♫musicjinni

Balancing UX and Secure Banking in a Fast Transforming Industry

video thumbnail
Boudewijn van der Valk, Chapter Lead Fraud Prevention, ING

The digital transformation of the financial sector leads to customers expecting an experience as offered by the “big tech” companies, and more non-digital customers being introduced to the digital experience. Presenters will cover new MOs that have emerged due to this and will also discuss the challenges fraud and cybersecurity experts are facing as processes are becoming faster and more efficient.Pre-Requisites: It helps to have a basic understanding of digital banking processes and most common fraud-MOs such as phishing and false account registration.

RSAC 365 Virtual Seminar: Identity (Part 1)

Connecting the Dots: Identifying and Mitigating Synthetic Identity Fraud

Synthetic Identity – A Rapidly Growing Global Issue

How to Deploy Secure Technologies to Help Reduce eCommerce Fraud

The Critical Importance of Identity for Instant Payments

How the H@ck R U? A Modern Identity Assurance Approach in a Hacked World

Inside Payback: Using Metrics to Demonstrate Insider Risk Program Value

Cybersecurity Silver Linings

RSAC 365 Virtual Seminar: Analytics, Intelligence & Response (Part 1)

Over the Top Security!

Victims & Vectors: Mitigating Legal Risks of Supply Chain Attacks

Tech Scams: It’s Time to Release the Hounds

The Modus Operandi of EV Certificates Fraudsters: Findings from the Field

Human Dimensions of Active Defense

Biometric Data: Power, Promise and Privacy Challenges

Leading Change for CISOs: Embedding a Secure Culture

Addressing Supply Chain Security Risks: MITRE's System of Trust™

“We’re Trending!!” When Traffic Is Spiking, How Do You Know It’s Legit?

Designing a Data Ethics and Privacy Program for AI/ML

How Generational Psychology Impacts Your Security Strategy

Stop Chasing Insider Threats, Start Managing Insider Risk

Webcast: Mitigating the Top Human Risks

Am I allowed to subvert machine learning for fun and profit?

Deep Modernization of a Corporate IT Infrastructure

Cloud Threat Modeling - from Architecture Design to Application Development

Disclaimer DMCA