Remove Definition Remove Management Remove Security
article thumbnail

7 Steps to Define a Data Governance Structure for a Mid-Sized Bank (Without Losing Your Mind)

Perficient

Establish a single source of truth Create a glossary that doesn’t read like a legal document Accept that these definitions will change more often than a teenager’s social media profile It’s not perfect, but it’s governance, not a philosophical treatise on the nature of reality. So very, very wrong.

Data 221
article thumbnail

U.S. Regulations to Consider When Managing a Cryptocurrency Fund

Perficient

However, in this blog, we will discuss the regulatory landscape surrounding cryptocurrency from an asset manager or fund manager perspective. We’ll then move to the federal level, seeking regulatory guidance as to whether digital tokens are securities under the jurisdiction of the U.S. Central Bank Digital Currency (CBDC) ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Microsoft Security and Compliance Certifications (Feb 2021)

Perficient

This morning I was sipping on my cup of coffee and browsing through Microsoft’s Learn page when I stumbled upon a few new certifications and exams around Microsoft Security and Compliance ! Certification – Microsoft Certified: Security Operations Analyst Associate. Exam: Microsoft Security Operations Analyst SC-200 (beta).

article thumbnail

An Inside Look at Managed Clusters

Perficient

Spend a few minutes with one of our Red Hat technical experts, Matthieu Rethers, as he discusses the advantages and disadvantages of managed clusters, as well as differences between them on various cloud platforms, when you should use them, alternatives to managed clusters, and how Red Hat OpenShift fits into the picture.

article thumbnail

Trends in commercial real estate (CRE) lending and risk

Abrigo

They also share tips for managing risk and pricing. As a result, financial institutions with CRE concentrations find it increasingly important to strategically manage the competitive pressures and risks related to origination, refinancing, and loan performance. We can help you set up stress testing that's right for your loan portfolio.

Lending 221
article thumbnail

Hacker Attack Exploits Security Hole In Token Exchange

PYMNTS

A cyberattack on what’s been described as a “decentralized” token exchange reportedly has led to a $58,000 theft and an illustration of a “shocking security vulnerability.”. Newdex later revealed the attackers managed to siphon 4,028 real EOS (approximately $20,000) to cryptocurrency exchange desk Bitfinex.

Security 186
article thumbnail

How Perficient and Microsoft Can Help You Return to Work

Perficient

Additionally, we can help you explore process improvements as agile practices expand throughout the organization, help implement agile project management practices, and expand DevOps around continuous integration and continuous deployment. Security and compliance considerations. Application Migration Accelerator. What’s Included.

Strategy 429