Summary – “Industry in One: Financial Services”

ARMA International

The scope of a records and information management (RIM) program in financial services can seem overwhelming. History of Financial System. Shaped by several financial catastrophes of modern history, such as the Great Depression of 1929 and the Great Recession of 2007, the U.S.

US banks Q3 results shine light on financial services innovation

Document Imaging Report

For example, ChatBot technology is becoming particularly popular in banking for customer service, by cutting down handling times and accelerating payments processing, enabling better customer interaction by eliminating errors and increasing efficiency.

Data Governance Tools: What Are They? Are They Optional?

erwin

Data governance tools used to occupy a niche in an organization’s tech stack, but those days are gone. The rise of data-driven business and the complexities that come with it ushered in a soft mandate for data governance and data governance tools. Data Governance Tools and Data Ethics.

Four Use Cases Proving the Benefits of Metadata-Driven Automation

erwin

The banking, financial services and insurance industry typically deals with higher data velocity and tighter regulations than most. These bottlenecks are only made worse when organizations attempt to get by with systems and tools that are not purpose-built.

Kali Project Encryption and Isolation Using Vagrant and BitLocker

Perficient Data & Analytics

Imagine that you work on different engagements or projects in which Kali Linux is one of your primary tools. It would be useful to have a tool that can spin up a complete and isolated environment for each project on demand. Running the tool.

Data Governance Tools: What Are They? Are They Optional?

erwin

Data governance tools used to occupy a niche in an organization’s tech stack, but those days are gone. The rise of data-driven business and the complexities that come with it ushered in a soft mandate for data governance and data governance tools. Data Governance Tools and Data Ethics.

#ModernDataMasters: Steve Whiting, Chief Operations Officer

Reltio

I was trained in Oracle relational databases and GUI tools to deliver group-wide Banking Systems. Our combined experience of working with other large companies and systems integrators included seeing many examples of failed projects that were not delivering value. Kate Tickner, Reltio.

MDM 52

Competitive Advantages of Implementing Artificial Intelligence in Banking

InfoGoTo

For example, emails and phone calls can be analyzed for language that can indicates extreme satisfaction or dissatisfaction. That lowers risk, enabling the institution to invest in better products and services.

AllianceBernstein’s Mobile App Empowers Sales Teams in Real Time

Perficient Data & Analytics

I mention all of this to illustrate a great example of how to get real value from the Salesforce platform and the Salesforce ecosystem: Think beyond the platform itself; use the platform in conjunction with partner’s technologies and expertise to deliver the ideal solution to your users.

Sales 60

#ModernDataMasters: Bob More, SVP Global Field Operations

Reltio

Being in control of your own destiny was key – certainly there’s a financial element of it – but I thought that it was a great opportunity to learn a lot and move around an organisation. Kate Tickner, Reltio.

MDM 52

#ModernDataMasters: Tony Saldanha, President, Transformant

Reltio

Tony Saldanha is the President of Transformant and a globally recognized information technology and shared services executive. I’ve had the great fortune of evolving with the IT and shared service industry across 6 countries and 13 different roles and assignments. Kate Tickner, Reltio.

#ModernDataMasters: Scott Taylor, “The Data Whisperer”

Reltio

For example you’re not going to get IoT to work across organisations and devices without having a common data structure. People forget than when you build big, ambitious things – ships, buildings or bridges for example – you need the nuts and bolts and you cannot build without them.

MDM 52

Big Data Bootcamp by the Beach: An introduction

Perficient Data & Analytics

I’ve worked for financial institutions as well as a major utility implementing this technology, so I felt on pretty solid experiential ground. I wanted to give the students the tools they needed to be a little bit ahead of the curve so they would stand out in a field of applicants. The prerequisites for the Big Data Bootcamp will get you acquainted with all of the tools you will need. Docker, GitHub, Google Cloud Platform, Amazon Web Services, Microsoft Azure.

Enabling Key Stakeholders in the Insurance Industry

Perficient Data & Analytics

Ensuring that agents and brokers have the best tools to evaluate and close opportunities can be a real differentiator for insurance companies. For example, many companies wish to invest in solutions that effectively automate and improve underwriting, as such solutions can help remove human bias, increase the lendable pool of consumers, and reduce response times.

How Microsoft Word “Protected View” Stops Information Leaks

Perficient Data & Analytics

Microsoft Word, as an example, will open untrusted email attachments in a mode called “ Protected View “ In this blog post, I will demonstrate three different attacks that are stopped by Protected View. Attack Example #1. Attack Example #2. Example Attack #3.

CECL Model Alternatives

Perficient Data & Analytics

As per FASB: “When developing an estimate of expected credit losses on financial asset(s), an entity shall consider available information relevant to assessing the collectability of cash flows. When financial assets are evaluated on a collective or individual basis, an entity is not required to search all possible information that is not reasonably available without undue cost and effort. Furthermore, an entity is not required to develop a hypothetical pool of financial assets.

Risk 43

The Importance of EA/BP for Mergers and Acquisitions

erwin

Needless to say, the behind-the-scenes complexities are many and can include discovering that the merging enterprises use the same solution but under different names in different parts of the organizations, for example.

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

For example, the New York Department of Financial Services (‘NYDFS’) in March 2017 issued its Cybersecurity Regulation (23 NYCRR 500) (‘the NYDFS Cybersecurity Regulation’), a groundbreaking and far-reaching regulatory regime focused on financial institutions licensed in New York, including insurance companies.

Enterprise Architect: A Role That Keeps Evolving

erwin

If, for example, a business sets a goal to increase its website sales by 20 percent in one year’s time, meeting that goal will require that different IT and business functions work together. One team member might specialize in security, for example, and another in applications.

Tokenization: Ready for Prime Time

Thales eSecurity

There are valuable tools to help fight digital security threats, but which tools to use and how to deploy them depend on the type of data and the use case, or application. Among the tools that protect the data itself by making it unusable should it be stolen is tokenization.

MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

The Last Watchdog

A tech stack is the collection of software and tools companies cobble together to deploy apps, websites and other digital products. Consider that it was a misconfigured open-source Web Application Firewall , running on Amazon Web Services, that gave a former Amazon IT staffer a path to crack into this financial services giant. One example is Redis, which stands for R e mote Dictionary Server. LW provides consulting services to the vendors we cover.).

Malware researchers analyzed an intriguing Java ATM Malware

Security Affairs

Experts spotted a Java ATM malware that was relying on the XFS (EXtension for Financial Service) API to “ jackpot ” the infected machine. In that case, the malware was relying on the XFS (EXtension for Financial Service) API to “ jackpot ” the infected machine.

SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

The Last Watchdog

Related: The case for a microservices firewall Netflix and Airbnb are prime examples of companies moving to single-page applications, or SPAs , in order to make their browser webpages as responsive as their mobile apps. Here are a few key takeaways: Cool new experiences Amazon Web Services, Microsoft Azure, Google Cloud and Alibaba Cloud supply computer processing and data storage as a utility. The services on that smartphone you’re holding makes use of hundreds of unique APIs.

Data As Experience: Designing For The User

Perficient Data & Analytics

Frankly, the advent of really powerful visualization tools have exacerbated this issue. But after watching the process in action with a number of risk analysts and “quants” at a financial services client, I was sold.

NEW TECH: Cequence Security deploys defense against botnets’ assault on business logic

The Last Watchdog

Pick any company in any vertical – financial services, government, defense, manufacturing, insurance, healthcare, retailing, travel and hospitality – and you’ll find employees, partners, third-party suppliers and customers all demanding remote access to an expanding menu of apps — using their smartphones and laptops. Take the airline industry as an example. That isn’t so simple, as organizations don’t want security tools to modify or change the apps in any way.

Slack Launched Encryption Key Addon For Businesses

Security Affairs

Using Slack EKM, IT admins can revoke access to data within a particular Slack channel, for example, rather than disrupting all users on the entire platform. This tool adds an extra layer of protection without interfering with the operation of Slack apps. As mentioned in their privacy policy , Customers or individuals granted access to a Workspace by a Customer (“Authorized Users”) routinely submit Customer Data to Slack when using the Services.

CIPL Responds to ICO Call for Views on Creating a Regulatory Sandbox

Hunton Privacy

The regulatory sandbox concept is intended to provide a supervised safe space for piloting and testing innovative products, services, business models or delivery mechanisms in the real market, using the personal data of real individuals. The concept was first developed by the UK’s Financial Conduct Authority to enable regulated companies to experiment and innovate in the financial services space.

#ModernDataMasters: Nicola Askham, The Data Governance Coach

Reltio

She has worked in a number of different industries including Defence, Utilities, Retail and Financial Services and is a Director and Committee Member of DAMA UK; a member of the Expert Panel of Dataqualitypro.com, and she regularly writes and presents internationally on data governance best practice.

Capturing Paper Documents - Best Practices and Common Questions

AIIM

Therefore, it's important to understand and leverage scanning as a fundamental tool for business today. Wider and more profitable opportunities exist for organizations to bridge the gap between paper and digital media, especially in traditionally paper-intensive fields such as financial services, healthcare, or government. What are Recognition Tools? There are various types of recognition tools available from many of the document capture and ECM vendors.

Rebooting Analytics and CAO

Perficient Data & Analytics

I believe insights in context will bring more value to business than any previous iteration of report, self-service reporting, visualization, etc. He or she will also focus on meeting the true needs of all types of users: Execs, business leaders, line of business users, IT, field service, etc.

Rebooting Analytics and CAO

Perficient Data & Analytics

I believe insights in context will bring more value to business than any previous iteration of report, self-service reporting, visualization, etc. He or she will also focus on meeting the true needs of all types of users: Execs, business leaders, line of business users, IT, field service, etc.

Digitizing the credit management journey

CGI

Many financial institutions are integrating digital strategies into their business and technology environments as a means of enhancing competitive advantage, improving collections revenue performance, and retaining greater customer loyalty. Digitizing the credit management journey.

Doing Digital Right (A Book Review)

Information is Currency

A differentiated product is some type of tool or something tangible that a consumer would buy. With differentiated products disruption is likely to occur when building a better product using digital tools. An example of lowering cost through improving internal products is in financial services where artificial intelligence reduce manual effort in areas such as financial advice and basic legal services.

Cybersecurity: Managing Risks With Third Party Companies

Cyber Info Veritas

This article will focus on some strategies that organizations should consider implementing in order to mitigate their cybersecurity risk as far as third-party service providers are concerned. Such tools alert you the moment your third-party company’s network is altered even slightly.

Risk 52

Tuesday’s Relativity Fest 2019 Sessions: eDiscovery Trends

eDiscovery Daily

It has provided a framework for the development of software and services. Speakers Include: Michael Quartararo – Managing Director, eDPM Advisory Services; Darcie Spruance – Senior Project Manager, Ms.; How law firms can provide more valuable services?

Predictions for 2018 – This is where the magic happens!

CGI

But the mesh of available technology is breaking down business models everywhere—from how we develop applications, to how we deliver services, to how we process orders. While technology will unleash the data, and some tools like artificial intelligence will consume the data and spit out responses or actions, subject matter experts and analysts should be respected once again. Predictions for 2018 – This is where the magic happens! ravi.kumarv@cgi.com. Wed, 02/21/2018 - 03:49.

After the Token Act: A New Data Economy Driven By Small Business Entrepreneurship

John Battelle's Searchblog

The Token Act levels the playing field, forcing both to win where it really matters: In service to the customer. The tools she will leverage? Were you a limo service in the Bronx looking for new customers? ” Selling heavy machinery to construction services in the midwest?