AVOIDING REGULATORY DATA BREACH RESPONSE GUIDE FINANCIAL INSTITUTIONS. and Value for Customers
|
|
- Lesley Lynch
- 6 years ago
- Views:
Transcription
1 ////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// WHITE PAPER FINANCIAL INSTITUTIONS DATA BREACH RESPONSE GUIDE AVOIDING REGULATORY HOW DOUBLE TO JEOPARDY NAVIGATE THE FIRST How to Stay Compliant 48 HOURS While Adding Protection and Value for Customers
2 INTRODUCTION Financial institutions face a daunting task when it comes to navigating government data security and breach regulations and that s putting it mildly. At the federal level many rules are vague by design. At the state level, complexity runs deep: banks and credit unions must comply with different guidelines in the 47 states that have breach laws. Moreover, compliance is only one of many challenges financial institutions face today. They also must respond to a range of demographic and technology-related trends that complicate their ability to secure data and remain compliant. Key needs now include: Mobility and digital engagement Engaging with the millennial and high-value customer segments Technology integration to support outstanding customer experiences, streamlined processes and improved strategic decision-making Analytics for a better understanding of consumer behaviors and decision-making Ultimately, data reigns in modern financial institutions and criminals will go to incredible lengths to get their hands on it. Even if you re doing everything right from a security standpoint, your institution could still suffer a breach. This white paper: Explores the financial industry regulatory landscape along with some of the key trends that are influencing institutional operations. Explains how identity and data breach defense services can help your bank or credit union: Meet customer expectations Comply with state data breach laws while improving your standing with federal regulators Protect your brand reputation. Provides five tips for choosing a good identity and data breach defense services provider. WIDESPREAD THREATS, WORRIED CUSTOMERS Financial institutions face escalating and increasingly sophisticated cyber threats that put their relationship with customers at risk. FIs are under pressure to innovate for their customers, yet technological advancements are a double-edged sword. On the one hand, new technology brings customer convenience and greater engagement. On the other hand, it creates more customer and employee access points and the potential for security risks and gaps. Everyone from lone actors and insiders to criminal organizations may be looking for opportunities in those gaps. Criminals use FAST FACT: The finance sector experiences 300 percent more security incidents than other sectors. 1 1 Guide to Cybersecurity for Financial Services Firms, Lockheed Martin Corp.,
3 methods ranging from hacking to social engineering to malware to find holes in processes and systems, and get at money in different ways. Sometimes, such as with account takeover or ransomware, it s direct. But there are plenty of indirect crimes related to data breaches. For example, crimes such as identity theft and new account fraud can go undiscovered for months or even years, in some cases. The Customer Protection Dilemma Customers are increasingly aware that they face risks online but that doesn t mean they act accordingly. 94 percent of millennials rely on online banking 3 yet 24- to 35 year-olds face the highest incidence of fraud and are least likely to take preventive measures percent of millennials and 77 percent of baby boomers worry about online fraud 4... yet consumers who don t believe they can effectively protect their financial data often ignore preventive measures. 6 GETTING TO THE HEART OF DATA-RELATED COMPLIANCE CHALLENGES Federal and state regulations related to data and customer protections are a confusing mishmash of rules. What s more, federal agencies tasked with protecting consumers add complexities and unknowns to compliance efforts. At the federal level, banking regulations are generally focused either on what happens before data is lost or on preventing fraud. There are no specifications about what financial institutions must do once data is lost. For example: Gramm-Leach-Bliley Act requires financial institutions to explain their information-sharing practices to their customers and to safeguard sensitive data. 8 The Identity Theft and Assumption Deterrence Act of 1998 makes the FTC a central clearinghouse for identity theft complaints. It requires the FTC to log and acknowledge complaints, provide victims with relevant information and refer complaints to appropriate entities. 9 The Sarbanes-Oxley Act mandated a number of reforms to enhance corporate responsibility, boost financial disclosures and combat corporate FAST FACT: 80 percent of financial instiutions cite cyber risks as a top concern. 2 2 Guide to Cybersecurity for Financial Services Firms. 3 There s no slowing down millennials, First Data Corporation, Online Fraud Perceptions: Millennials Vs. Boomers, ThreatMetrix, Identity Fraud Report, Javelin Strategy & Research Identity Fraud: Fraud Hits an Inflection Point. 7 Online Fraud Perceptions: Millennials Vs. Boomers, ThreatMetrix, Gramm-Leach-Bliley Act, Federal Trade Commission, gramm-leach-bliley-act. 9 The Identity Theft and Assumption Deterrence Act of 1998, Federal Trade Commission, enforcement/statutes/identity-theft-assumption-deterrence-act
4 and accounting fraud. It created the Public Company Accounting Oversight Board to oversee the activities of the auditing profession. 10 Key fraud and data privacy laws aside, several agencies also have mandates to protect consumers. Take the Consumer Financial Protection Bureau (CFPB), which is tasked with ensuring that banks, lenders and financial companies treat consumers fairly. 11 The CFPB can create new rules or guidelines or even go after institutions for an inadequate response to a data breach. But it s difficult to know how they may respond to different scenarios until they take enforcement actions. A majority of states at least require written notification in the event of a breach. But beyond that it s the Wild West, with varying rules from state to state. Let s briefly look at some of the considerations around the more opaque regulatory bodies and state-by- state compliance. STATE-LEVEL REGULATORY CHALLENGES Today, forty-seven states mandate that entities provide at least written notification in the event of a data breach. The timelines for notifications and requirements, however, vary. For example, Connecticut mandates that organizations provide breach notifications within 90 days. When Social Security numbers are exposed, organizations must also provide appropriate identity theft protection or mitigation services at no cost for at least a year. 12 In Oregon, on the other hand, businesses must notify customers of breaches impacting more than 250 people and provide a sample copy of the breach notification to the Oregon Attorney General. 13 Only Alabama, New Mexico and South Dakota currently have no requirements. State-level regulations are also evolving rapidly. In 2015 alone, 33 states considered new bills or resolutions. Most of the bills were focused either on reporting breaches to stage agencies or on broadening the types of personal information that should be considered in a security breach. Meanwhile, New York s Department of Financial Services made news by introducing some of the most stringent and far-reaching cyber security rules to date. The new roles, scheduled to go into effect in March 2017, focus on improving cyber security programs, governance and formal processes, among other requirements. Given evolving threats and increasing citizen awareness, it s likely that other states will adopt similar regulations in the future. A federal law could simplify matters to some extent, but currently there are no options in the works. THE CONSUMER FINANCIAL PROTECTION BUREAU The CFPB has a broad mandate, with a lot of room for interpretation. That s why many financial institutions are uneasy about what they need to be doing to protect customers and themselves from regulatory actions. The CFPB s goal is to protect consumers and promote fair, transparent and competitive markets. 15 At a high level, 10 Sarbanes-Oxley Act of 2002, U.S. Securities and Exchange Commission, shtml#sox Consumer Financial Protection Bureau, 12 New data security law in Connecticut imposes new requirements on businesses, regulated entities, and state contractors, Data Protection Report, July 27, Search Data Security Breaches, Oregon Department of Justice and Consumer protection Security Breach Legislation, National Conference of State Legislatures, December Compliance and Guidance, Consumer Financial Protection Bureau. 3
5 the CFPB has similar consumer protection jurisdiction over the banks and credit unions that the Federal Trade Commission has over practically every other type of business in the U.S. In other words, the banking industry has its very own federal consumer protection agency. 16 How the CFPB is going to pursue its mandate in the financial industry is unclear. Just consider that the CFPB pursued its first data security enforcement action in 2016 against an online payments company. The CFPB alleged the company was misrepresenting data security practices. It hit the offender with a $100,000 fine and training and security requirements and there wasn t even a breach. 17 It remains to be seen how the CFPB may react in the event of an actual breach incident with a financial institution. The CFPB does note that identity monitoring or identity theft protection services may help consumers correct identity theft related problems, but that the terms and conditions of the service are especially important. For example, it suggests that consumers carefully consider service options, making sure that: free trial offers don t include hidden fees, trial periods or cancellation requirements the provider hasn t been subject to actions by local consumer protection agencies or the state attorney general s office. 18 THE OFFICE OF THE COMPTROLLER OF THE CURRENCY The OCC has made cyber security actions a key focus area in recent years. Yet the OCC is far from definitive on what has to be done to protect consumers. The lack of clarity leaves significant leeway for enforcement actions. The OCC has participated in a Federal Financial Institutions Examination Council (FFIEC) effort to use a Cyber Security Assessment Tool that is designed to help institutions identify their risks and determine their cybervsecurity preparedness. 19 With respect to oversight, however, the OCC s role is limited to national banks, federally chartered savings and loan associations, federal branches and agencies of foreign banks and IAPs. 20 INDUSTRY TRENDS COMPLICATE MATTERS Financial industry trends don t make responding to broad and vague compliance challenges any easier. In a nutshell, many strategic areas that require near-term actions also create new security concerns and potential data exposure points. Let s briefly explore industry trends that are critical to competitiveness, yet add to challenges around protecting business and customer data and meeting regulatory guidelines. 16 How the CFPB and the FTC Interact, CFPB Monitor, July 7, 2011, 17 No Breach Required: CFPB Conducts First Data Security Enforcement Action, Quarles and Brady LLP, March What is Identity Monitoring or Identity Theft Protection Service?, Consumer Financial Protection Bureau, askcfpb/1369/what-identity-monitoring-or-identity-theft-protection-service.html. 19 Cybersecurity Assessment Tool, Federal Financial Institutions Examination Council, Enforcement Actions, Office of the Comptroller of the Currency. 4
6 TARGETING MILLENNIALS AND HIGH-NET-WORTH CUSTOMER SEGMENTS Whether you are focusing marketing efforts on millennials or high-income households, their data is at a premium not only for your institution, but also for thieves and fraudsters. The importance of winning over key customer segments can t be understated when it comes to ongoing success. Millennial Fast Facts 21 High-Value Customer Fast Facts Will control nearly $2 trillion in liquid assets by 2020 Control 41 percent of deposits percent believe they won t need a bank in five years $5.8 trillion in investable assets percent would have no issue with switching banks in the next few months 3.5 times more likely to consider switching financial institutions than other consumers 24 THE NEED FOR MOBILITY AND DIGITAL ENGAGEMENT Today s customers expect cutting-edge engagement options with financial institutions. Easy access to their accounts and products through their smart phones is especially important. The expectations are only increasing with fit tech companies from Silicon Valley entering the mix with the expectation that their technical chops can better meet customers evolving needs. 25 The new competition means that established financial institutions need to ensure that they are providing cutting-edge services. THE NEED TO LEVERAGE BIG DATA Analytics technologies have opened up new frontiers in understanding and serving customers, as well as compliance dangers. The ability to better see and analyze customer behaviors to stay ahead of the curve in meeting their requirements could provide tremendous values to financial institutions and their customers alike. Yet, if not managed correctly, could also present dangerous data exposure points. 21 There s No Slowing Down Millennials, First Data, Top Trends for Digital Financial Services in 2015, Javelin Strategy & Research, March New Moneyhawks: Highly Profitable and Engaged Customers Defining the Future of Banking, Javelin Strategy & Research, Top Trends for Digital Financial Services in 2015, Javelin Strategy & Research, Trends in Banking and Payments, Javelin Strategy, January
7 TECHNOLOGY INTEGRATION AND CHANGES IN INTERNAL PROCESSES Financial institutions need integrated systems that can securely share data in real time to support mobility, analytics and other key capabilities and technologies. The importance of technology integration will only increase as new players enter the competitive landscape and the requirements to keep customers loyal continues to grow. GETTING ON THE RIGHT TRACK Figuring out how to respond to this mix of industry trends and challenges is no small feat. Unfortunately, there is no silver bullet. One thing is clear: Data protection strategies that consider what should be done after a data breach or loss can help: improve standing with regulators foster customer trust and loyalty. Most consumers contact their financial institution after they discover identity theft. That means financial institutions that partner with identity protection services can generate significant value for their customers. How? By easing the pain and cost of responding to fraud. 26 For example, with new account fraud, which drives the most damage to victims over any other type of fraud, victims spend an average of 15 hours trying to resolve the fraud. With expert support, the time and stresses can be reduced significantly. Ultimately, even regulators understand that no data security plan is foolproof. That s why the ability to show due diligence on post-breach response, in addition to enhancing security, is important. It underpins a stronger case for avoiding regulatory actions and fines. It s not enough to simply make a post-breach response offering or program available, however. To satisfy customers and regulators, you need to ensure that: sign-up is easy the services do not mislead or misdirect your customers in any way the offer blends almost seamlessly with other services. THE 5 THINGS TO LOOK FOR IN A PARTNER In today s financial world, identity and data breach defense solutions make a lot of business sense. A good solution provider can help your institution, employees and customers to recover from data breaches or fraud much faster and with much less frustration, expense and pain. The best-in-class solutions can even help enhance 26 Small Business Fraud Report, Javelin Strategy & Research,
8 your portfolio and brand reputation by providing 24/7 top-quality care for customers through channels that work seamlessly as an extension of your brand from the initial call through resolution. As with any type of service, provider choice can have a dramatic influence on the actual value of an identity and data breach defense solution. So what are some key things you should consider as you evaluate provider options? Here are five things that should be at the top of your list. 1. INDUSTRY KNOWLEDGE Compliance takes more than basic identity and data protections. Given the constantly evolving regulatory complexities, it s critical to choose a provider that: focuses on the financial service industry knows the regulatory requirements for every state you operate in and has the ability to help you respond in each of those states understands how to help you meet the requirements of key agencies, including the CFPB. 2. BRAND EXTENSION A provider capable of providing a personalized touch to service can help you increase customer loyalty and grow your bottom line. A good identity and data breach defense solutions provider should be a true partner, from onboarding through implementation, training and ongoing account management. 3. REPUTATION A trusted provider with a longstanding and outstanding reputation in financial services is critical. After all, your identity and data breach defense solutions provider will be so closely associated with your brand. Carefully consider: other clients a provider works with customer satisfaction ratings the average experience of the fraud specialists who will be handling your customers calls. Red flag: Providers who want to direct sell or upsell your customers. FAST FACT: Consumers rank reputation and low-cost as the most important attributes of a solution provider Identity Protection Services Scorecard, Javelin Advisory Services, June
9 4. ADDED VALUE The right solution should contribute to your institution s compliance posture and brand reputation. It should also deliver significant value relative to the cost. Look for a provider capable of providing: consistent, proactive service in resolving all of your customers identity theft concerns clear terms and easy enrollment (this is a must for a successful program that regulatory bodies will view favorably). 5. SOLUTION DEPTH AND SCALABILITY A good identity and data breach defense solution isn t just reactive it s proactive. Here are key qualities to look for: A product delivery team with a proven ability to stay ahead of the curve with solutions that meet customers evolving requirements. A solution that engage and help educate your customers. This not only promotes better information protection practices and peace of mind; it can improve customer loyalty. A provider capable of keeping up with fast-evolving threats and regulations by updating policies and products as the landscape shifts. CONCLUSION Chances are, there will never be a time when it s totally clear what your institution needs to do to comply with federal and state regulations. However, the fact that you don t want to get robbed and you want to protect your customers best interests will never change, so there will always be motivation to do the right thing from a security standpoint when it comes to securing data. If there was a sure thing when it comes to data security, this would be enough. Since there are no sure things in data security, and since your customers will turn to you for help if and when their data is compromised, reputable identity and breach defense services can be a smart investment. 8
THE IMPORTANCE OF DEVELOPING A SOCIAL MEDIA COMPLIANCE POLICY
THE IMPORTANCE OF DEVELOPING A POLICY Why Your Financial Institution Needs to Have a Proactive Policy in Place BY OPTIMAL BLUE e-series of 7 WHITE PAPER THE IMPORTANCE OF DEVELOPING A POLICY Why Your Financial
More informationThe Role of the VMO in Regulatory Compliance Planning, Due Diligence and Contract Negotiation
: The Role of the VMO in Regulatory Compliance Planning, Due Diligence and Contract Negotiation David England, Director, ISG ISG WHITE PAPER 2017 Information Services Group, Inc. All Rights Reserved EXECUTIVE
More informationThe Finance Digital Executive s Playbook for Adopting a Conversational Approach to Mobile Banking
The Finance Digital Executive s Playbook for Adopting a Conversational Approach to Mobile Banking Content DETERMINING YOUR MOBILE STRATEGY... 4 THE STATE OF ONLINE FINANCE... 4 THE BENEFITS OF A CONVERSATIONAL
More information20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.
20 Signs That Your Business is Ready for Managed Services Find out when your business will truly benefit from a technology provider. Are managed services necessary for your business? Any company doing
More informationYour Business Needs Managed Services. Find out when your business will truly benefit from a technology provider.
Your Business Needs Managed Services Find out when your business will truly benefit from a technology provider. Are managed services necessary for your business? Any company doing business today is tied
More information20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.
20 Signs That Your Business is Ready for Managed Services Find out when your business will truly benefit from a technology provider. Are managed services necessary for your business? Any company doing
More information20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.
20 Signs That Your Business is Ready for Managed Services Find out when your business will truly benefit from a technology provider. Are managed services necessary for your business? Any company doing
More informationCertified Identity Governance Expert (CIGE) Overview & Curriculum
Overview Identity and Access Governance (IAG) provides the link between Identity and Access Management (IAM) rules and the policies within a company to protect systems and data from unauthorized access,
More informationFinancial Institutions Consulting. Quality service. Personal attention.
Financial Institutions Consulting Quality service. Personal attention. Why Weaver? With more than 65 years of experience and a commitment to our financial institution clients, Weaver is established as
More informationEmpowering Customer Analytics, Fraud Detection, and Threat Assessment. Whitepaper
Empowering Customer Analytics, Fraud Detection, and Threat Assessment Whitepaper EMPOWERING CUSTOMER ANALYTICS, FRAUD DETECTION, AND THREAT ASSESSMENT October 2015 novetta.com 2015, Novetta Most organizations
More informationVARTECH NATION. EMV Certification for IT Professionals
The modern credit card is an American invention but in the twenty-first century, Europe has led the way in credit card technology. The first smart cards, equipped with their own computer chips, showed
More informationFrom Insurance Agent to Trusted Advisor: How to Cultivate Customer Loyalty
From Insurance Agent to Trusted Advisor: How to Cultivate Customer Loyalty Introduction Policyholders expectations have changed. No longer are they satisfied with an adequate service experience from their
More informationTransparency and Success in Third-Party Collections
Transparency and Success in Third-Party Collections Table of Contents 3 Introduction 4 The Case for Transparency 6 A Philosophy of Collection 8 Three Keys To Building Transparent Outsourcing Partnerships
More informationLegal Risks For Consumer Products Cos. In 2018: Part 2
Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Legal Risks For Consumer Products Cos. In
More informationWHITE PAPER 5 QUESTIONS YOU SHOULD ASK YOUR PAYROLL PROVIDER
5 QUESTIONS YOU SHOULD ASK YOUR PAYROLL PROVIDER Smart strategies to ensure you get the services you need for your business to grow Managing payroll in-house is not uncommon for a business start-up, where
More informationPROACTIVE ADOPTER SERIES: Embracing foundational benefits of IT security
PROACTIVE ADOPTER SERIES: Embracing foundational benefits of IT security In a world where small and midsize businesses (SMBs) are constantly looking for ways to costeffectively increase productivity and
More informationThe Changing Face of Fraud
The Changing Face of Fraud Fraud Prevention Data Protection Cyber Security Credit Card Protection Introduction Fraud is not a new phenomenon In our increasingly digital world, it s an issue that everyone
More informationMNP COMMERCIAL REAL ESTATE & CONSTRUCTION INDUSTRY SERVICES
MNP COMMERCIAL REAL ESTATE & CONSTRUCTION INDUSTRY SERVICES The commercial real estate and construction industry is dynamic. Changes in the economy, fluctuating interest rates and shifts in demand can
More informationTHINK YOU NEED A BYO STRATEGY? THINK AGAIN. Shift to a Digital Workspace Strategy in 5 Steps
THINK YOU NEED A BYO STRATEGY? THINK AGAIN. Shift to a Digital Workspace Strategy in 5 Steps Your BYO Strategy Isn t Necessary Anymore Bring Your Own Device (BYO) strategies have been common in IT organizations
More informationREGULATORY COMPLIANCE. Dynamic Solutions. Superior Results.
REGULATORY COMPLIANCE Dynamic Solutions. Superior Results. STREAMLINE, STRENGTHEN AND SIMPLIFY YOUR COMPLIANCE EFFORTS CSI S AUTOMATED, DYNAMIC SOLUTIONS MITIGATE RISK, DECREASE COSTS AND IMPROVE COMPLIANCE
More informationThe top 8 reasons. to outsource your IT. to a managed services provider
The top 8 reasons to outsource your IT to a managed services provider INTRODUCTION The way we work is changing. Where once we had in-house IT teams looking after every aspect of IT operations, the cloud
More informationThe Worry-Free IT Investment
The Worry-Free IT Investment who we are At Cobb Technologies, we use experience to solve the everyday problems our clients face. In addition to over 25 years of hands-on industry knowledge, we remain on
More informationCustomers expectations compared to banks perception. Brussels, 25 May 2012
Customers expectations compared to banks perception Brussels, 25 May 2012 The E&Y Global Consumer Banking Survey 2012 This is Ernst & Young s latest survey of retail banking customers around the world.
More informationOperational integrity enhancement
Operational integrity enhancement In the past, regulators did not exert much influence over a company s information systems as long as those systems operated within reasonable standards of safety, soundness,
More informationDigital Transformation in Financial Services
The IT Innovator s Guide to Digital Transformation in Financial Services 2018 Introduction The Financial Services Industry: A Snapshot Technologies Necessary for Digital Transformation Building the Infrastructure
More informationOne tough customer. How Gen Z is challenging the competitive landscape and redefining omnichannel
One tough customer How Gen Z is challenging the competitive landscape and redefining omnichannel Customer focus is shifting from product to experience. Omnichannel s new frontier, experience excellence
More information5 WAYS AUTOMATED EMPLOYEE SCHEDULING CAN INCREASE EFFICIENCY AND REDUCE LABOR COSTS
5 WAYS AUTOMATED EMPLOYEE SCHEDULING CAN INCREASE EFFICIENCY AND REDUCE LABOR COSTS Introduction Managing employee scheduling using tools such as Excel is a complicated, error-prone and time consuming
More informationJustice matters How our change programme will make services better for everyone who uses them
Justice matters How our change programme will make services better for everyone who uses them 2 Justice matters Infographic We're transforming the way we deliver justice because justice matters Our guiding
More informationAML for MSBs & FinTech: The Compliance Conundrum. Insight Article. Copyright 2016 NICE Actimize. All rights reserved.
AML for MSBs & FinTech: The Compliance Conundrum Insight Article Copyright 2016 NICE Actimize. All rights reserved. TABLE OF CONTENTS FinTech Innovation Collides with Reality... 3 Compliance Challenges
More informationBoards and internal audit: Working together to strengthen risk management
Boards and internal audit: Working together to strengthen risk management Growing demands on boards The role of the board has always been an important and demanding one, but today s board members face
More informationInformation Security in ITES & BPO I T S E R V I C E S B P O S O L U T I O N S
Information Security in ITES & BPO I T S E R V I C E S B P O S O L U T I O N S 1 Agenda Gaps in Information Security Information Security Risk Governance Standards Industry Regulation Information security
More informationA digital experience that clicks with your workforce
Explore enterprise workforce use cases for AI Bots. A digital experience that clicks with your workforce This executive guide provides a quick look into the most common, initial internal bot use cases
More informationThe Future Moves Fast: Are You Ready to Respond?
The Future Moves Fast: Are You Ready to Respond? Embracing change with confidence: the future of indirect tax Disruption is here. Are you on the right side? In an age of nonstop innovation, simplicity
More informationUtility. Commercial Customer Engagement: The Five Analytics Strategies
Utility Commercial Customer Engagement: The Five Analytics Strategies Introduction Historically, the utility-commercial customer relationship has been relatively simple: the utility supplies reliable power
More informationInsurance Accounting & Systems Association (IASA): NY/NJ Chapter Spring 2014
Insurance Accounting & Systems Association (IASA): NY/NJ Chapter Spring 2014 State of Information Security by Deloitte & Touche LLP May 20, 2014 As used in this document, Deloitte means Deloitte & Touche
More informationMastering Wellbeing & Compliance. Practical advice on how to protect people, reputations and revenues
Mastering Wellbeing & Compliance Practical advice on how to protect people, reputations and revenues Page 2 Introduction: Reputation is capital An organization s reputation is founded on trust. In a time
More informationEY Center for Board Matters Boards and internal audit
EY Center for Board Matters Boards and internal audit Working together to strengthen risk management Growing demands on boards The role of the board has always been an important and demanding one, but
More informationCreating Highly Engaged (and) Satisfied Clients
A thinkjar Thought Leadership Series Creating Highly Engaged (and) Satisfied Clients How to make self-service an effective part of a service resolution timeline, from preventive to automated, while ensuring
More informationCombating Fraud and Data Breaches
Combating Fraud and Data Breaches End-to-end strategic management insights Overview In 2014, the number of data breaches increased nearly 28%, according to the Identity Theft Research Center (IRTC). The
More informationVendor Management Risk Mitigation:
Vendor Management Risk Mitigation: The Importance of Having a Formalized Methodology Sun Life Financial Laura Williams AVP, Procurement Opus Sam Mele Vice President Sales sig.org/summit Case Study: Supplier
More informationBanking in the Balance: Security vs. Convenience. IBM Trusteer s Valerie Bradford on How to Assess Digital Identities
Banking in the Balance: Security vs. Convenience IBM Trusteer s Valerie Bradford on How to Assess Digital Identities In an interview about overcoming these challenges, Bradford discusses: The fundamental
More informationHow. Gen. Driving Financial Industry. Change MARKETING SERVICES
How Gen is Driving Financial Industry Change MARKETING SERVICES Intro Financial marketers are being put to the test as fairly predictable generations of customers give way to the less familiar and less
More informationComplete Guide to Configure-Price-Quote Solutions
Complete Guide to Configure-Price-Quote Solutions Transforming Sales with CPQ. Forrester predicts that by 2020, a significant volume of business will be transacted online with digital commerce projected
More information2018 STATE OF GLOBAL CUSTOMER SERVICE REPORT 2018 STATE OF GLOBAL CUSTOMER SERVICE REPORT
2018 STATE OF GLOBAL CUSTOMER SERVICE REPORT 1 2018 STATE OF GLOBAL CUSTOMER SERVICE REPORT INTRODUCTION CUSTOMER EXPECTATIONS CONTINUE THEIR STEADY CLIMB As customer expectations continue to climb, it
More informationPCI Toolkit
PCI Toolkit The following document will define "PCI-DSS" (The Payment Card Industry Data Security Standard) and why it is important for your business. As always, if you need further assistance, please
More informationThe Security Profession November 2007
Dr. Richard Reiner Chief Security & Technology Officer TELUS Security Solutions The Security Profession November 2007 Questions to consider Is information security a profession? Why or why not? Do we want
More informationMobile Banking Impact: Quantifying the ROI and Customer Engagement Benefits. Understanding the Value of Engaging Consumers in the Mobile Channel
Mobile Banking Impact: Quantifying the ROI and Customer Engagement Benefits Understanding the Value of Engaging Consumers in the Mobile Channel It goes without saying that mobile is an important channel
More informationMONITORING YOUR EMPLOYEES SOCIAL MEDIA ACTIVITY
MONITORING YOUR EMPLOYEES SOCIAL MEDIA ACTIVITY How to Maintain Compliance and Your Corporate Reputation While Promoting Use of Social Media BY OPTIMAL BLUE e-series of 7 WHITE PAPER MONITORING YOUR EMPLOYEES
More informationACTING IN THE SPIRIT OF SERVICE Information gathering and public trust
ACTING IN THE SPIRIT OF SERVICE Information gathering and public trust Model standards for information gathering associated with regulatory compliance, law enforcement and security functions. Effective
More informationMake Your Business Stronger with Smarter Customer Insights
Make Your Business Stronger with Smarter Customer Insights Survey Dynamix Survey Dynamix Smarter Customer Insights Give Businesses The Competitive Edge It s a highly competitive landscape out there for
More informationFraud Controls to Tackle the Mobile Revolution
Fraud Controls to Tackle the Mobile Revolution TABLE OF CONTENTS Overview... 3 Today s Challenges for Financial Institutions... 3 Mobile-Enabled Fraud Mitigation... 5 Identify & Combat Mobile-Enabled Fraud
More informationThe agent of the future. EY survey reveals the need for digital sales tools and closer collaboration with insurance carriers
The agent of the future EY survey reveals the need for digital sales tools and closer collaboration with insurance carriers The agent of the future is emerging as a proactive advisor in a digital world.
More informationThe Fourth Way and a Better Way
WHITE PAPER The Fourth Way and a Better Way Staying competitive in the payments arena Trends and technology continue to increase the ways consumers and businesses can make and receive payments. As a digital
More informationHappy Customers, Happy Bottom Line. Provide top customer experiences with agile customer care.
Happy Customers, Happy Bottom Line. Provide top customer experiences with agile customer care. The World of Customer Experience Has Changed The importance of agility in business is not breaking news. With
More informationInternal audit insights High-impact areas of focus
Internal audit insights High-impact areas of focus Introduction In any organization, there are numerous areas where Internal Audit s objectivity, perspective, and skills can assist stakeholders and provide
More informationCase Study. How Gemalto s Trust ID Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform
Case Study How Gemalto s Trust Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform Traditional know-your-customer (KYC) processes are costly, complex
More informationIs Technology Investment in Private Banks Worth It?
Is Technology Investment in Private Banks Worth It? By Ife Famuyibo, Senior Consultant Banks today have a number of key objectives if they are to succeed grow profitably and maximise efficiency, increase
More informationPMS Software Evaluation Scorecard
PMS Software Evaluation Scorecard Find your PMS match with this easy-to- use scorecard. info@stayntouch.com 301-358-1356 stayntouch.com How to use this Scorecard Investing in the right HOTEL PMS solution
More informationStriking a Healthy Balance. What Employees Really Want Out Of Workplace Benefits Communication
Striking a Healthy Balance What Employees Really Want Out Of Workplace Benefits Communication Striking a Healthy Balance What Employees Really Want Out Of Workplace Benefits Communication Digital technology
More informationU.S. COMMUNITY BANK RESULTS. Creating a New Level of Bank Service for Community Bank Customers U.S. COMMUNITY BANKS 1
U.S. COMMUNITY BANK RESULTS Creating a New Level of Bank Service for Community Bank Customers U.S. COMMUNITY BANKS 1 CREATING A NEW LEVEL OF SERVICE FOR U.S. COMMUNITY BANK CUSTOMERS Welcome to the third
More informationConvercent All Rights Reserved.
Aligning Culture and Governance for Better Compliance A new approach to Governance, Risk and Compliance that creates better policies and more engaged employees to reduce incidents CONTENTS 4 5 5 7 8 Better
More informationTrends Shaping the Bank of the Future
Trends Shaping the Bank of the Future MBA Bank Management and Directors Conference November 30, 2017 Timothy Reimink Managing Director 2017 Crowe Horwath 2017 Crowe Horwath LLP 1LLP This presentation was
More informationStriking a Healthy Balance. What Employees Really Want Out Of Workplace Benefits Communication
Striking a Healthy Balance What Employees Really Want Out Of Workplace Benefits Communication Striking a Healthy Balance What Employees Really Want Out Of Workplace Benefits Communication Digital technology
More informationThe EU raises the bar on data privacy:
The EU raises the bar on data privacy: AIM for an integrated response Organizations can view the EU s General Data Protection Regulation (GDPR) as either a problem or an opportunity. Grant Thornton sees
More informationInternational Finance Corporation
International Finance Corporation Corporate Governance and Internal Audit Overview Bob Lamm Independent Senior Advisor Center for Corporate Governance Deloitte LLP Neil White Global IA Analytics Leader
More informationFirm Profile TURNING RISKS INTO OPPORTUNITIES
Firm Profile TURNING RISKS INTO OPPORTUNITIES You can measure opportunity with the same yardstick that measures the risk involved. They go together. Earl Nightingale TRUSTED ADVISORS RiSK Opportunities
More informationCLOUD SOFTWARE, ACTIONABLE DATA, SCALABLE SOLUTIONS:
CLOUD SOFTWARE, ACTIONABLE DATA, SCALABLE SOLUTIONS: AS THE RESTAURANT INDUSTRY CHANGES, THESE ARE JUST A FEW ITEMS THAT ABSOLUTELY HAVE TO BE ON YOUR MENU The restaurant industry is changing at an unprecedented
More informationENABLING THE BUSINESS WITH SOCIAL RELATIONSHIP PLATFORMS
W H I T E PA P E R ENABLING THE BUSINESS WITH SOCIAL RELATIONSHIP PLATFORMS AN EASY WIN FOR STRATEGIC CIOs THE ROLE OF THE IT LEADER IS CHANGING. CIOs must shift their focus from keeping the lights on
More informationA Changing Profession for a Changing Market: Evolving services, skills and talent to meet business demands
AICPA Conference on Current SEC and PCAOB Developments December 4-6, 2017 Washington, DC (and online) Kimberly N. Ellison-Taylor, CPA, CGMA Chairman, American Institute of CPAs Remarks As Prepared for
More informationEnterprise Compliance Management for Credit Unions
Enterprise Compliance for Credit Unions Streamline Regulatory Compliance with a Unified Platform to Manage Requirements and Demonstrate Compliance to Regulators Industry Challenge Credit unions are subject
More informationHSO.COM. HSO Managed Services. 24/7 business availability that works the way you do. Whitepaper HSO Managed Services
HSO.COM HSO Managed Services 24/7 business availability that works the way you do Whitepaper HSO Managed Services 2 Stay Competitive With 24/7 Access to Business Applications 4 Disruption Causes Deep Damage
More informationBUILDING A BUSINESS CASE FOR PAPERLESS TREASURY SOLUTIONS
BUILDING A BUSINESS CASE FOR PAPERLESS TREASURY SOLUTIONS Treasury management onboarding is a complex, time- and paper-intensive operation for banks and their customers. Not surprisingly, corporate customers
More informationDefining and promoting excellence in the provision of mobile money services
SAFEGUARDING OF FUNDS DATA PRIVACY AML/CFT/FRAUD PREVENTION STAFF AND PARTNER MANAGEMENT CUSTOMER SERVICE TRANSPARENCY QUALITY OF OPERATIONS SECURITY OF SYSTEMS Defining and promoting excellence in the
More informationQuick Base s Third Annual Report State of Business Apps 2017: The Future of Problem Solving Fall 2017
Quick Base s Third Annual Report State of Business Apps 2017: The Future of Problem Solving Fall 2017 1 contents Executive Summary Survey Demographics Deep Dive Who s Solving Business Problems with No-code
More informationHow Financial Chatbots Are Transforming Digital Banking Produced by Abe
How Financial Chatbots Are Transforming Digital Banking Produced by Abe Abe builds conversational banking solutions for progressive community banks. CONTENTS Keeping Pace with Evolving Financial Technologies....3
More informationGREAT SERVICE NEVER STOPS.
GREAT SERVICE NEVER STOPS. At Tata Communications, we understand that how we do things is every bit as important to our customers as the things that we do. So we re always flexible, always available, and
More informationProcurement Executive s Outlook: The Future of Travel Spending. Insights from the procurement manager for Booking.com
Procurement Executive s Outlook: The Future of Travel Spending Insights from the procurement manager for Booking.com 1 Table of content Controlling Travel Spend: Keeping Travellers on the Right Spending
More informationOVER THE PHONE CREDIT CARD FRAUD: A PCI Compliance Guide for Business and Government
OVER THE PHONE CREDIT CARD FRAUD: A PCI Compliance Guide for Business and Government The pace of business today is real-time and instant. Customers want products and services the moment they feel they
More informationtotal energy and sustainability management WHITE PAPER Utility Commercial Customer Engagement: The Five Analytics-Enabled Strategies that Matter Most
total energy and sustainability management WHITE PAPER Utility Commercial Customer Engagement: The Five Analytics-Enabled Strategies that Matter Most TABLE OF CONTENTS INTRODUCTION 3 Strategy #1: Target
More informationThe Intelligent Lending Platform
The Intelligent Lending Platform How Roostify Helps You Win Summer 2018 Disruption-Proofing Your Firm: What Lenders Can Learn From the Consumer-First Revolution I 1 The lending industry is in the midst
More informationThe Benefits of First- and Second-Line Monitoring
September 2018 The Benefits of First- and Second-Line Monitoring An article by Clayton J. Mitchell, CAMS, and Matthew J. Schuster, CPA, CRCM Audit / Tax / Advisory / Risk / Performance Smart decisions.
More informationRSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, anti-virus, intrusion prevention systems, intrusion
More informationIT Governance and the Audit Committee Recognizing the Importance of Reliable and Timely Information
IT ADVISORY IT Governance and the Audit Committee Recognizing the Importance of Reliable and Timely Information KPMG INTERNATIONAL IT Governance and the Audit Committee: Recognizing the Importance of
More informationWhy digital governance matters
insights for 5executives Why digital governance matters In a digital world, new approaches to governance are vital for minimizing risks and maximizing performance Of special interest to Chief operating
More informationAutomotive finance. October 2014
Automotive finance October 2014 3 Automotive finance Growing in a changing environment The auto finance market has been in recovery since 2008. Record low interest rates, access to credit and new market
More informationTHE HIDDEN LANDMINE IN BIG DATA
Bridging the Trust Gap THE HIDDEN LANDMINE IN BIG DATA By John Rose, Frederik Lang, and Alexander Lawrence This is the first in a series of articles exploring what really matters for organizations that
More informationThink of the customer journey Mobile is a must-have POS must get personal Upselling and cross-selling
Digital technology has transformed the world and people s expectations when it comes to many industries, including retail. Many retailers are, however, behind the curve, using technology that cannot deliver
More informationProject Portfolio Management Assessment
Management Assessment PREPARED FOR: Ross Little, IAG DIAGNOSTIC PROGRAM POWERED BY INFO-TECH RESEARCH GROUP January 13th, 2017 Powered by: Data is comprised of feedback from 2 respondents, including: James
More informationVendor Management Challenges and Expectations An Open Discussion April 13, 2017
1 Practical solutions driving tangible results Vendor Management Challenges and Expectations An Open Discussion April 13, 2017 Agenda Common Themes Discussion Expectations Overcoming Obstacles Common Comments
More informationYour Guide to Building an Effective Analytics Strategy
ANALYTICS Your Guide to Building an Effective Analytics Strategy Turn your insights into results From large banks and credit unions to community financial institutions (FIs), the idea of putting analytics
More informationState of Card Fraud: 2017
State of Card Fraud: 2017 What you need to know about the State of Fraud in 2017, including EMV updates, ongoing threats and how it s impacting financial institutions. EMV Adoption Update State of Card
More informationReady or Not: SMBs and the GDPR
Ready or Not: SMBs and the GDPR Introduction The deadline for General Data Protection Regulation (GDPR) compliance draws closer for organisations across the world. With fewer than 12 months to ensure compliance
More informationGuide To FCA Authorisation
H3 Consultancy Ltd Guide To FCA Authorisation 1. Introduction In order to carry on a regulated activity under the Financial Services and Markets Act you either need FCA authorisation or to be exempt i.e.
More informationWHITE PAPER. 6 Best Practices that Increase Check Program Profitability
WHITE PAPER 6 Best Practices that Increase Check Program Profitability E-payments have unquestionably transformed the marketplace, making the concept of a paperless world seem more possible than ever.
More informationAMPLIFYING EMPLOYEE ENGAGEMENT & PRODUCTIVITY
AMPLIFYING EMPLOYEE ENGAGEMENT & PRODUCTIVITY Your guide to proven strategies that help energize your staff and build an engaged, productive workforce TM Amplifying Employee Engagement & Productivity 1
More informationThe Vendor Management Disconnect: Why Credit Unions are Unhappy with their Vendor Management Program
The Vendor Management Disconnect: Why Credit Unions are Unhappy with their Vendor Management Program Results from Abound Resources 2010 Survey: Vendor Management in Credit Unions Table of Contents Executive
More informationFraud Investigation & Dispute Services. Forensic analysis and global experience: the intelligent connection
Fraud Investigation & Dispute Services Forensic analysis and global experience: the intelligent connection Protect your company s reputation and reduce financial risk Businesses are always under scrutiny
More informationMaking PayPal work for you. Welcome Kit
Making PayPal work for you Welcome Kit How to get the most out of your PayPal account Table of Contents How PayPal Works Paying with PayPal At the speed of want Pay anyone, anywhere Accepting Payments
More information7 Ways Technology Is Helping. Property Managers Gain Control Over Chaos
7 Ways Technology Is Helping Property Managers Gain Control Over Chaos 1 Control Over Chaos Thanks to technology, it s never been easier to control the chaos of our personal lives. We have access to the
More information