Obama sets cyber security agenda
ABA Community Banking
JANUARY 12, 2015
Includes “Consumer Privacy Bill of Rights” Technology Payments Risk Management Security Cyberfraud/ID Theft. 1Risk Management'
ABA Community Banking
JANUARY 12, 2015
Includes “Consumer Privacy Bill of Rights” Technology Payments Risk Management Security Cyberfraud/ID Theft. 1Risk Management'
Perficient
APRIL 2, 2021
Risk Management. AI may be used to augment risk management and control practices. Financial institutions may also use AI to enhance credit monitoring (including through early warning alerts), payment collections, loan restructuring and recovery, and loss forecasting. Textual analysis.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
SWBC's LenderHub
OCTOBER 30, 2014
Security breaches are a perpetual part of our technologically advanced society. As a lender, you are tasked with meeting your borrowers’ needs for convenient online payment processing technology, while still ensuring the platform is secure. Risk Management Loan Payment Technology Fraud/Cyber Security'
Payments Source
MARCH 12, 2019
Two years ago, Ellen Richey became Visa's vice chairman and chief risk officer, propelled to this role by over a decade of work that fundamentally changed how the average consumer makes a payment. Richey plans to retire this summer, ending a 40-year career in law and risk management.
Gonzobanker
NOVEMBER 17, 2016
The underlying theme my Cornerstone compadres and I picked up over the four-day event was the financial industry’s growing resolve to create “frictionless, personalized payments.” Retailer perspective sessions emphasized improving the consumer’s buying experience versus the payment experience.
PYMNTS
JUNE 20, 2017
Risk management is complex territory for many businesses, especially those with complex partnerships, vast supply chains and global footprints. For fund investors, active risk management is of particular importance for treasurers, Hazeltree noted.
FICO
MAY 2, 2019
As the US transitioned to hard-to-counterfeit EMV payment card technology several years ago, criminals flocked to card not present (CNP) fraud , often combining identity fragments and card numbers stolen in breaches to make illicit purchases online. Fraud and data breaches have always had a close, if destructive, relationship.
Let's personalize your content