This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
NCUA expectations for credit unions post-CECL adoption The NCUA's focus on risk, especially creditrisk, has implications for credit unions instituting CECL this quarter. Takeaway 2 Credit unions may still have questions about regulatory expectations for CECL after adopting the new standard.
To continue reading and learn four essential risk-based questions to ask when evaluating a customer’s credit-worthiness, you must be a paid subscriber to Your Virtual Credit Manager. Do you need help assessing customer creditrisks? Ensure the account meets your cybersecurity requirements.
When a check is presented for payment, a visual inspection can often reveal suspicious checks before your financial institution incurs a loss. Alterations : Alterations are a common tactic in check fraud. Any signs of tampering, like altered, eradicated, or erased information, suggest the check might be counterfeit.
Present-value recovery for the financial institution can inform an argument that the new terms do not represent a concession. Prioritizing these requests will be critical in successfully managing creditrisk and maintaining profitability. Financial Cybersecurity. Artificial Intelligence. BSA Software. Learn More.
If the institution has a history of violations, particularly repeat findings, the risk of the financial institution should be increased in the risk assessment. Financial Cybersecurity. How to Conduct an Exam-Proof BSA/AML Risk Assessment. Financial Cybersecurity. Lending & CreditRisk. Learn More.
The Credit + Lending + Portfolio Risk track will cover topics on managing creditrisk, making smarter loans faster, managing the current expected credit loss (CECL), stress testing, and asset/liability management (ALM).
E xploitation of remote applications : t he transition to “ work from home ” remote access and virtual applications during the pandemic has presented new opportunities for bad actors to target businesses and individuals. . Lending & CreditRisk. Financial Cybersecurity. Asset/Liability. C&I Loans.
emailing, uploading to other documents, creating pdfs, and presentation features that allow for direct presentation to management and board groups)? Does the solution provide access to peer and industry data for creating visual comparisons and providing loan decisioning insights?
Criminals send a fake or phishing email to a member of the finance team at a corporation either pretending to be a high-level executive or presenting a fake invoice. Financial Cybersecurity. Lending & CreditRisk. Portfolio Risk & CECL. “Novel” Risk Management for Banking Leaders in 2021.
Reaching out to new or existing clients at a time when entrepreneurs are already reviewing their financial statements presents a growth opportunity for banks that can offer additional funding or better loan terms through refinancing. Lenders must be sure to consider data privacy when using AI by investing in enhanced cybersecurity methods.
“Prudent oversight is rooted in the directors sending a clear message to staff that they value a strong risk management culture that includes a strong ethical culture,” the FDIC said. Risk management culture What exactly is a risk management culture? Operational problems in BSA/ AML, information technology and cybersecurity 12.
Exploitation of remote applications: the transition to “work from home” remote access and virtual applications during the pandemic has presented new opportunities for bad actors to target businesses and individuals. Financial Cybersecurity. Lending & CreditRisk. Card Fraud. Customer Due Diligence. Fraud Prevention.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content