Remove Handbook Remove Management Remove Security Remove Technology
article thumbnail

Today’s Cyber Risk Management

Cisco

It also put an even greater emphasis on cyber risk management within institutions and financial regulatory agencies. The FFIEC issued an update for US banks to the Architecture, Infrastructure, and Operations Examinations Handbook , as well as guidance for Authentication and Access to Financial Institution Services and Systems.

article thumbnail

The Big Spike In ‘CEO Fraud’

PYMNTS

As for the areas where scammers managed the biggest hits, business email compromise (BEC), confidence/romance fraud and spoofing were the top three types of crime in terms of monetary losses. Phishing/vishing/smishing/pharming, non-payment/non-delivery, extortion and personal data breaches were among the favored attack patterns last year.

Fraud 253
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FFIEC Cybersecurity Maturity Assessment Tool

Cisco

It is part of a multipart blog series on financial regulations and how to manage them architecturally, geared towards IT leadership. The assessment applies principles of the FFIEC IT Handbook and the NIST Cybersecurity Framework. The inherent risk profile is an institution’s analysis of its key technologies and operations.

Tools 114
article thumbnail

Top 5 Fraud Manager Considerations During COVID-19

FICO

So, I thought I would outline my top 5 fraud manager considerations during COVID-19. Here are some of my thoughts on the matter: 1) Top 5 Fraud Manager Considerations During COVID-19: We owe our customers protection during these unusual times. Criminals also run their own businesses, and fear is an opportunity to exploit. Card Fraud.

Fraud 52
article thumbnail

America’s AI Bill of Rights is the Right Idea – and It’s About Time

FICO

It’s been a couple of weeks since the White House released its Blueprint for an AI Bill of Rights , a 73-page handbook that was promptly, and probably predictably, pilloried with headlines like, “ Biden’s AI Bill of Rights is Toothless Against Big Tech ” and “ Does the White House AI Bill of Rights Amount to Anything ?” by Scott Zoldi.

article thumbnail

Helping SMBs Crack Digital ID Verification

PYMNTS

To take a phrase from the journalist’s handbook: Trust, but verify. The goals of any digital identity verification process or technology include stopping fraud in its tracks, preventing fake accounts from ever being opened and, at the most basic level, maintaining (and even building) a client’s reputation for trustworthiness.

Handbook 171
article thumbnail

What Check Fraud Can Teach Banks About Preparing For The Instant Payments Future

PYMNTS

If there was a handbook for how to become a successful fraudster, the first sentence of the first chapter would go something like this: “Go where the money is.”. Fraudsters, like any other professionals in the digital age, take their craft seriously and are now using technology to do more with less. Here’s how.

Fraud 162