Remove Cyber Security Remove Fraud Remove Management Remove Operations
article thumbnail

Proposed new cyber security regulations will be a huge undertaking for financial institutions

Celent Banking

New York State Department of Financial Services (NYDSF) is one step closer to releasing cyber security regulations aided by the largest security hacking breach in history, against JP Morgan Chase. Mandated training of security will be required. Information security. Access controls and identity management.

article thumbnail

Why cyber risk challenges are best addressed through cyber integration

Accenture

In my first post on integrated cyber risk management, we looked at financial firms bringing together leadership and capabilities across fraud, IT, cyber security and operational risk, both to improve enterprise risk management and to build cyber resilience. Read more.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Four Steps for Managing Third-Party Cyber Security Risk

FICO

As TPRM or third-party risk management grows in importance, so does cybersecurity risk assessment as part of it. The latest Assessment of Business Cyber Risk (ABC) report from the US Chamber of Commerce and FICO discusses four steps for improving third-party cybersecurity risk management. Where does the vendor operate (e.g.,

article thumbnail

Top Fraud Issues for Telecommunications: Survey Results

FICO

The Communications Fraud Control Association (CFCA) recently released the findings from its Global Telecom Fraud Survey. Fraud teams operate with lean structures. The majority are still using primarily rules-based fraud management systems, with just 6% using AI and machine learning. of respondents.

Survey 52
article thumbnail

Bank Regulators Seeking Comments on the Use of AI and ML in the Industry

Perficient

fraud detection and financial crime monitoring). email, text, audio data), with the aim of identifying fraud or anomalous transactions. AI technologies, such as voice recognition and natural language processing (NLP), are being used to improve customer experience and to gain operational efficiencies. Risk Management.

article thumbnail

Synthetic Identities: From Data Breaches to Auto Loan Fraud

FICO

Fraud and data breaches have always had a close, if destructive, relationship. As the US transitioned to hard-to-counterfeit EMV payment card technology several years ago, criminals flocked to card not present (CNP) fraud , often combining identity fragments and card numbers stolen in breaches to make illicit purchases online.

Fraud 70
article thumbnail

Fraud And Risk: Surveillance Is Only Part Of Good Security

PYMNTS

Hedgie Bartol, Axis Communications’ business development manager for retail in North America, has some insights on why the surveillance camera alone just isn’t enough anymore. If someone is hanging around the storefront for too long, the camera feed triggers the speakers to tell the suspect to come back during operating hours.

Fraud 101