By: Tom Hannagan Part 3 This post continues my discussion of the reasons for going through the time and trouble to analyze risk-based pricing...
Stephanie Butler, manager of Process Architects, in Advisory Services at Baker Hill, a part of Experian continues from her last post by adding how to get...
This post is a feature from my colleague and guest blogger, Stephanie Butler, manager of Process Architects in Advisory Services at Baker Hill, a...
Part 2 My colleague, Prince Varma, Senior Client Partner — Portfolio Growth and Client Management, shares his advice on the best practices for portfolio risk...
By: Tom Hannagan Part 2 This post continues my discussion of the reasons for going through the time and trouble to analyze risk-based pricing...
By: Tom Hannagan Part 1 In my last three posts, we have covered the key parts of how risk-based loan pricing works. We have discussed...
By: Tom Hannagan Part 1 Risk-based pricing starts as a product-level reflection of a bank’s financial and risk characteristics. In my last few posts...
So here it is! The moment you all have been waiting for–the top ten hot topics of 2009 (in no particular order of importance)....
I’m speculating a bit here, but I have a feeling that as the first wave of Red Flag ruleexaminations occurs, one of the potential...
By: Tom Hannagan Part 2 Return on Equity (ROE) ROE is the risk-adjusted profit divided by the equity amount associated with the loan in...
By: Tom Hannagan Part 1 In my last post about risk-based pricing, we started a discussion of the major elements involved in the risk adjustment...
Part 2 To continue the discussion from my last post, we also must realize that the small business borrower typically doesn’t wait until we...
Part 1 In reality, we are always facing potential issues in our small business portfolio, it is just the nature of that particular beast....
I have heard this question posed and you may be asking yourselves: Why are referral volumes (the potential that the account origination or maintenance...
What is your greatest concern as the May 1, 2009 enforcement date approaches for all guidelines in the Identity Theft Red Flags...