Get powerful finance insights for your business. Connect with experts and colleagues to get the most up-to-date knowledge that will help you to determine which financial factors build or erode value in your organization.
Today’s travel and mobility businesses have to deal with employee and customer needs in an instant and flexible manner. Having the right payout strategy in place is essential to accomplish this.
Whilst various payout solutions are available on the market, only a few can deliver globally and in a fast, efficient and highly secure way. In this webinar, you will be presented with a number of different use cases from the travel and mobility industry that demonstrate how digital products can effectively replace outdated procedures.
More specifically, you will learn how to:
-better serve your customers in emergency cases,
-better support your employees in critical and crisis situations,
-carry-out occasional ad-hoc fund transfers globally and instantly,
-immediately provide cash assistance,
-improve the user experience for your customers.
Furthermore, you will find out how the right payout card program can support operational efficiencies, security benefits and cost savings.
By the end of the webinar you’ll walk away with the following:
-possible use cases and scenarios that answer to your company needs
-a clear understanding of the benefits of instant funding
-proposals on risk, security and cardholder identification
-techniques on how to minimize cash risks
Wirecard’s Hadi Hafez and Asmir Lukavackic will be on hand to share industry insights, walk you through instant payout methods and answer any questions.
Are you ready to quit outdated and expensive payment processes? Then join our webinar!
APIs have become the connective tissue for the digital enterprise. From app development, to open APIs, to API-led integration, the adoption of best practices and success of your API program is a key indicator of your strategic success as a digital enterprise.
Join us for wide-ranging discussion with Cox Automotive covering API program best practices, distributed API management across user groups, API-led integration, and the evolution to event-driven architecture that is driving better connectivity with Cox’s business units and strategic partners.
We’ll also cover:
-The ABCs of APIs
-The API program lifecycle
-Use case demos
-Visualized API performance analytics
This webinar features perspectives of family office impact investment specialists from across the globe. We will explore how family offices in different regions approach impact and SDG investing, overcome mental and regulatory challenges, and scale successful impact investment opportunities.
Our presentation lineup includes:
> Dimple Sahni, Managing Director Impact Investing, Anthos Family Office Fund & Asset Management
> Robert Rubinstein, Chairman, TBLI Group
> Silja Nyboe Andersen, Investment Advisor, Merkur Andelkasse
Sally Todd, President of City Women Network (CWN), and Chris Newlands, Editor of Financial News, discuss ways to improve the diversity balance in business, The #MeToo Movement, addressing pipeline dynamics, increased media and reader appetite for D&I-related stories, the reluctance of some organisations to implement change, flexible/agile working, how regulations are driving cultural change and increasing D&I in the world of journalism.
The Supreme Court ruled in favor of South Dakota, granting the state authority to impose sales tax obligations on out-of-state transactions. Remotes sellers will have a new set of obligations and challenges ahead of them, while states could potentially gain billions in revenue. But what does it mean for your business?
We brought in two leading tax policy experts to break down the ruling and explain:
•Whether remote sellers need to file and register in more states
•How the ruling affects future laws across other states
•How to determine whether you’re on the hook for sales tax based on where you conduct business
•Q&A from audience
About the speakers:
Scott Peterson, Vice President of Tax Policy and Government Affairs
Scott Peterson was the first executive director of the Streamlined Sales Tax Governing Board. For seven years Scott acted as the chief operating officer of an organization devoted to making sales tax simpler and more uniform for the benefit of business.
Rachel Le Mieux, CPA, CMI, SALT Partner at Peterson Sullivan LLP
Rachel has been practicing in state and local taxes (SALT) since 1985. She is a certified public accountant and a certified member of the institute (CMI) for professionals in state and local taxation. She consults with clients in a broad range of industries on state and local tax issues involving sales and use taxes, gross receipts taxes, income taxes, and other miscellaneous taxes.
More than ever, sales teams are struggling with unqualified leads, missed sales goals, and lost opportunities.
Increasingly, company and sales leaders are turning to coaching as a solution.
And, why not? Executive and personal-effectiveness coaching have historically yielded great results.
What we commonly see are sales managers and leaders who:
-Don’t have time to coach
-Aren’t sure what sales coaches are supposed to do
-Don’t have access to the tools and resources that can help them get the most of coaching
-Don’t establish a consistent rhythm of coaching conversations
-Can’t lead a great coaching conversation
Reasons to Attend:
This webinar explores the clear link and transferable skills from selling to coaching.
We will bust some of the myths about coaching and show how you can turn on your coachees (the person you are coaching) internal voice.
We will share with you our experience of supporting new directors, managers, and supervisors taking a coaching approach by learning to ask not tell.
Highly configurable, cloud-based automation technologies are disrupting the staffing industry as more executives turn to scheduling automation to improve operational efficiency, drive higher value, and grow their business in transformative ways. Whether your organization is in the beginning stages of research, or you’re ready to join other industry leaders championing the movement toward automation, this webinar provides you with impact statistics and the customer experience data you need to better understand how scheduling automation tackles staffing challenges head-on, across multiple fronts.
In this 60-minute webinar, you’ll learn how workforce scheduling automation can help you:
Building multi-platform event-driven microservices and functions shouldn’t drive you mad, and if so, there should be a method to your madness!
In this short webinar hosted by DZone and available on-demand, learn to build event-driven microservices and functions using Project Flogo® – an open source event-driven framework. Flogo® enables developers to build applications triggered by any or all of the typical event sources – Apache Kafka, MQTT, HTTP/REST, etc. Flogo lightweight artifacts can also be deployed across various platforms and technologies – Docker, serverless (such as AWS Lambda), or edge compute devices, all without changing any code.
-So, what’s the problem?
-Introducing Project Flogo
-Building event-driven flows
-Wait, I like coding
-Unified extension model
A successful digital business must be able to detect and intelligently respond in real-time to business moments. Either to take advantage of an opportunity or to prevent a tragic loss, these moments and how we respond to them define our organization’s success or failures as well as our path forward.
These moments could be focused on improving the customer experience, gaining operational efficiencies, or mitigating risks. At the very center of such moments lies an architecture that has the ability to move information between disparate systems or devices and to identify the meaningful events within the ever-increasing volumes of data.
This is what Apache Kafka was designed to do. Kafka is a streaming platform based on a distributed, persistent, publish-subscribe logging system.
TIBCO recently announced full support for Apache Kafka. This webinar will take a closer look at exactly what TIBCO is offering as part of their support and how to take advantage of partnering with TIBCO for your Kafka projects.
Watch this brief (20 minute) webinar to learn:
-The components of the TIBCO® Messaging - Apache Kafka Distribution
Apache Kafka Core
-TIBCO Apache Kafka Bridge
-TIBCO Apache Kafka Schema Repository
-How the TIBCO Apache Kafka Bridge provides for native integration between Apache Kafka to seamlessly connect with all the TIBCO Messaging components
-How integration between Apache Kafka and other TIBCO solutions provide advanced capabilities beyond standard Apache Kafka deployments
Artificial Intelligence (AI), big data, machine learning, cyber security – no industry takes up more space in our collective psyches than technology. It is part of the air we breathe and the cornerstone for business transformation and growth. It is also a never-ending exercise in new learnings and unintended consequences.
How do some of today’s top dealmakers decode the maelstrom of promise, transformation and false starts that is technology M&A?
In this presentation, we’ll explore:
- What are some of the most promising areas within technology M&A and why?
- What are some under-the-radar areas?
- What’s the best approach to deal sourcing in a seller’s market?
- How do dealmakers approach the art of technology valuation?
- What are the potential implications of the new CFIUS reform bill on cross-border transactions and foreign investment?
Learn how TIBCO Cloud™ Integration with Scribe and other TIBCO products are better together than standalone. We'll show you how to aggregate data and manage changes to make data import in TIBCO Spotfire® more efficient. See how TIBCO Mashery® can manage access to the TIBCO Cloud Integration API (which also helps your customers and partners manage their integrations), control versions of individual API endpoints, and more.
Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organisations face in recruiting and retaining skilled cyber professionals.
During this webinar we will be discussing the benefits and challenges of inhouse vs. outsourcing of cyber security operations and how this has been effected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
Cyber threats have evolved to be increasingly sophisticated, targeting today’s modern endpoints, which are often insufficiently protected. Organizations need to better understand the very real nature of these threats and the unique challenges introduced by mobile devices.
How do you protect your business in today’s environment?
Join this webinar on October 10 to learn how to protect your business in today’s environment. Topics include:
• The security landscape and challenges organizations face today
• Practical strategies for protecting modern endpoints
With the digitalization of our lives, organizations are creating new online services at a faster pace than ever before. Every organization is constantly developing and adding new services, leaving themselves vulnerable to fraudulent activities. The pressure is placed on fraud teams to stay informed and ahead of attackers, who are always creative to exploit new vulnerabilities.
Join this webinar to learn:
● How to recognize examples of fraudulent activities in your environment
● How to more quickly find anomalies of transactions or behaviors of accounts that are fraudulent, acting fraudulently or being taken over
● Recommendations and best practices on how to get started detecting fraudulent patterns and activities
● How using machine data and Splunk’s analytics-driven security platform can help you onboard new data at the speed of the business to ensure that your fraud teams can detect and investigate quickly
Charlotte Crosswell, CEO of Innovate Finance, and Geoffrey Williams, Director/Head of Diversity & Inclusion EMEA at Thomson Reuters, discuss Innovate Finance’s Diversity initiative, how the FinTech sector can attract more female talent, creating more inclusive organisations, attracting talent from all walks of life, the importance of real-time feedback, managing change, the need for more role models, the importance of speaking to young children about their career options, and how men are driving organisations to incorporate flexible working.
When done right, digital transformation streamlines your operational processes, empowers employees for more impact, supports continuous innovation, and ultimately delivers compelling experiences that delight your customers. But to get started achieving these results, you need a well-defined cloud strategy and a toolkit to align with it.
This TIBCO Tech Talk covers:
-How to meet and exceed expectations in the digital economy with TIBCO® Connected Intelligence Cloud and its various services
-A preview of TIBCO® Cloud solutions to help bootstrap your digital transformation initiatives (such as dynamic pricing)
-A live demo on how to engage your customer and partner ecosystem, automate your digital processes, and build apps faster
Sales tax compliance can be a nightmare, but it doesn't have to be. Just knowing some of the fundamental rules will clear up what many businesses struggle with every month.
Sales tax expert Jeffrey Lutters will explain:
•How the simplest of activities can create nexus in other states
•The tax implications between 'bill to' and 'ship to'
•Why collecting exemption certificates is an auditor's red flag
•New sales tax rules that determine whether your business is compliant
Whether driven by PSD2 compliance, market demand for mobile apps, or fintech competition, open banking is becoming a top priority for financial businesses. Through exclusive research and customer successes, we determined that building a modern application architecture with APIs, microservices and strong authentication is a key success factor in this space. In fact, our latest report shows that fully digital banks enjoy an estimated 25% cost-to-income ratio, versus 60% for traditional institutions.
For this webcast, we assembled a panel that includes Mehdi Medjaoui, author of Banking APIs: State of the Market, along with experts in API and security capabilities, to introduce the elements of modern application architecture that all digital banking business leaders should know about – API management, microservices, strong authentication and risk-based security. You’ll learn about:
* The current state of open banking, and what your peers are doing
* How to invest in modern application architecture to improve your open banking projects
* How to align better with IT to accelerate your time-to-market
All registrants will also benefit from a complimentary copy of our Banking APIs: State of the Market report.
Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.
This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
Artificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Organizations need to understand how AI will impact cyber security before they rely on it for their defenses.
Watch this webinar as we discuss:
• How AI tools can be used for offensive and defensive purposes in the cyber domain
• Changing geopolitical landscape as threat actors develop and implement AI capabilities
• Enhancement of a businesses’ defensive capabilities through AI technology
• How FireEye uses machine learning to bolster its internal defenses and tools
IoT devices have become a mainstream part of our lives. IoT devices are no longer just consumer devices, rather they are interwoven in different parts of corporations.
The August 2016 Mirai botnet attack has shown that security in IoT is required to have overall security. The lack of security in IoT devices not only affects users, but also affects the society in a larger scale. Manufactures of these devices need to follow a set of guidelines to ensure secure developments and deployments.
Moreover, device consumers such as corporations should be aware of their attack surface.
Join us for a live webinar as we address the top security and privacy issues in IoT devices, the threats that are targeting them and recommendations for possible solutions.
Sensitive information about individuals can be recovered from different types of data releases, including aggregate statistics or machine learning models. This session will address the privacy risks in publishing analysis results and introduce data privacy techniques to defend against them.
Theresa Stadler, Data Scientist at Privitar, will explain differencing and reconstruction attacks on simple summary statistics such as count tables, along with discussing the privacy risks of supervised machine learning.
Some of the takeaways of the session include:
- Reasons to be concerned about the privacy of training data
- The attacks on machine learning models that can occur and what private information about individuals in the training data can be recovered
- A simple example of a black-box privacy attack on a classifier, a common machine learning model
- An introduction to the differential privacy framework that functions as a privacy-enhancing technology to defend against the attacks introduced
Organisations increasingly rely on cloud services, motivated by the benefits of scalability, accessibility, flexibility, business efficiencies and reduced IT costs. However, there are several security implications that organisations need to address, including the challenge of verifying identity and managing access to cloud services.
Cloud services bring added complexity to identity and access management, exacerbated by the distribution of data across a myriad of applications accessed by users from multiple devices and locations. Failure to adequately implement user authentication and access control in the cloud can be exploited by attackers to gain access to users’ credentials, manipulate systems and compromise data.
In this webinar, Senior Research Analyst Dr Emma Bickerstaffe and Principal Analyst Benoit Heynderickx will discuss identity management, access control and user authentication in the cloud environment, and consider how organisations can effectively tackle this security concern.
Manufacturing is going through a deep transformation, with changes that all are all about digitalization. With Industry 4.0, digitalization is more visible and disruptive in manufacturing, expanding virtual data and processes in an industry that is fundamentally about dealing with physical products.
This transformation has already started and its impact is expected to be massive, with changes across the whole manufacturing ecosystem technically, economically, and socially. Key elements of the Industry 4.0 transformation include 3D printing, robotizing and automation, smart factory with IoT and machine learning, and supply chain digitization.
Now, blockchain is becoming a key technology driving this digital revolution.
Join us for this webinar hosted by some of our best blockchain subject matter experts to learn:
● The impacts of technology on the manufacturing industry
● Why blockchain is a valuable technology for next-generation manufacturing use cases
● How blockchain is applicable to different areas of manufacturing
Learn how to drive business value with Machine Learning using Feature Engineering including feature extraction and feature selection to generate insights that resonate with business users. The complete process of Feature Engineering will be discussed from data wrangling through cleaning, exploring, modelling, validating, analyzing, and visualization. Specific business use cases will be presented to clearly convey how to apply Machine Learning and Feature Engineering to create accurate and interpretable predictive models.
WHO SHOULD ATTEND?
· CTO – Understand risk-averse Cloud based Machine Learning
· CIO - Support business operations with automated Feature Engineering
· Analytics Directors/Managers – Implement predictive analytics solutions fast
· Line-of-Business Managers – Identify business needs ripe for Machine Learning
· Data Scientists – Learn how TenPoint7 has implemented Feature Engineering.
WHAT WILL YOU LEARN?
· What is Feature Engineering and how to apply it to business use cases
· Ability to identify areas in your business where Feature Engineering can shine
· How to greatly reduce the time and cost to implement Machine Learning solutions that include data scientists, data engineers, ML platform, and the application all in a single subscription.
Join this live panel streamed from Money20/20 Vegas where our speakers will discuss:
-The benefits of a secure digital identity system
-Where does blockchain come into play?
-Cutting through the hype: real use cases
-Reducing risk and mitigating fraud
-New advancements in biometrics
Financial institutions are readying themselves for the open banking revolution but what is the potential power of platforms and how can banks manoeuvre these new channels and data sources for innovation?
Cloud and API technologies offer an immense opportunity to create a reliable, scalable global platform for the financial community - data privacy, security, and operational transparency are dealt with.
* Are shared infrastructure, consistent APIs and on-demand scaling the key to rapid global adoption of financial services at a reduced cost?
* Can the community afford to wait for a giant infrastructure to take a lead?
* Can Quantum computing become affordable only as a shared infrastructure under cloud?
Dan Houseman, Head of KPMG’s Australian Payments Advisory practice
Eli Rosner, Chief Product and Technology Officer, Finastra
Polina Evstifeeva, Head of Regulatory Strategy - Chief Digital Office, Global Transaction Banking, Deutsche Bank
Christine Leong, MD Security, Accenture
BPI Iberia invests in listed Portuguese and Spanish equities or equity related assets which offer upside potential. The fund aims to beat the benchmark over a reasonable time frame through an active management approach.
Mandiant responded to an incident in 2017 at a critical infrastructure organisation where an attacker deployed malware designed to manipulate industrial safety systems. The targeted systems provided emergency shutdown capability for industrial processes. This malware, called TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.
Join David Grout, our Technical Director for South EMEA, for a live session and get insights into the technical framework details and the potential outcomes.
Cyber threats plague the financial services industry:
• Advanced persistent threat (APT) actors seek to support economic reforms and reach state goals
• Financial threat actors seek financial gain through the direct theft of funds or the sale of stolen information
• Disruptive threat actors and hacktivists seek to gain publicity, divert banks' attentions, or demonstrate a political motive
Any one of these threats would increase activity in an industry, but the presence of all three likely accounts for the large number of intrusions in financial services organizations.
Join us for a live video panel and get executive insights for critical topics relevant to the financial services industry, including the:
• Nature of threats, as well as their motivations and tactics, techniques and procedures (TTPs)
• Ripple effect consequences of geopolitics
• Cost of a breach and importance of risk awareness in the boardroom
• Need to keep GDPR a high priority
Whether you are considering an expansion of existing facilities, consolidation of multiple data center sites, or an acquisition or divestiture of data center assets, this session will cover some key points to mitigate risk, identify the infrastructure and operational health of assets, management and operations, lifecycle considerations, and the overall resiliency of key data center assets.
Join us on the first anniversary of the publication of the Helm Review on the Cost of Energy. What has been done since then to tackle energy costs in the non-domestic sector?
Are we really supporting British business, when rising costs of production impacts our global competitiveness?
Most of the cost rises are coming from non-commodity charges. Is this an essential spend, delivering critical infrastructure with the costs applied fairly to all users, or are the networks reaping benefits at the expense of the consumer?
And how can we ensure we get the best price when we go to market?
When you do business with one SaaS vendor, you're also doing business with every other vendor they do business with. So one weak link in that chain could jeopardize your entire enterprise. Watch this webinar to learn best practices of vetting vendors for security and compliance with standards like GDPR, HIPAA , PCI DSS and more. Our business is built on security, compliance and governance — and that means we make sure all our vendors comply with strict guidelines and standards so we can safeguard our customers' security.
This webinar will help you understand:
- What we look for when evaluating vendors for security and compliance
- What to consider about vendor security posture
- Questions to ask every vendor about data privacy and compliance
Box is trusted by 69% of the Fortune 500, because of its track record for securing data in compliance with a host of regulations and standards around the world. This is your chance to hear from Box experts on what you can do now to ensure your business's data security.
Learn how hybrid faxing can eliminate the paper-based and manual processes plaguing financial services today.
With a fully managed hybrid information exchange solution, your organization can:
-Cut telco costs
-Improve customer satisfaction
-Collaborate both internally and externally faster – and easier
Jim leads strategic programs for the Americas region for OpenText’s information exchange (fax) solutions. Jim is an expert in designing solutions for enterprises of all sizes to enable secure, efficient information exchange.
APAC corporate banking revenue pools are substantial for the connected corporate banks that can seize the opportunity. This interview with Patty Hines, senior analyst from Celent, will delve into the technology and fintech priorities of corporate banks in the region, strategic considerations based on corporate treasury research and the definition of connected corporate banking in through the lens of APAC transaction banking and lending trends. Oliver Wyman forecasts accelerated growth in APAC: 6% CAGR from 2017 to 2022. Following a deep analysis of the leading APAC banks. Those that want to succeed are investing in connected corporate banking technology to deliver comprehensive, tailored, and joined up solutions.
Tim Tyler, Master Solution Architect - Corporate and Retail Banking, Finastra
Patty Hines, Senior Analyst, Corporate Banking, Celent
This webinar give you a practical insight into sanctions, enforcement and steps to consider to help address business risks. Some of the topics covered include:
•What are sanctions?
•Case study I: Enforcement within the financial services sector
•Case study II: Enforcement within the corporate sector
•Sanctions policy checklist and key considerations in using sanctions screening tools
Experis Finance is pleased to announce the third webinar in our Hot Topics series. Our goal is to provide you with a series of webinars that provide practical insights on topics of interest to internal audit, risk and compliance professionals, audit committees, and board members.
Our third session covers Internal Audit Function Effectiveness.
In this webinar, a panel of seasoned Internal Audit practitioners from Experis Finance will share their insights, experiences and recommendations on how Internal Audit functions can assess the effectiveness of their activities. With different drivers and many available possibilities, this is a classic “one size does not fit all” scenario. This session will help Internal Audit leaders understand the available options in order to determine the approach and methodology that best suits their individual situation and relevant stakeholders.
During this webinar, we will address the following topics:
•How is Internal Audit effectiveness defined and how can Internal Audit manage the competing expectations of their stakeholders (Senior Management, the Board, the Audit Committee, Regulators, External Auditors, etc.)?
•What are the elements of the Quality Assurance and Improvement Program (QAIP) as defined by the IIA’s International Standards for the Professional Practice of Internal Auditing? Are there different options and possibilities for assessing Internal Audit effectiveness?
We live in a truly amazing time. Technology is changing almost every aspect of our lives at breathtaking speed. Advances in medicine, education, communication, and productivity have increased life expectancy around the globe and lifted hundreds of millions of people out of poverty.
The ability to connect to people and information instantly is so commonplace that many take it for granted and now, we’ve arrived at the beginning of an era of even more profound transformation, all centered on the cloud. We’re excited to bring more opportunities through cloud computing to address issues in healthcare, the environment, cybersecurity, and underserved communities. And we’ve seen the incredible good that can come from the cloud, but with it also come challenges. For women in technology, there are increased challenges in a cloud-based world.
Women in Cloud initiative is designed to empower female tech entrepreneurs by providing Access, Acceleration, and Actions so women entrepreneurs can take Actions every day to achieve their business goals!
In this webinar, we will share experiences and tips for female tech entrepreneurs in building their cloud B2B with enterprise companies in a simple and predictable way. This is going to be a panel discussion with great conversation with female tech entrepreneurs in driving customer traction.
Also, learn how you can participate in the next cohort of women in cloud accelerator to build your business with enterprise brands!
Against a backdrop of PSD2 and Open Banking, Financial Services Institutions are steadily adopting cloud technology for payments. The Cloud is flexible and accessible and provides significant cost advantages in the world of payments, where customer demands are real-time and now. Paul Thomalla, Global Head of Payments will:
* Set the global scene of payments in the cloud
* What we are seeing in different parts of the world where regulation is prominent and less prominent
* Drill down into why companies are interested in the cloud
* Explore the benefits of the cloud
Paul Thomalla, Global Head of Payments, Finastra
Hamish Thomas, EMEIA Payments Leader, EY
BPI Brasil is a long only Fund investing in listed Brazilian equities and fixed income. The Fund aims to provide the investor with direct access to a market with high growth potential and to offer a sustainable return over a reasonable time frame through an active management approach.
In this IDC FutureScape presentation, the IDC Worldwide CIO Agenda team discusses the key predictions that will impact CIOs and IT professionals in the worldwide industry over the next three to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.
About IDC FutureScape
IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
Risk management in banks has gone through a silent revolution. Banks had to solve the problems and questions asked post-crisis and then rationalize and move to more enterprise wide models. Today, a three pronged revolution of regulation, technology and new sources of risk mean banks must re-imagine risk and compliance. With platformification, increases in computing power and cloud come the opportunities to deliver more agile processes, more real-time insights and more accurate predictions. But data quality remains king. What are CIOs top considerations when deploying more open api driven risk platforms? Can risk management securely live in the cloud? How can banks move the needle by collaborating with the fintech ecosystem?
Rupert Nicolay, Worldwide Services Architect, Microsoft
Zannettos Zannettou, Principal Technology Consultant, Finastra