- Capitalizing On Big Data: Managed Services Help Financial Firms Accelerate Big Data Projects
- Insurance in the Cloud: A Customer Focused Approach to Innovation
- Financial Services & the State of Salesforce 2015
- Fight Growing Cybersecurity Threats: Leverage Managed Security Services
- Hybrid IT: Best of All Worlds
Most fraud involves the use of false or anonymous identities. Banks are fighting back with tools and solutions designed to verify identity or at least raise red flags before fraud occurs. Neustar sponsored a survey with American Banker of over 230 top senior financial executives, within fraud mitigation and risk assessment, to uncover industry insights, threats, impacts and more.
Download whitepaper to:
• Recognize the Top 7 banking fraud threats
• Understand fraud ...
The Federal Financial Institutions Examination Council (FFIEC) recently released a statement on 'Cyber-Attacks on Automated Teller Machine and Card Authorization Systems and Distributed Denial of Service Attacks.' In the statement, the FFIEC outlines six guidelines to maintain a state of readiness to address this ongoing threat:
• Conduct ongoing information security risk assessments
• Perform security monitoring, prevention and risk mitigation
• Protect against unauthorized access
• Implement and ...
Sonia and Francesca are both applying for credit cards. They have similar profiles and characteristics. However, Sonia is connected to other members of a criminal fraud network that is launching a bust-out fraud scheme. By the time it's clear that one of the applicants is actually a criminal, it may be too late to stop the losses.
Bust-out fraud is growing exponentially globally, perpetrated by fraudsters who share certain types of false information ...
Julie, a top-executive at a Paris-based consulting company, decides to go to Maui for a vacation. While in Maui, Julie goes into a store to pick up a couple of beach chairs. It should be a quick and easy purchase, but there's a problem - her credit card is denied.
Sounds familiar? Transforming fraud management starts with putting the customer front and center. And executing real-time, customer-centric fraud prevention gives financial services organizations ...
Tom, a tech entrepreneur, purchases an expensive snowboard in Aspen, Colorado using his credit card. It's not exactly an expected transaction if you look at his historical patterns. Does this mean his card has been compromised by a fraudster? Or is this just new behavior by a legitimate cardholder? While Tom will appreciate getting a fraud alert, too many inquiries will make him wonder, "Does the bank know who I am?"
As fraudsters ...
Banks are turning to e-signatures in order to better serve customers across all channels. Today's consumer expects to be able to open an account, apply for a loan or purchase a mutual fund anywhere, anytime and on any device. To achieve this level of convenience, end to end digital processes, enabled by electronic signatures are required. To help you quickly get up to speed on e-signatures, this Guide covers all the basics including:
June 2014- Online delivery of regulated consumer disclosures gives financial services companies the ability to control the process as well as gather comprehensive evidence to prove compliance with laws and regulations. Customers also benefit from a more convenient and faster process. Everyone wins. But delivering consumer disclosures electronically requires special consideration. The key is to ensure all legal requirements are met in a way that provides a great customer experience and drives adoption. This 7-page white paper ...
June 2014- What scares IT security more than hackers? This Ponemon Institute Research report answers that question and then some. In a survey of more than 1,500 IT practitioners from around the world, they reveal what's worrying the people tasked with protecting the enterprise's most sensitive data. With the rise of the data-centric enterprise, there is a necessary and parallel development of the security architecture meant to protect it. But in the time it's taken for data security ...
Research shows that 70 percent of employees are not engaged, costing the US $450-550 billion in lost productivity annually. How much of that money came from your business? Companies with engaged employees have above-average customer experience ratings and strong financial results.
Read the eBook, "Leveling the Playing Field: Cornerstone to Employee Engagement," to learn the four key elements to meaningful engagement. Discover some practical steps you can take now to help increase employee productivity, ...
July 2014- The recent financial crisis is slowly fading from our memories, yet its lasting effects continue on. Among all the new guidance, regulations and mortgage rules, another area is garnering increasing attention from regulators and examiners: risk management. No longer, they advise, should financial institutions take a siloed approach to risk management, with each area operating separately from the others. Doing so could possibly foster the type of poor decision-making that led to the financial crisis ...
July 2014- Online delivery of regulated consumer disclosures gives financial services companies the ability to control the process as well as gather comprehensive evidence to prove compliance with laws and regulations. Customers also benefit from a more convenient and faster process. Everyone wins. But delivering consumer disclosures electronically requires special consideration. The key is to ensure all legal requirements are met in a way that provides a great customer experience and drives adoption. This 7-page whitepaper takes ...
February 2014- Exploring the dynamics of trading OTC derivatives, and their connections to counterparty credit risk, funding requirements, and regulatory capital.
Banks can significantly reduce their levels of bad debt and collections expenses by specifically targeting first-party fraud. Advanced network analytics with real-time screening is the key to early detection and prevention of risk threats before they result in large losses.
Download the whitepaper to learn more.
•Challenges involved in combating first-party fraud and emerging best practice
•A comprehensive approach, including application screening, periodic reviews and real-time controls
September 2013- Download FICO's white paper that demonstrates how insurers can uncover more fraud with insight on individuals and criminal rings.
July 2013- In the financial industry, an organization's reputation and its ability to maintain the security of personal or payment information are crucial to customers. Do you continually identify and control risks to customer information and systems using policies and procedures that assess risks, control access, test for failures/breaches, oversee service providers, and periodically review, update, and report to both internal boards and external regulators? Are you aware of the myths that can put your clients ...
April 2013- Read the Aite Group paper "Investigation Management for Fraud: Catch More Fraudsters More Efficiently" to learn effective strategies for combating financial fraud. It discusses new, real-world strategies, tactics and technologies that commercial entities and public sector organizations can use against this mounting threat.
February 2013- Law enforcement and domain registrars will continue to curb cybercrime efforts. This will likely be coordinated through CERT groups and relations with security firms. However, a more comprehensive, multi-layered approach to security will be key in bolstering that effort.
February 2013- Many Financial services organizations struggle with the competing demands of security and speed. What's more, the industry is facing a period of challenging and unpredictable economic circumstances, compounded by the likelihood of dramatic and on-going changes to the regulatory environment.
February 2013- IBM Intelligent Investigation Manager - comprising IBM Case Manager, IBM i2 Fraud Investigation Analysis and IBM Content Analytics - helps teams manage fraud investigations by capturing all relevant details of each case, supporting dynamic collaboration and incorporating forensic/link analysis.
February 2013- Financial institutions face an increasingly difficult challenge from persistent and virulent attacks. Drawing on limited resources, IT security teams have to protect networks that are growing in size and complexity. A new approach to network device and access management is helping IT security teams detect vulnerabilities, prioritize mitigation approaches and enable a safer deployment of configuration changes to network devices. Download this UBM Tech white paper to learn more.
Insurers lose millions each year through fraudulent claims. Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy and saving time and resources.
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts; build models based on previously audited claims and use them to identify potentially fraudulent future claims; ensure adjusters focus ...
August 2012- Leading companies applying "predictive intelligence" to proactively mitigate and manage complexity-fraught risks, while bringing value to their bottom line and their brand.
August 2012- In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization. You will learn how techniques including cluster analysis, anomly detection, time series analysis, social network analysis, predictive models and scoring can be used to detect suspicious activity in real-time so your orgnization can take action to minimize risk and increase positive outcomes. As a final step, you will learn how automating model ...
July 2012- Smart decision making based on the most current data is essential as banks seek to better manage credit risk and drive growth. Here are four ways to manage the explosion of data and make faster decisions.
One of the most insidious criminal attacks on banking in recent times has been the proliferation of malware targeted at online banking. This custom malware enables activity such as authentication fraud by the theft of mTANs or SMS messages, or "man in the browser" / "man in the middle" attacks to steal credentials.
Now a new frontier has opened in online banking - consumers and businesses using smart phone-based applications to manage their finances. ...
View All Categories
INSURANCE: Architecture/Infrastructure, Claims, Customer Insight/Business Intelligence, Distribution, Management Strategies, Policy Administration & Management, Regulation/Financial Systems, Security/Risk Management