Sonia and Francesca are both applying for credit cards. They have similar profiles and characteristics. However, Sonia is connected to other members of a criminal fraud network that is launching a bust-out fraud scheme. By the time it's clear that one of the applicants is actually a criminal, it may be too late to stop the losses.
Bust-out fraud is growing exponentially globally, perpetrated by fraudsters who share certain types of false information ...
Julie, a top-executive at a Paris-based consulting company, decides to go to Maui for a vacation. While in Maui, Julie goes into a store to pick up a couple of beach chairs. It should be a quick and easy purchase, but there's a problem - her credit card is denied.
Sounds familiar? Transforming fraud management starts with putting the customer front and center. And executing real-time, customer-centric fraud prevention gives financial services organizations ...
Tom, a tech entrepreneur, purchases an expensive snowboard in Aspen, Colorado using his credit card. It's not exactly an expected transaction if you look at his historical patterns. Does this mean his card has been compromised by a fraudster? Or is this just new behavior by a legitimate cardholder? While Tom will appreciate getting a fraud alert, too many inquiries will make him wonder, "Does the bank know who I am?"
As fraudsters ...
September 2014- Financial and other institutions are required to provide customer documents in accessible formats. This white paper, co-authored with the American Foundation for the Blind (AFB), discusses applicable legislation and recent litigation cases. It also suggests best practices for compliance and for providing accessible account statements and other electronic documents to customers with vision loss. In conclusion, the paper focuses on a solution for overcoming the challenges associated with meeting document accessibility requirements.
Research shows that 70 percent of employees are not engaged, costing the US $450-550 billion in lost productivity annually. How much of that money came from your business? Companies with engaged employees have above-average customer experience ratings and strong financial results.
Read the eBook, "Leveling the Playing Field: Cornerstone to Employee Engagement," to learn the four key elements to meaningful engagement. Discover some practical steps you can take now to help increase employee productivity, ...
July 2014- The recent financial crisis is slowly fading from our memories, yet its lasting effects continue on. Among all the new guidance, regulations and mortgage rules, another area is garnering increasing attention from regulators and examiners: risk management. No longer, they advise, should financial institutions take a siloed approach to risk management, with each area operating separately from the others. Doing so could possibly foster the type of poor decision-making that led to the financial crisis ...
July 2014- Online delivery of regulated consumer disclosures gives financial services companies the ability to control the process as well as gather comprehensive evidence to prove compliance with laws and regulations. Customers also benefit from a more convenient and faster process. Everyone wins. But delivering consumer disclosures electronically requires special consideration. The key is to ensure all legal requirements are met in a way that provides a great customer experience and drives adoption. This 7-page whitepaper takes ...
Knowing which programs your agency should support doesn't have to be a guessing game. With Oracle's Primavera Portfolio Management's enterprise approach to governance, agency executives can align projects with strategic goals, balance spending and assess risk.
This paper addresses the challenges and benefits of implementing a strategic governance solution to assist in better portfolio management and, ultimately, improved delivery of high value capabilities and citizen services from all projects and programs.
June 2013- We've witnessed companies across industries suffer serious reputational and financial damage due to legal and regulatory compliance failures. Most had what they considered reasonable compliance processes, but somehow they didn't work. More and more corporate resources are spent on compliance, with greater attention in the C-suite and board room, but still concern lingers - and justifiably so. While keeping an eye on regulatory actions, legal and compliance executives have sought to move their compliance programs ...
June 2013- Relationships between buy-side institutions (including insurers, pension funds, asset managers, hedge funds, wealth managers and asset servicers) are changing as a result of new regulations that are forcing the buy-side to manage risk to new standards. Regulators, supervisory bodies and rating agencies set much of the agenda for asset owners, managers and servicers and one needs to look no further than Solvency II, UCITS, MFID, AIFMD and Dodd-Frank to get a good feel of the ...
April 2013- Grid technology in banking is now over 10 years old. With age has come maturity: grid today is less a specialist technology and more a commodity in its own right. Today, almost all investment banks of whatever tier have a grid solution of some sort, be that 20 cores servicing a 3rd party trading application or 20,000 cores providing enterprise grid services. Early adopters of grid in the late 90s had to create their own solutions, drawing on ...
April 2013- This paper describes best practices on how to spread the computational demands of advanced risk analytics across a dynamic grid computing environment. With a more advanced and capable computing infrastructure, banks can move from reactively measuring risk to actively managing risk based on timely insights drawn from rigorous analysis, all while benefiting from a lower total cost of ownership.
February 2013- Financial institutions face an increasingly difficult challenge from persistent and virulent attacks. Drawing on limited resources, IT security teams have to protect networks that are growing in size and complexity. A new approach to network device and access management is helping IT security teams detect vulnerabilities, prioritize mitigation approaches and enable a safer deployment of configuration changes to network devices. Download this UBM Tech white paper to learn more.
Enterprise Management Associates (EMA) has had a solid, three-year history tracking AccelOps, a pioneering software developer that enables network and security administrators to monitor performance, availability and events with just one application.
They found that AccelOps customers are enjoying unique benefits in terms of time to value, scope of value, and cohesiveness in performance and security management thanks to the AccelOps’s premium on pragmatic innovations. This report provides a current view of ...
The recovery from the global recession has become especially precarious due to the
Eurozone sovereign debt crisis and fiscal tightening in the western world, and as a result of which volatility in financial markets has risen sharply. Under these circumstances, it has become imperative for banks to strengthen their risk management frameworks so that they can meet both the current and impending wave of challenges successfully.
This report, based on a survey of 46 ...
Buy side Solvency at Risk
What does your firm own? What are your portfolios worth? How big is your exposure? Answers to these questions are key to managing your firm's solvency. However when 56% of the North American buy-side lack confidence in their current accounting systems; 30% admit it would take days or weeks to calculate exposure across all holdings; and 40% concede investments decisions are made using poor quality data; it's time to ask if ...
July 2012- Smart decision making based on the most current data is essential as banks seek to better manage credit risk and drive growth. Here are four ways to manage the explosion of data and make faster decisions.
One of the most insidious criminal attacks on banking in recent times has been the proliferation of malware targeted at online banking. This custom malware enables activity such as authentication fraud by the theft of mTANs or SMS messages, or "man in the browser" / "man in the middle" attacks to steal credentials.
Now a new frontier has opened in online banking - consumers and businesses using smart phone-based applications to manage their finances. ...
March 2012- Insurance companies are beginning to recognize the potential value in deploying a robust operational risk management framework and integrating it into their ERM efforts.
March 2012- This whitepaper discusses how ERM, when embedded into everyday processes at all levels of the organization, can drive business performance.
March 2012- Automating operational risk practices is essential for insurance companies to gain a holistic view of risk and embed ORM into the corporate culture.
March 2012- This report from Chartis Research reveals the RiskTech100 rankings with IBM at the top. It also provides a detailed review of the IBM risk offerings from OpenPages and Algorithmics.
March 2012- Carnival Corporation & plc enhances process-based risk assessment system with the IBM OpenPages GRC Platform.
March 2012- Learn how the IBM solution for Solvency II introduces a proven framework for risk management - including defining required capital levels and implementing procedures to identify, measure and manage risk levels.
March 2012- This whitepaper discusses ORM in the context of Sound Practices for the Management and Supervision of Operational Risk, a paper from the Basel Committee.
View All Categories
INSURANCE: Architecture/Infrastructure, Claims, Customer Insight/Business Intelligence, Distribution, Management Strategies, Policy Administration & Management, Regulation/Financial Systems, Security/Risk Management