks must file reports about suspicious activity, to combat money laundering and other terrorist tools.   &#8220;Effective management of information security risk, even when focused on a specific function, requires an enterprise-wide approach to yield a true and complete evaluation of the associated risks,&#8221; she said in a speech before the Financial Women&#8217;s Association.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;The Federal Reserve will continue to work with our counterparts in the federal government to encourage enhanced feedback on how reporting is contributing to our common fight against money laundering and terrorism,&#8221; Bies said.<\/p>\n<p>http:\/\/www.marketwatch.com\/News\/Story\/Story.aspx?guid=%7B16693B48-1BEC-4B01-B138-7812489927B4%7D&#038;siteid=google<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-353","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=353"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/353\/revisions"}],"predecessor-version":[{"id":2840,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/353\/revisions\/2840"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}