SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Re-organizing for Today’s Cyber Threats:
Converging Fraud Risk Management with IT Security
2
Banks are facing an urgent need
to bring the historic silos of fraud
risk management and IT security
more closely together to combat
mounting data security and cyber
threats from increasingly well
organized criminal entities.
3
The past two decades have seen an
accelerated rate of product development and
technology adaptation within the financial
services sector. From the introduction of the
first online banking service in the US in 1994,
the industry has developed and implemented
increasingly innovative services.1
Customers
today benefit from contactless card
payments, mobile banking apps and person-
to-person payments, to name just a few of
these innovations.
The threat for banks however, is that, in
tandem with the technological developments
underpinning an ever increasing set of new
service offerings, organized criminals have
been developing multi-pronged strategies to
exploit fresh weaknesses and vulnerabilities
for fraudulent gain. If we were to think of
financial institutions as homes, and organized
criminals as potential burglars, then each
time banks implement a new product or open
up a new channel for customer interaction,
this effectively adds a new window or door
that could serve as an entry point for those
criminals and therefore needs to be secured.
As the IT systems supporting banking
services have become more advanced from
mainframes in the 1960s, to today’s Web
2.0 and cloud technologies, criminals have
become more sophisticated in their abilities to
target and penetrate these systems. Today’s
organized criminals are deploying a wide array
of attack methods, such as screen capturing,
man-in-the-middle attacks, trojans, falsifying
mortgage applications, card cloning and
embedding sleepers within the workforce,
among many others.
For financial institutions, particularly in the
areas of retail banking and payments, there
are enormous opportunities to be gained from
enhancing their digital offerings to customers.
The overall experience is improved as
customers gain greater flexibility in how they
manage their finances, while at the same time
banks are able to lower their operating costs,
and also offer more personalized products
and services to customers through better use
of data and analytics capabilities.
The challenge for banks however, is to
implement these new digital models at speed
so they can maintain a competitive edge in
the market, but without putting security at
risk. To date, the speed at which many banks
have evolved their technology and service
offerings has been so rapid that their counter-
fraud strategies have struggled to keep pace.
And looking forward, the expectation is that
the pace of change will only increase.
Convergence of Fraud Risk and IT Security
Accelerating rate of product development
Fraud risks
IT risks
IT evolution
Integration of risk and IT
Driving evolving vulnerabilities to fraud
Diners
charge card
Check fraud
Mainframe Mini Client-server Web services Cloud
Risk Management
• Credit risk
• Market risk
• Operational risk
• Financial crime
• Conduct
IT Security
• Policies
• Physical controls
• Anti-virus
• Access controls
• Device hardening
• Segmentation
Lost and stolen cards
Cash machine/ATM fraud
Mail non-receipt fraud Counterfeit card fraud
Advanced persistent threats
Resilience
Disaster recovery Intrusion Screen capturing
Distributed denial of service Proxy servers, DNS poisoning
Man-in-the-middle attacks Bring your own device
Remote access trojans
Drive by downloads Man-in-the-browser attacks
Key logging HTML injection
Card not present fraud Fake banking apps
Phishing websites
Application fraud Account take-over Social engineering Phone banking fraud
Bank of America
credit card
Historic separation
of domains
Industry responses
eg. Chip and PIN,
EMV, 3-D Secure
Technology responses
eg. data analytics,
profiling
Barclaycard launched
Cheque guarantee cards
Rollout of ATMs
Development of ACH
1950 1958 1966 1970 1980 1994 2003 ‘07 ‘08 2010 2014
Introduction of home banking
Rollout of debit cards
Microsoft includes
online banking in
finance software
First online
banking website
Chip and PIN trials begin
Contactless card transactions
Faster payments - rapid
or instant clearing
Banking apps
for smart phones
Person-to-person
payments: Paym
Evolving product, business and IT risks
driving the integration of risk and IT
Source: 2015 Chartis RiskTech 100 report, December 2014
4
The Need for Convergence
Traditionally, banks
have managed different
categories of fraud
within silos.
For example, there may be specific teams
dedicated to check fraud, mortgage fraud,
credit card fraud and so on. But often, these
teams are not sharing data with one another,
and they may be reporting into individual
heads of fraud for each business line.
Ultimately, the chief risk officer (CRO) would
tend to be at the top of this umbrella.
Meanwhile, IT security issues, such as those
concerned with systems access, tend to be
managed solely by the IT function, often
under the jurisdiction of the chief information
officer (CIO).
As traditional risks converge with new risks
such as cyber threats, banks are becoming
exposed to security threats that can fall
between the cracks of the various silos.
Organized criminals are targeting several
channels at the same time, aware that many
banks are unable to connect the dots and
spot wider patterns of behavior as a result
of these historic structures and the lack of a
holistic approach to risk and security.
Furthermore, legacy information security,
event log management, and fraud and risk
management software solutions, which still
form the backbone of many risk and security
architectures, lack the ability to provide
deep insights into real-time user behaviors,
transactions and data.
If security solutions remain siloed and banks
continue to extend their offerings, then
sophisticated criminals will simply run rings
around them, bypassing existing controls
and protections by abusing the business
logic across multiple channels. To fight this
organized crime, banks need a sophisticated,
structured approach of their own. Developing
such an approach however will require
financial institutions to concentrate more of
their budget on developing more advanced
solutions to support the future shape of the
industry, rather than focusing investments to
respond to issues from past transgressions or
remediation activities.
5
The threat of cyberattack
is no longer something
that can be addressed by
individual organizations in
isolation.
As the World Economic Forum notes in its
Global Risks 2014 report, the increasing
interconnectedness of every part of the
world’s societies and economies, that rely
on the same infrastructure, hardware and
software standards raises the prospect of
disruptions having systemic impact.
In the future, cyber governance must become
a combined international effort. For instance,
the growth of the “internet of things” means
that more and more devices are now online,
widening the reach of cyber connectivity into
people’s lives across the world. This serves
to create more points of entry for attackers
and exacerbates the potential damage that
could be caused. At the same time, the
complexity of interaction between people and
their “connected” devices across the globe is
making those impacts harder to predict.
While banks and financial institutions
are concentrating on boosting their own
organizational defenses, what may be needed
in the future is cooperation between nations,
their governments and private organizations,
to counter the common threats. Fresh
thinking is required on how to preserve,
protect and govern the common good of a
trusted cyberspace.
Organizing an effective international response
will not be easy however. Recent revelations
surrounding the extent to which national
security organizations have allegedly been
using the internet for spying threatens
repercussions that may make it more
difficult to prevent widespread attacks, or
contain them when they occur. If there is a
breakdown of trust among nations, it could
be disastrous for cybersecurity.
In the same way that piecemeal solutions
within banks are unable to effectively
combat multi-pronged attacks from
organized criminals, solutions undertaken
without cooperation between nations will
fail to address the systemic threats that are
emerging.
Digital Disintegration –
Cyberattack as a Global Risk
Integrating Fraud Risk and IT Security
In many countries,
recently introduced
banking regulations are
driving firms to evaluate
their risk management
frameworks from a more
integrated perspective
than ever before.
At the same time, leading banks are
responding quickly to the emerging threats
posed by organized criminals by integrating
their approach to fraud risk and cyberattack
across the organization.
As they respond to these twin pressures,
financial institutions will need to address
challenges around people, processes
and technology.
People
Banks must ensure that there is formalized
knowledge sharing between those in the
fraud risk function and the IT security
function. In addition, they will need to align
behaviors around risk management across the
organization. Part of the solution will involve
adjusting incentives and targets to ensure that
both IT security and fraud risk personnel are
measuring their performance and effectiveness
in this area in ways that are aligned for the
desired outcomes of the bank.
The differing cultures, experiences and
backgrounds of the stakeholders will also
need to be addressed, in order to establish a
common level of understanding and use of
terminology (for example, a unified taxonomy
for risk and controls). The importance of
an effective communications strategy in
achieving this level of change cannot be over
emphasized.
The wider business must also ensure that
these two functions are in a position to
be proactive, rather than reactive as has
historically been the case. For instance,
they need to be involved earlier in decision-
making processes, especially around the
future development of products and services
– rather than being engaged at the end of
a decision chain. Developing a product or
service that cannot be supported does not
benefit anyone.
Process
At present, many banks manage fraud cases
through separate units, using different
system tools to log activity. However, this
approach does not reflect the way fraudsters
are behaving, as they attack the bank from
multiple angles in a coordinated manner.
Banks must therefore shift to enterprise case
management, enabling them to look at every
fraud or risk case that arises within the
organization as a single portfolio, to protect
themselves more effectively.
Another key step is to ensure that there
is common governance across risk and IT
security. This will involve aligning risk and
performance indicators. At the same time,
policies must be realigned to ensure they
reflect the new aggregation of responsibilities
across the two functions. Underpinning
this will be a need to re-engineer the
management information processes and the
key metrics being applied.
Technology
The foremost technology priority for banks
is to ensure that organizational data is freed
from siloes and shared across common
platforms. This undertaking must help
encompass both structured data, such as
transactional and account data, as well as
unstructured data, such as email, video,
image and social media.
Ensuring that common data standards are
enforced across functions will be another
key aspect of this shift: at present, a lack of
common oversight around data management
means that different standards and
taxonomies are often applied to the same
data by individual business units. In addition,
without consistency in reporting, it becomes
almost impossible for the board to project
organizational risk priorities accurately and
respond appropriately. Therefore, a single
data governance framework covering fraud
and IT security is a critical success factor.
For many leading banks, the chief data
officer (CDO) plays a key part in defining the
appropriate policies and procedures for data
governance.
Advanced analytics technologies provide
the ability to gain a real-time understanding
of behavior and spot anomalies that
indicate threats. These analytics must also
be appropriately intuitive and accessible:
enterprise dashboards can deliver integrated
fraud and security visualization capabilities
depicting key risk and control metrics, for
instance, with full drill-down capabilities into
the source data.
6
Enterprise core management
Security data
Point solution layer
Data integration layer
Detection layer
Fraud data OpRisk data HR data Customer dataCyber crime data
Rules engine
Work flow tools Forensic tools Risk scoring Ad hoc query
Visualization layer
Dashboard Heat maps Case evidence Regulatory reports
Predictive analytics Behavioral modeling Alert engineBig data and big analytics
Chief Risk Officer Chief Compliance Officer Head of Security Chief Operating OfficerChief Information Officer
Source: 2015 Chartis RiskTech 100 report, December 2014
7
8
Convergence is a Multi-year Journey
The convergence we
have discussed is a
significant undertaking
and clearly cannot be
achieved overnight.
As with any business change of this scale,
a phased approach will be required. And
importantly, will need to be aligned to the
strategy and desired positioning of the bank.
So while the sequence of the journey will be
dependent upon each individual bank’s current
structure and culture, there are some common
steps that all banks should consider.
Gap analysis and vulnerability assessments
must be made to identify any weaknesses
in controls and potential opportunities
for malicious activity. The results of these
assessments can then be used to design
a target operating model that effectively
protects against those highlighted risks.
Once this has been identified, it is important
initially to pursue the low-hanging fruit to
build momentum and senior management
support for the change process. For example,
it may be that existing systems already hold
some degree of shared data, so this would be
an obvious starting point.
In addition, the scale and importance of the
transformation may justify the appointment
of someone with the appropriate skillset
to oversee the change. Some large banks
have begun to hire for roles entitled ‘Head
of Operational Risk Change’, for instance.
And in the same way that criminals today
have grown in sophistication by working
together in online networks, we expect to see
increased sharing of insight across financial
institutions, and some common platforms
being established, along with laws and law
enforcement evolving to enable banks to
better collaborate and protect themselves.
While it is likely to take several years before
the desired convergence is achieved, what
is clear is that leading banks are already
moving in this direction, and Accenture and
Chartis expect this trend to extend across the
industry. In some ways, financial institutions
are involved in an arms race to improve their
security defenses, but the good news is that
there are multiple players involved. The banks
that are leading the pack will naturally face
fewer attacks, as criminals will always target
those with the weakest defenses. And with
financial institutions increasingly competing
on their ability to act as custodians of
customer data, the convergence of fraud risk
and IT security will drive their competitive
advantage in this area in future too.
9
10
Notes
1. “How Online Banking Evolved Into a
Mainstream Financial Tool,” Motley Fool,
November 9, 2014. Access at: http://www.
nasdaq.com/article/how-online-banking-
evolved-into-a-mainstream-financial-tool-
cm411861?utm_source=feedburner&utm_
medium=feed&utm_campaign=Feed%3A+na
sdaq%2Fsymbols+(Articles+by+Symbol)
About the Authors
Steve Culp is a senior managing director,
Accenture Finance & Risk Services. Based
in Chicago, Steve has more than 20 years
of global experience working with clients to
define strategy, and execute change programs
across a broad spectrum of risk management
and finance disciplines. Steve is responsible
for leading the global group across all
dimensions, from setting the strategic
direction through to the enablement of local
teams operating across diverse markets. In
addition, he oversees Accenture’s efforts
on large-scale transformation programs
across Finance and Risk for some of our most
important financial services clients.
Prior to his current role he was responsible
for our Global Risk Management Practice, and
prior to that he led Accenture’s Finance &
Enterprise Performance consulting services for
global banking, insurance and capital markets
institutions. With his extensive experience
in the financial services industries, combined
with his knowledge of risk management and
the finance function, he guides executives and
client teams on the journey to becoming high-
performance businesses.
Mark Daws is a managing director,
Accenture Finance & Risk Services. Based
in London, Mark has more than 25 years of
financial services experience, specialized
in large, complex, risk, regulation and
compliance, and IT enabled business
transformation client assignments and
work. His deep experience across all sectors
of the financial services space includes
previous roles as a; Technology Consultant
leading large and complex Risk and
Regulation IT implementations; a Solvency
II Chief IT Architect leading the design and
implementation of Solvency ll solutions;
a Forensic Technologist assisting clients
in crisis-management situations including
rogue trading and sanctions violations and;
a Financial Services Regulator focusing on
complex and high-profile investigations.
About Accenture
Accenture is a global management
consulting, technology services and
outsourcing company, with more than
319,000 people serving clients in more
than 120 countries. Combining unparalleled
experience, comprehensive capabilities
across all industries and business functions,
and extensive research on the world’s
most successful companies, Accenture
collaborates with clients to help them
become high-performance businesses and
governments. The company generated net
revenues of US$30.0 billion for the fiscal
year ended Aug. 31, 2014. Its home page is
www.accenture.com.
About Chartis
Chartis is the leading provider of research
and analysis covering the global market
for risk management technology. Our
goal is to support enterprises seeking to
optimize business performance through
better risk management, corporate
governance and compliance. We help
clients make informed technology and
business decisions by providing in-depth
analysis and actionable advice on the broad
spectrum of risk and compliance technology
offerings. Areas of expertise include:
•	Credit risk
•	Operational risk and governance, risk and
compliance (GRC)
•	Market risk
•	Asset and liability management (ALM) and
liquidity risk
•	Energy and commodity trading risk
•	Financial crime including trader
surveillance, anti-fraud and anti-money
laundering
•	Insurance risk
•	Regulatory requirements including Basel 2,
Basel 3, Dodd-Frank, EMIR and Solvency II
Chartis is solely focused on risk and
compliance technology giving it significant
advantage over generic market analysts.
Chartis Research is authorized and regulated
in the United Kingdom by the Financial
Conduct Authority (FCA) to provide
investment advice.
Visit www.chartis-research.com for more
information.
Join our global online community at
www.risktech-forum.com.
11
Copyright © 2015 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered
are trademarks of Accenture.
15-0292
Stay Connected
Accenture Finance & Risk Services:
http://www.accenture.com/microsites/
financeandrisk/Pages/index.aspx
Connect With Us
https://www.linkedin.com/
groups?gid=3753715
Join Us
https://www.facebook.com/
accenturestrategy
http://www.facebook.com/accenture
Follow Us
http://twitter.com/accenture
Watch Us
www.youtube.com/accenture
Disclaimer: This document is intended for general
informational purposes only and does not take into
account the reader’s specific circumstances, and
may not reflect the most current developments.
Accenture disclaims, to the fullest extent permitted
by applicable law, any and all liability for the
accuracy and completeness of the information in this
document and for any acts or omissions made based
on such information. Accenture does not provide
legal, regulatory, audit, or tax advice. Readers are
responsible for obtaining such advice from their own
legal counsel or other licensed professionals.
Rights to trademarks referenced herein, other than
Accenture trademarks, belong to their respective
owners. We disclaim proprietary interest in the
marks and names of others.
RiskTech100® is a registered trade mark of Chartis
Research Limited.
Unauthorized use of Chartis’s name and trademarks
is strictly prohibited and subject to legal penalties.

Weitere ähnliche Inhalte

Was ist angesagt?

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry BrianHuntMSFCPACRISC
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportDivya Kothari
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)Kate Dalakova
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firmsJake Weaver
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016thinkASG
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPPhilippe Boivineau
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention CMR WORLD TECH
 
Cyber security master class 2018
Cyber security master class 2018Cyber security master class 2018
Cyber security master class 2018Sanjana Khound
 

Was ist angesagt? (20)

Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment Report
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Cyber security master class 2018
Cyber security master class 2018Cyber security master class 2018
Cyber security master class 2018
 

Ähnlich wie Accenture re-organizing-todays-cyber-threats

Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar CyberattacksPanda Security
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...ijsc
 
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...ijsc
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docxArindamGhosal6
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxArindamGhosal6
 
ADAM ADLER MIAMI
ADAM ADLER MIAMI ADAM ADLER MIAMI
ADAM ADLER MIAMI AdamAdler10
 
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxJournal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxchristiandean12115
 
Article the shifting face of cybercrime - paul wright
Article  the shifting face of cybercrime - paul wrightArticle  the shifting face of cybercrime - paul wright
Article the shifting face of cybercrime - paul wrightPaul Wright MSc
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdfAmanSharma977554
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdfAmanSharma977554
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeNishantSisodiya
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfjasonuchiha2
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportSamantha Wagner
 

Ähnlich wie Accenture re-organizing-todays-cyber-threats (20)

Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
 
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
 
Top online frauds 2010
Top online frauds 2010Top online frauds 2010
Top online frauds 2010
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
 
ADAM ADLER MIAMI
ADAM ADLER MIAMI ADAM ADLER MIAMI
ADAM ADLER MIAMI
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxJournal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
 
Article the shifting face of cybercrime - paul wright
Article  the shifting face of cybercrime - paul wrightArticle  the shifting face of cybercrime - paul wright
Article the shifting face of cybercrime - paul wright
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
 

Mehr von Lapman Lee ✔

SustainTech/ Sustainable investment technology & data framework
SustainTech/ Sustainable investment technology & data frameworkSustainTech/ Sustainable investment technology & data framework
SustainTech/ Sustainable investment technology & data frameworkLapman Lee ✔
 
SustainTech framework - how emerging technologies can help meet the demand fo...
SustainTech framework - how emerging technologies can help meet the demand fo...SustainTech framework - how emerging technologies can help meet the demand fo...
SustainTech framework - how emerging technologies can help meet the demand fo...Lapman Lee ✔
 
SFC MIC Regime - On the hook
SFC MIC Regime - On the hookSFC MIC Regime - On the hook
SFC MIC Regime - On the hookLapman Lee ✔
 
The Big shake up in InsurTech
The Big shake up in InsurTechThe Big shake up in InsurTech
The Big shake up in InsurTechLapman Lee ✔
 
Lapman Lee article - Thinking out of the regulatory sandbox
Lapman Lee article - Thinking out of the regulatory sandboxLapman Lee article - Thinking out of the regulatory sandbox
Lapman Lee article - Thinking out of the regulatory sandboxLapman Lee ✔
 
Iais update-2019-annual-conference-pov
Iais update-2019-annual-conference-pov Iais update-2019-annual-conference-pov
Iais update-2019-annual-conference-pov Lapman Lee ✔
 
International Association of Insurance Supervisors (IAIS) strategic themes
International Association of Insurance Supervisors (IAIS) strategic themesInternational Association of Insurance Supervisors (IAIS) strategic themes
International Association of Insurance Supervisors (IAIS) strategic themesLapman Lee ✔
 
Digital transformation of global securities exchanges
Digital transformation of global securities exchangesDigital transformation of global securities exchanges
Digital transformation of global securities exchangesLapman Lee ✔
 
RegTech - regulators accelerating adoption of emerging technologies
RegTech - regulators accelerating adoption of emerging technologiesRegTech - regulators accelerating adoption of emerging technologies
RegTech - regulators accelerating adoption of emerging technologiesLapman Lee ✔
 
HK FinTech Steering Group inaugural report 2016
HK FinTech Steering Group inaugural report 2016HK FinTech Steering Group inaugural report 2016
HK FinTech Steering Group inaugural report 2016Lapman Lee ✔
 
Worried about non-compliance with changing banking and insurance regulatory r...
Worried about non-compliance with changing banking and insurance regulatory r...Worried about non-compliance with changing banking and insurance regulatory r...
Worried about non-compliance with changing banking and insurance regulatory r...Lapman Lee ✔
 
Top 10 Challenges for Corporate & Investment Banks
Top 10 Challenges for Corporate & Investment BanksTop 10 Challenges for Corporate & Investment Banks
Top 10 Challenges for Corporate & Investment BanksLapman Lee ✔
 
2015 global capital markets risk management study
2015 global capital markets risk management study2015 global capital markets risk management study
2015 global capital markets risk management studyLapman Lee ✔
 
Deloitte Risk Consulting Flyer - Lapman Lee Netherlands Lead
Deloitte Risk Consulting Flyer - Lapman Lee  Netherlands LeadDeloitte Risk Consulting Flyer - Lapman Lee  Netherlands Lead
Deloitte Risk Consulting Flyer - Lapman Lee Netherlands LeadLapman Lee ✔
 

Mehr von Lapman Lee ✔ (16)

SustainTech/ Sustainable investment technology & data framework
SustainTech/ Sustainable investment technology & data frameworkSustainTech/ Sustainable investment technology & data framework
SustainTech/ Sustainable investment technology & data framework
 
SustainTech framework - how emerging technologies can help meet the demand fo...
SustainTech framework - how emerging technologies can help meet the demand fo...SustainTech framework - how emerging technologies can help meet the demand fo...
SustainTech framework - how emerging technologies can help meet the demand fo...
 
SustainTech (lapman lee)
SustainTech (lapman lee)SustainTech (lapman lee)
SustainTech (lapman lee)
 
SFC MIC Regime - On the hook
SFC MIC Regime - On the hookSFC MIC Regime - On the hook
SFC MIC Regime - On the hook
 
The Big shake up in InsurTech
The Big shake up in InsurTechThe Big shake up in InsurTech
The Big shake up in InsurTech
 
Lapman Lee article - Thinking out of the regulatory sandbox
Lapman Lee article - Thinking out of the regulatory sandboxLapman Lee article - Thinking out of the regulatory sandbox
Lapman Lee article - Thinking out of the regulatory sandbox
 
Iais update-2019-annual-conference-pov
Iais update-2019-annual-conference-pov Iais update-2019-annual-conference-pov
Iais update-2019-annual-conference-pov
 
International Association of Insurance Supervisors (IAIS) strategic themes
International Association of Insurance Supervisors (IAIS) strategic themesInternational Association of Insurance Supervisors (IAIS) strategic themes
International Association of Insurance Supervisors (IAIS) strategic themes
 
Digital transformation of global securities exchanges
Digital transformation of global securities exchangesDigital transformation of global securities exchanges
Digital transformation of global securities exchanges
 
RegTech - regulators accelerating adoption of emerging technologies
RegTech - regulators accelerating adoption of emerging technologiesRegTech - regulators accelerating adoption of emerging technologies
RegTech - regulators accelerating adoption of emerging technologies
 
HK FinTech Steering Group inaugural report 2016
HK FinTech Steering Group inaugural report 2016HK FinTech Steering Group inaugural report 2016
HK FinTech Steering Group inaugural report 2016
 
Bcc membership
Bcc membershipBcc membership
Bcc membership
 
Worried about non-compliance with changing banking and insurance regulatory r...
Worried about non-compliance with changing banking and insurance regulatory r...Worried about non-compliance with changing banking and insurance regulatory r...
Worried about non-compliance with changing banking and insurance regulatory r...
 
Top 10 Challenges for Corporate & Investment Banks
Top 10 Challenges for Corporate & Investment BanksTop 10 Challenges for Corporate & Investment Banks
Top 10 Challenges for Corporate & Investment Banks
 
2015 global capital markets risk management study
2015 global capital markets risk management study2015 global capital markets risk management study
2015 global capital markets risk management study
 
Deloitte Risk Consulting Flyer - Lapman Lee Netherlands Lead
Deloitte Risk Consulting Flyer - Lapman Lee  Netherlands LeadDeloitte Risk Consulting Flyer - Lapman Lee  Netherlands Lead
Deloitte Risk Consulting Flyer - Lapman Lee Netherlands Lead
 

Kürzlich hochgeladen

Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 

Kürzlich hochgeladen (20)

Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 

Accenture re-organizing-todays-cyber-threats

  • 1. Re-organizing for Today’s Cyber Threats: Converging Fraud Risk Management with IT Security
  • 2. 2 Banks are facing an urgent need to bring the historic silos of fraud risk management and IT security more closely together to combat mounting data security and cyber threats from increasingly well organized criminal entities.
  • 3. 3 The past two decades have seen an accelerated rate of product development and technology adaptation within the financial services sector. From the introduction of the first online banking service in the US in 1994, the industry has developed and implemented increasingly innovative services.1 Customers today benefit from contactless card payments, mobile banking apps and person- to-person payments, to name just a few of these innovations. The threat for banks however, is that, in tandem with the technological developments underpinning an ever increasing set of new service offerings, organized criminals have been developing multi-pronged strategies to exploit fresh weaknesses and vulnerabilities for fraudulent gain. If we were to think of financial institutions as homes, and organized criminals as potential burglars, then each time banks implement a new product or open up a new channel for customer interaction, this effectively adds a new window or door that could serve as an entry point for those criminals and therefore needs to be secured. As the IT systems supporting banking services have become more advanced from mainframes in the 1960s, to today’s Web 2.0 and cloud technologies, criminals have become more sophisticated in their abilities to target and penetrate these systems. Today’s organized criminals are deploying a wide array of attack methods, such as screen capturing, man-in-the-middle attacks, trojans, falsifying mortgage applications, card cloning and embedding sleepers within the workforce, among many others. For financial institutions, particularly in the areas of retail banking and payments, there are enormous opportunities to be gained from enhancing their digital offerings to customers. The overall experience is improved as customers gain greater flexibility in how they manage their finances, while at the same time banks are able to lower their operating costs, and also offer more personalized products and services to customers through better use of data and analytics capabilities. The challenge for banks however, is to implement these new digital models at speed so they can maintain a competitive edge in the market, but without putting security at risk. To date, the speed at which many banks have evolved their technology and service offerings has been so rapid that their counter- fraud strategies have struggled to keep pace. And looking forward, the expectation is that the pace of change will only increase. Convergence of Fraud Risk and IT Security Accelerating rate of product development Fraud risks IT risks IT evolution Integration of risk and IT Driving evolving vulnerabilities to fraud Diners charge card Check fraud Mainframe Mini Client-server Web services Cloud Risk Management • Credit risk • Market risk • Operational risk • Financial crime • Conduct IT Security • Policies • Physical controls • Anti-virus • Access controls • Device hardening • Segmentation Lost and stolen cards Cash machine/ATM fraud Mail non-receipt fraud Counterfeit card fraud Advanced persistent threats Resilience Disaster recovery Intrusion Screen capturing Distributed denial of service Proxy servers, DNS poisoning Man-in-the-middle attacks Bring your own device Remote access trojans Drive by downloads Man-in-the-browser attacks Key logging HTML injection Card not present fraud Fake banking apps Phishing websites Application fraud Account take-over Social engineering Phone banking fraud Bank of America credit card Historic separation of domains Industry responses eg. Chip and PIN, EMV, 3-D Secure Technology responses eg. data analytics, profiling Barclaycard launched Cheque guarantee cards Rollout of ATMs Development of ACH 1950 1958 1966 1970 1980 1994 2003 ‘07 ‘08 2010 2014 Introduction of home banking Rollout of debit cards Microsoft includes online banking in finance software First online banking website Chip and PIN trials begin Contactless card transactions Faster payments - rapid or instant clearing Banking apps for smart phones Person-to-person payments: Paym Evolving product, business and IT risks driving the integration of risk and IT Source: 2015 Chartis RiskTech 100 report, December 2014
  • 4. 4 The Need for Convergence Traditionally, banks have managed different categories of fraud within silos. For example, there may be specific teams dedicated to check fraud, mortgage fraud, credit card fraud and so on. But often, these teams are not sharing data with one another, and they may be reporting into individual heads of fraud for each business line. Ultimately, the chief risk officer (CRO) would tend to be at the top of this umbrella. Meanwhile, IT security issues, such as those concerned with systems access, tend to be managed solely by the IT function, often under the jurisdiction of the chief information officer (CIO). As traditional risks converge with new risks such as cyber threats, banks are becoming exposed to security threats that can fall between the cracks of the various silos. Organized criminals are targeting several channels at the same time, aware that many banks are unable to connect the dots and spot wider patterns of behavior as a result of these historic structures and the lack of a holistic approach to risk and security. Furthermore, legacy information security, event log management, and fraud and risk management software solutions, which still form the backbone of many risk and security architectures, lack the ability to provide deep insights into real-time user behaviors, transactions and data. If security solutions remain siloed and banks continue to extend their offerings, then sophisticated criminals will simply run rings around them, bypassing existing controls and protections by abusing the business logic across multiple channels. To fight this organized crime, banks need a sophisticated, structured approach of their own. Developing such an approach however will require financial institutions to concentrate more of their budget on developing more advanced solutions to support the future shape of the industry, rather than focusing investments to respond to issues from past transgressions or remediation activities.
  • 5. 5 The threat of cyberattack is no longer something that can be addressed by individual organizations in isolation. As the World Economic Forum notes in its Global Risks 2014 report, the increasing interconnectedness of every part of the world’s societies and economies, that rely on the same infrastructure, hardware and software standards raises the prospect of disruptions having systemic impact. In the future, cyber governance must become a combined international effort. For instance, the growth of the “internet of things” means that more and more devices are now online, widening the reach of cyber connectivity into people’s lives across the world. This serves to create more points of entry for attackers and exacerbates the potential damage that could be caused. At the same time, the complexity of interaction between people and their “connected” devices across the globe is making those impacts harder to predict. While banks and financial institutions are concentrating on boosting their own organizational defenses, what may be needed in the future is cooperation between nations, their governments and private organizations, to counter the common threats. Fresh thinking is required on how to preserve, protect and govern the common good of a trusted cyberspace. Organizing an effective international response will not be easy however. Recent revelations surrounding the extent to which national security organizations have allegedly been using the internet for spying threatens repercussions that may make it more difficult to prevent widespread attacks, or contain them when they occur. If there is a breakdown of trust among nations, it could be disastrous for cybersecurity. In the same way that piecemeal solutions within banks are unable to effectively combat multi-pronged attacks from organized criminals, solutions undertaken without cooperation between nations will fail to address the systemic threats that are emerging. Digital Disintegration – Cyberattack as a Global Risk
  • 6. Integrating Fraud Risk and IT Security In many countries, recently introduced banking regulations are driving firms to evaluate their risk management frameworks from a more integrated perspective than ever before. At the same time, leading banks are responding quickly to the emerging threats posed by organized criminals by integrating their approach to fraud risk and cyberattack across the organization. As they respond to these twin pressures, financial institutions will need to address challenges around people, processes and technology. People Banks must ensure that there is formalized knowledge sharing between those in the fraud risk function and the IT security function. In addition, they will need to align behaviors around risk management across the organization. Part of the solution will involve adjusting incentives and targets to ensure that both IT security and fraud risk personnel are measuring their performance and effectiveness in this area in ways that are aligned for the desired outcomes of the bank. The differing cultures, experiences and backgrounds of the stakeholders will also need to be addressed, in order to establish a common level of understanding and use of terminology (for example, a unified taxonomy for risk and controls). The importance of an effective communications strategy in achieving this level of change cannot be over emphasized. The wider business must also ensure that these two functions are in a position to be proactive, rather than reactive as has historically been the case. For instance, they need to be involved earlier in decision- making processes, especially around the future development of products and services – rather than being engaged at the end of a decision chain. Developing a product or service that cannot be supported does not benefit anyone. Process At present, many banks manage fraud cases through separate units, using different system tools to log activity. However, this approach does not reflect the way fraudsters are behaving, as they attack the bank from multiple angles in a coordinated manner. Banks must therefore shift to enterprise case management, enabling them to look at every fraud or risk case that arises within the organization as a single portfolio, to protect themselves more effectively. Another key step is to ensure that there is common governance across risk and IT security. This will involve aligning risk and performance indicators. At the same time, policies must be realigned to ensure they reflect the new aggregation of responsibilities across the two functions. Underpinning this will be a need to re-engineer the management information processes and the key metrics being applied. Technology The foremost technology priority for banks is to ensure that organizational data is freed from siloes and shared across common platforms. This undertaking must help encompass both structured data, such as transactional and account data, as well as unstructured data, such as email, video, image and social media. Ensuring that common data standards are enforced across functions will be another key aspect of this shift: at present, a lack of common oversight around data management means that different standards and taxonomies are often applied to the same data by individual business units. In addition, without consistency in reporting, it becomes almost impossible for the board to project organizational risk priorities accurately and respond appropriately. Therefore, a single data governance framework covering fraud and IT security is a critical success factor. For many leading banks, the chief data officer (CDO) plays a key part in defining the appropriate policies and procedures for data governance. Advanced analytics technologies provide the ability to gain a real-time understanding of behavior and spot anomalies that indicate threats. These analytics must also be appropriately intuitive and accessible: enterprise dashboards can deliver integrated fraud and security visualization capabilities depicting key risk and control metrics, for instance, with full drill-down capabilities into the source data. 6
  • 7. Enterprise core management Security data Point solution layer Data integration layer Detection layer Fraud data OpRisk data HR data Customer dataCyber crime data Rules engine Work flow tools Forensic tools Risk scoring Ad hoc query Visualization layer Dashboard Heat maps Case evidence Regulatory reports Predictive analytics Behavioral modeling Alert engineBig data and big analytics Chief Risk Officer Chief Compliance Officer Head of Security Chief Operating OfficerChief Information Officer Source: 2015 Chartis RiskTech 100 report, December 2014 7
  • 8. 8 Convergence is a Multi-year Journey The convergence we have discussed is a significant undertaking and clearly cannot be achieved overnight. As with any business change of this scale, a phased approach will be required. And importantly, will need to be aligned to the strategy and desired positioning of the bank. So while the sequence of the journey will be dependent upon each individual bank’s current structure and culture, there are some common steps that all banks should consider. Gap analysis and vulnerability assessments must be made to identify any weaknesses in controls and potential opportunities for malicious activity. The results of these assessments can then be used to design a target operating model that effectively protects against those highlighted risks. Once this has been identified, it is important initially to pursue the low-hanging fruit to build momentum and senior management support for the change process. For example, it may be that existing systems already hold some degree of shared data, so this would be an obvious starting point. In addition, the scale and importance of the transformation may justify the appointment of someone with the appropriate skillset to oversee the change. Some large banks have begun to hire for roles entitled ‘Head of Operational Risk Change’, for instance. And in the same way that criminals today have grown in sophistication by working together in online networks, we expect to see increased sharing of insight across financial institutions, and some common platforms being established, along with laws and law enforcement evolving to enable banks to better collaborate and protect themselves. While it is likely to take several years before the desired convergence is achieved, what is clear is that leading banks are already moving in this direction, and Accenture and Chartis expect this trend to extend across the industry. In some ways, financial institutions are involved in an arms race to improve their security defenses, but the good news is that there are multiple players involved. The banks that are leading the pack will naturally face fewer attacks, as criminals will always target those with the weakest defenses. And with financial institutions increasingly competing on their ability to act as custodians of customer data, the convergence of fraud risk and IT security will drive their competitive advantage in this area in future too.
  • 9. 9
  • 10. 10
  • 11. Notes 1. “How Online Banking Evolved Into a Mainstream Financial Tool,” Motley Fool, November 9, 2014. Access at: http://www. nasdaq.com/article/how-online-banking- evolved-into-a-mainstream-financial-tool- cm411861?utm_source=feedburner&utm_ medium=feed&utm_campaign=Feed%3A+na sdaq%2Fsymbols+(Articles+by+Symbol) About the Authors Steve Culp is a senior managing director, Accenture Finance & Risk Services. Based in Chicago, Steve has more than 20 years of global experience working with clients to define strategy, and execute change programs across a broad spectrum of risk management and finance disciplines. Steve is responsible for leading the global group across all dimensions, from setting the strategic direction through to the enablement of local teams operating across diverse markets. In addition, he oversees Accenture’s efforts on large-scale transformation programs across Finance and Risk for some of our most important financial services clients. Prior to his current role he was responsible for our Global Risk Management Practice, and prior to that he led Accenture’s Finance & Enterprise Performance consulting services for global banking, insurance and capital markets institutions. With his extensive experience in the financial services industries, combined with his knowledge of risk management and the finance function, he guides executives and client teams on the journey to becoming high- performance businesses. Mark Daws is a managing director, Accenture Finance & Risk Services. Based in London, Mark has more than 25 years of financial services experience, specialized in large, complex, risk, regulation and compliance, and IT enabled business transformation client assignments and work. His deep experience across all sectors of the financial services space includes previous roles as a; Technology Consultant leading large and complex Risk and Regulation IT implementations; a Solvency II Chief IT Architect leading the design and implementation of Solvency ll solutions; a Forensic Technologist assisting clients in crisis-management situations including rogue trading and sanctions violations and; a Financial Services Regulator focusing on complex and high-profile investigations. About Accenture Accenture is a global management consulting, technology services and outsourcing company, with more than 319,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$30.0 billion for the fiscal year ended Aug. 31, 2014. Its home page is www.accenture.com. About Chartis Chartis is the leading provider of research and analysis covering the global market for risk management technology. Our goal is to support enterprises seeking to optimize business performance through better risk management, corporate governance and compliance. We help clients make informed technology and business decisions by providing in-depth analysis and actionable advice on the broad spectrum of risk and compliance technology offerings. Areas of expertise include: • Credit risk • Operational risk and governance, risk and compliance (GRC) • Market risk • Asset and liability management (ALM) and liquidity risk • Energy and commodity trading risk • Financial crime including trader surveillance, anti-fraud and anti-money laundering • Insurance risk • Regulatory requirements including Basel 2, Basel 3, Dodd-Frank, EMIR and Solvency II Chartis is solely focused on risk and compliance technology giving it significant advantage over generic market analysts. Chartis Research is authorized and regulated in the United Kingdom by the Financial Conduct Authority (FCA) to provide investment advice. Visit www.chartis-research.com for more information. Join our global online community at www.risktech-forum.com. 11
  • 12. Copyright © 2015 Accenture All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. 15-0292 Stay Connected Accenture Finance & Risk Services: http://www.accenture.com/microsites/ financeandrisk/Pages/index.aspx Connect With Us https://www.linkedin.com/ groups?gid=3753715 Join Us https://www.facebook.com/ accenturestrategy http://www.facebook.com/accenture Follow Us http://twitter.com/accenture Watch Us www.youtube.com/accenture Disclaimer: This document is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this document and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals. Rights to trademarks referenced herein, other than Accenture trademarks, belong to their respective owners. We disclaim proprietary interest in the marks and names of others. RiskTech100® is a registered trade mark of Chartis Research Limited. Unauthorized use of Chartis’s name and trademarks is strictly prohibited and subject to legal penalties.