Hi [[ session.user.profile.firstName ]]

Fintech

  • Learning from Fraud Detection: Segmenting AML to Fight Financial Crime
    Learning from Fraud Detection: Segmenting AML to Fight Financial Crime
    Brendan Brothers Recorded: Jan 17 2020 60 mins
    Why do we think about AML as a single idea, when fraud is segmented specifically by customer, channel or loss type? In this insightful session, Jim Richards and Brendan Brothers discuss the limitations of the current one-size-fits-all approach to compliance and anti-money laundering. Learn why segmentation is effective at fighting fraud, and how these lessons can be applied to transform the AML industry.

    Learning Objectives
    - Review of the limitations of current AML approaches and technologies to -effectively fight financial crime
    - Understand how segmentation improves fraud detection and how these lessons can be applied to strengthen anti-money laundering efforts
    - Learn how innovative technologies and customer segmentation will transform the AML industry
  • SkyStem: Perfecting the Close Checklist
    SkyStem: Perfecting the Close Checklist
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 16 2020 55 mins
    [Live Recording] It's time to spruce up the close checklist! Join us in this webinar where we will revisit best practices as well as practical tips to help improve the financial close process. Whether you have a close checklist, a close calendar, or even if you are still forming a close process, these practices will surely help your period-end close.

    Please note: CPE credit not available for this playback
  • Not sure where to start with data privacy? Build a Privacy Center of Excellence.
    Not sure where to start with data privacy? Build a Privacy Center of Excellence.
    Bob Welshmer, Senior Sales Engineer Recorded: Jan 16 2020 12 mins
    Who in your organization needs to use sensitive data? Who manages it? Who defines acceptable levels of data privacy for different uses? Who ensures those levels are achieved every time? If you’re unsure, chances are you’re not utilizing your data to its fullest potential.

    Enter: the Privacy Center of Excellence, a team of executive members, policy implementers and data consumers who work together to find the balance between data utility and data privacy.

    Join Privitar’s Solutions Engineer, Bob Welshmer, to find out what it takes to set up a high-functioning Privacy Center of Excellence.

    Join this session to learn:
    · Who the main players are in the Privacy Center of Excellence
    · Roles and responsibilities in the Privacy Center of Excellence
    · How the Privacy Center of Excellence players work together to maximize data utility while maintaining privacy
  • 5 identity fraud predictions for 2020
    5 identity fraud predictions for 2020
    Dimi Radu - Senior Document Specialist | Simon Horswel - Senior Document Specialist Recorded: Jan 16 2020 49 mins
    Our document specialist team are our frontline against fraud. They analyse both genuine and fake documents from all over the globe to identify and highlight their weaknesses and strengths, so we can outfox the fraudsters.

    Following our 2019 Fraud Index, our experts look forward and sharing their predictions for 2020 in the world of identity fraud. Join us to learn what security threats and attack vectors will be making waves next year, what they expect to see more (and less of), and how you can protect yourself and your business.
  • Do you Zelle? Fraud Risks to Consider When Moving to Faster Payments with Zelle
    Do you Zelle? Fraud Risks to Consider When Moving to Faster Payments with Zelle
    Uri Rivner, Chief Cyber Officer, BioCatch Recorded: Jan 15 2020 63 mins
    Zelle is awesome! The highly innovative P2P scheme allows people to pay in real-time from their bank account to any of their contacts. It’s easy to use, super-fast and extremely convenient.

    Unfortunately, it’s also heavily targeted by fraud.

    Cyber criminals are already staging massive Zelle fraud campaigns using a clever mix of social engineering and technical infrastructure. Risk teams realize that stopping real-time fraud is a different ball game, and many banks report a high-paced adaptive race with crime rings that quickly respond to new controls.

    Learn about the various types of Zelle deployments, the current fraud landscape, and what the industry is doing to defend itself. Whether you host your own Zelle pages, use a third party vendor to fulfill the payments or plan to launch Zelle next year, this webinar is for you!
  • Institutional Self Custody for Banks and FIs
    Institutional Self Custody for Banks and FIs
    Adrien Treccani Recorded: Jan 15 2020 44 mins
    Adrien Treccani, CEO of Metaco, a GDF Advisory Council member, will give an overview of Self-Custody for Banks.
  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 14 2020 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • Baking Privacy into your Processes with AWS
    Baking Privacy into your Processes with AWS
    Tom Kennedy, Strategic Partnerships Manager, Privitar Recorded: Jan 14 2020 17 mins
    As customers at all points on the cloud adoption curve look to achieve cost-effective innovation at scale and speed, they face increasingly complex privacy risks. These risks in turn prevent moving, using and sharing sensitive data, either from on-premise to the cloud or from the cloud to partners and other third parties.

    Join this interactive webinar to:

    - Understand how data privacy risks relate to big data in the cloud

    - Learn best practices to deliver data privacy governance at enterprise scale
  • Managing Digital Risk: Conquering the Security Challenge Beyond Your Perimeter
    Managing Digital Risk: Conquering the Security Challenge Beyond Your Perimeter
    Jarad Carleton, Cybersecurity Global Program Leader at Frost & Sullivan and Elad Schulman, Co-Founder and CEO of Segasec Recorded: Jan 14 2020 48 mins
    The digital footprint of the modern organization, both large and small, started to grow beyond the corporate network perimeter in 1994. Over the past 25 years, organizations have place more digital assets outside of the corporate perimeter including login pages, brand logos, mobile applications, social media accounts and more. Simultaneously, cyber-criminals apply social engineering techniques from the physical world into the digital world with increasing levels of sophistication capable of fooling a larger share of online users. Today, brand impersonation, fraudulent website clones, and apps masquerading as authentic interfaces for well known brands have become a real danger for online business of every size and in every geography. This session will discuss these real business challenges, the impact on revenue growth, and what can be done to implement a defense so effective that cyber-adversaries look for easier digital prey.

    By the end of this session, participants will understand the answers to questions such as:
    What is digital risk?
    Why should all businesses have a plan to eliminate digital risk?
    Can your IT or cybersecurity team launch an effective defense in-house?
    What technology should be considered?
    What are the business economics of a managed digital risk protection solution?
  • AI for Identity Verification: Going Beyond the Buzzwords
    AI for Identity Verification: Going Beyond the Buzzwords
    Parker Crockford – Director of Policy & Strategic Accounts, Onfido | Mohan Mahadevan – VP of Research, Onfido Recorded: Jan 14 2020 55 mins
    The way we verify our identities is changing. With traditional enterprises evolving and taking their operations fully digital, and newer all-digital businesses are growing exponentially, it makes sense that identity verification and KYC move online too. But in a remote setting, it’s hard for businesses to scale up their user onboarding without also increasing risk. Now, many are turning to AI-based solutions to meet that need.

    From hybrid to augmented, machine learning to deep learning, there are lots of new approaches to identity verification out there. But how can businesses tell the difference between buzzword and true black box, and what are the benefits of each?

    In this discussion, we’ll decode the various different applications of AI to the identity verification problem. We’ll also discuss how to use these new technologies to increase efficiencies at scale and provide exceptional customer experiences.

    Join this expert panel webinar to hear a dynamic panel discussion on:
    -The challenges of traditional methods of identity verification, and why enterprises are turning to AI
    -The different ways AI can be applied for more efficient identity verification
    -The benefits of a hybrid human-AI approach
    -A new identity reality: How will we be able to use our identities in future
  • Getting Started with Conversational Artificial Intelligence
    Getting Started with Conversational Artificial Intelligence
    Artificial Solutions: Chris Tew, VP APAC & Alexander Hoffmann, Presales Engineer Recorded: Jan 14 2020 45 mins
    What's Conversational AI and how can it transform my business? How do I get started?

    Conversational AI is changing the way people interact with technology. From speech enabled interfaces, through to intelligent virtual assistants and chatbots, it’s becoming increasingly apparent that customers are looking for a more humanlike, natural experience. But creating this type of experience requires more than just simple slot-filling chatbot technology, where users are expected to speak or text in formulaic, rigidly structured commands. Customers want to converse using their own words, phrases and terminology, and expect an intelligent response.

    From answering a simple billing query or booking a reservation, to delivering advice on complex topics, an intelligent conversational interface lets your customer ask for exactly what they want to know.

    Join Chris Tew, VP Sales Asia Pacific for Artificial Solutions as he discusses how companies can get started on their digital transformation and conversational AI journey today. Then, Alexander Hoffmann, Presales Engineer for Artificial Solutions will live demo a Teneo built solution.
  • FireEye's Perspective on Iranian Attacks and Practical Mitigations
    FireEye's Perspective on Iranian Attacks and Practical Mitigations
    Benjamin Read, Senior Manager, Cyber Espionage Analysis, FireEye Recorded: Jan 13 2020 50 mins
    FireEye's Perspective on Iranian Attacks and Practical Mitigations
    Make Better-Informed Decisions and Protect Your Organization

    The recent tension between Iran and the U.S. has increased the likelihood of Iranian action against U.S. and Gulf entities. While the exact nature, timing, and targets of any response from Iran is uncertain, FireEye Threat Intelligence analysts assess with moderate confidence that it will include a cyber component.

    Watch this complimentary on-demand webinar, as Ben Read, Sr. Manager, Cyber Espionage Analysis provides:
    •An overview of FireEye’s perspective on the current threat landscape from Iran
    •Tactics recently employed by Iranian groups like APT33, APT34 and others
    •Recommended mitigations to protect your organization from these groups
  • Mobilytix(TM) IRIS: Empowering Telecom Retailers
    Mobilytix(TM) IRIS: Empowering Telecom Retailers
    Amit Sanyal and Chandan Tripathy Recorded: Jan 13 2020 23 mins
    An overview of how the MobiLytix(TM) IRIS offering unifies the retailer and customer's journey
  • How Do You Find Your High-Risk Customers?
    How Do You Find Your High-Risk Customers?
    Corey Lynch, Verafin Recorded: Jan 10 2020 59 mins
    Presented by Verafin

    Financial institutions invest significant time and resources into identifying customers in high-risk categories, such as Private ATM Owners, Money Service Businesses (MSBs), Marijuana-Related Businesses (MRBs), Non-Governmental Organizations or Charities (NGOs), Cash Intensive Businesses (CIBs), and more.
     
    Unfortunately, for most compliance professionals these processes are primarily manual today. Continuously updating and reviewing reports and spreadsheets can hinder your ability to meet examiners expectations, fulfill compliance requirements, and follow your institution’s policies for uncovering high-risk customers.  
     
    Join us to learn how to alleviate manual processes for identifying higher-risk customers, automate due diligence processes, and strengthen your overall compliance program.

    Highlights of this webinar:
    - Review of CDD/EDD requirements and expectations for higher-risk categories of customers as outlined in the FFIEC BSA/AML Examination Manual.
    - Discussion on the challenges and potential risks of conventional processes for manually identifying and managing high-risk customers.
    - Overview of new technology approaches with targeted monitoring for risk factors, alerting you to unidentified higher-risk categories, including:
    > Private ATM Owners
    > Money Service Businesses (MSBs)
    > Marijuana-Related Businesses (MRBs)
    > Non-Governmental Organizations (NGOs) or Charities
    > Cash Intensive Businesses (CIBs)
  • SkyStem: Back to Basics with Reconciliations
    SkyStem: Back to Basics with Reconciliations
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 9 2020 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • Ask the Biometrics Expert: Q&A on the Current State of Biometrics
    Ask the Biometrics Expert: Q&A on the Current State of Biometrics
    Susana Lopes, Biometrics Product Manager & Niamh Cassidy, Head of Content Recorded: Jan 9 2020 21 mins
    Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology?

    Watch this Q&A with Onfido’s biometrics expert, Susana Lopes, to learn:
    - The new trends and tech that are seeing biometrics replace traditional identifiers
    - Why a single biometric isn’t a silver bullet, and why multi-factor doesn’t always mean more secure
    - The difference between behavioural and biological biometrics, and which will work best for your users
    - What should be on your checklist when implementing biometric solutions.
  • Mobile Phishing – Myths and facts facing every modern enterprise
    Mobile Phishing – Myths and facts facing every modern enterprise
    Marielle Hagblad, Lookout Mobile Security Engineer Recorded: Jan 9 2020 38 mins
    Phishing on mobile is the biggest unsolved cybersecurity problem in the enterprise today. This is because phishing is both different and more problematic on the mobile device.

    As a result, mobile users are three times more likely to fall for phishing scams.

    In this webinar, our security expert Marielle Hagblad will shed a light on the risks of mobile phishing and the facts that will help you make informed decisions to protect corporate data.

    Myths or Facts?
    - Existing phishing protection covers mobile devices.
    - Phishing attacks only occur on email.

    Join this webinar to find out.
  • A Holistic Approach to Quality: Hyper-Testing & Lean Automation
    A Holistic Approach to Quality: Hyper-Testing & Lean Automation
    Naveen Srinivasan, Senior Consultant - Aspire Systems; Amir Rozenberg, AVP of Product Management - Sauce Labs Recorded: Jan 9 2020 60 mins
    This webinar, “A Holistic Approach to Quality: Hyper-Testing & Lean Automation” jointly conducted by Sauce Labs and Aspire Systems, will walk you through the capabilities of a unique agile testing strategy. It illustrates the importance of implementing quality engineering in an agile environment and briefs the holistic impact across multiple levels of an organization for improved ROI and decreased Cost of Quality (CoQ).

    Key Takeaways:
    •Why automated testing is critical to businesses looking to achieve their DevOps objectives
    •How progressive organizations are leveraging hyper-testing and lean automation to improve quality and accelerate innovation
    •How Hyper-Testing can simultaneously insulate your organization against risk while also encouraging exploration and innovation
  • Eliminate errors and waste in AP spend with AI
    Eliminate errors and waste in AP spend with AI
    Pippa Spencer Recorded: Jan 8 2020 28 mins
    Even if you have a tight accounts payable process with a best-in-class invoice automation system, it’s impossible to catch all of the errors, waste, and fraud in your business spend.

    Join Pippa Spencer, Lead Implementation Success Manager at AppZen, as she explains how AI-powered AP audit helps you to
    - Reduce spend
    - Streamline process
    - Stay compliant
  • Down with Spreadsheets, Automated Billing for Franchisors
    Down with Spreadsheets, Automated Billing for Franchisors
    Brian Dingman, BillingPlatform Vice President of Solutions Engineering Recorded: Jan 8 2020 36 mins
    See How BillingPlatform Transforms Franchisee Billing

    Managing franchisee billing is complex. Between getting new stores online and supporting multiple franchisees and in some cases multiple brands, corporations stay busy. With so much to do, it’s surprising that so many businesses waste valuable time and effort manually managing billing and revenue recognition in spreadsheets.

    In this 30-minute webinar, BillingPlatform will show you a better way. You’ll see how easy it can be to automate complex calculations and critical billing tasks in minutes. See how our solution solves the unique challenges of a franchisor’s business model.

    Join Brian Dingman from our Solutions Consulting Team at BillingPlatform as he demonstrates how you can transform your franchisee billing by reducing human error and increasing time to revenue. Brian will explore how our sophisticated, cloud-based solution delivers the following benefits.
    --Configure multiple pricing strategies, including subscription, usage and formula-based models
    --Automate revenue recognition practices across franchisee agreements
    --Quickly launch new monetization strategies that reward your largest franchise owners
    --Augment your FRM solution with BillingPlatform’s extensible data model

    Join us to go deep into our platform and see how we have improved the billing operations of multiple franchises.
  • Thinking (and acting) outside the perimeter: using Proactive Threat Protection
    Thinking (and acting) outside the perimeter: using Proactive Threat Protection
    Elad Tzur, Director of Sales EMEA, Segasec and Danielle Papadakis, Product Specialist, Segasec Recorded: Jan 8 2020 25 mins
    Using real-time technologies to block malicious attacks when they reach your perimeter is good, but not enough. Early detection of attack preparations, before they are launched, is critical to ensure your customers and brand safety. While Fraud and Phishing attacks have been the main concern for the past 15 years, Their threat level just keeps increasing. It is no longer just a Security owned challenge, these attacks impact the organization’s legal, marketing, IR, compliance, and Business divisions just as much.

    In this Webinar, we will introduce recent tactics & methodologies used by Hackers in Phishing and fraud attacks, uncover the challenges legacy security solutions are facing and introduce how Threat Intelligence can safeguard your brand and customers.
  • An introduction to the Open Transport Initiative
    An introduction to the Open Transport Initiative
    Hayden Sutherland, Founder, Open Transport Initiative and Marie Walker, Founder & Head of Content, Open Banking World Congres Recorded: Jan 8 2020 23 mins
    The Open Transport Initiative aims to do for transport and mobility what open banking has done for finance. Hot on the heels of launching the world's first open standards for transport interoperability (3rd Jan) founder Hayden Sutherland speaks to Marie Walker, Founder & Head of Content, Open Banking World Congress.
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 7 2020 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • Endesa Transforms with TIBCO for the Digital Energy Era
    Endesa Transforms with TIBCO for the Digital Energy Era
    Head of Integration and BPM Manager Ainhoa Ortiz del Rio, Endesa Recorded: Jan 7 2020 2 mins
    Head of Integration and BPM Manager Ainhoa Ortiz del Rio on accelerating innovation through IoT automation at the second largest electric and gas utility in Portugal.
  • Quantifying Mobile Risk in the Enterprise
    Quantifying Mobile Risk in the Enterprise
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC Recorded: Jan 7 2020 21 mins
    Protect your organization from threats targeting your corporate data. In today's webinar, our guest speaker Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC will discuss:
    - How organizations are preparing for digital transformation
    - What are the security priorities for CISOs through 2020
    - What platforms and technologies are seen as high risk for the next 5 years
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats
  • Manufacturing Intelligence - Intro to Process Optimization
    Manufacturing Intelligence - Intro to Process Optimization
    Danny W. Stout, Ph.D., Data Scientist and Senior Solutions Consultant Jan 21 2020 11:00 am UTC 7 mins
    A short video introduction to TIBCO Manufacturing Intelligence, an intelligent, automated, analytical system, that helps businesses optimize their processes, improve quality and become more efficient. Learn more on how to increase profit and decrease cost.
  • Digital Transformation of Manufacturing: From Reactive to Proactive Management
    Digital Transformation of Manufacturing: From Reactive to Proactive Management
    Mike Alperin, Manufacturing Industry Consultant, TIBCO Software Data Science team Jan 21 2020 2:00 pm UTC 49 mins
    A major transformation is taking place in manufacturing. New capabilities for processing streaming sensor data—along with big data, machine learning, and edge technologies—are driving the industry from reactive problem-solving towards increasingly proactive management of equipment, processes, products, and factories. It is now becoming possible to aggregate, analyze, and rapidly act on vast quantities of data being generated.

    In this webinar, discover how we are enabling customers with solutions such as predictive maintenance, automated pattern classification, anomaly detection, and product and process digital twins.
  • Digitale Identität und Connected Cars - Die Power von IAM richtig eingesetzt
    Digitale Identität und Connected Cars - Die Power von IAM richtig eingesetzt
    Dr. Heiko Klarl, CMO, iC Consult Group and Gerhard Zehethofer, Vice President IOT, ForgeRock Jan 21 2020 3:00 pm UTC 39 mins
    Fahrzeuge werden zunehmend intelligenter und vernetzter. Um das Kundenerlebnis bestmöglich zu personalisieren und zu sichern, baut ihre Technologie auf digitale Identität. Für den Fuhrpark-Manager, den Versicherer, den Verbraucher und alle anderen Akteure im Connected Car Ökosystem ist es wichtig zu wissen, "wer" auf "was" zugreifen kann.

    In dem gemeinsamen Webinar von iC Consult und ForgeRock erfahren Sie, wie Sie:
    - Ihre Connected Identity-Strategie aufbauen können.
    - Synergien mit anderen Geschäftsbereichen schaffen können.
    - Beim Rollout von vernetzten Diensten als auch bei der Erforschung neuer Geschäftsmodelle die Geschwindigkeit erhöhen und die Time-to-Market verkürzen können.

    Webinare / Webcasts
    Mit Ihrer Registrierung erklären Sie sich damit einverstanden, dass wir Ihre Daten an den Sponsor dieses Webinars weitergeben, damit dieser Sie kontaktieren und Follow-up-Marketing betreiben kann. Die Rechtsgrundlage für die Verarbeitung Ihrer personenbezogenen Daten auf diese Weise ist unser berechtigtes Interesse gemäß Art. 6 (1) (f) DSGVO, das wäre die Teilnahme unserer Sponsoren, die einen großen Teil der Kosten für die Webinare / Webcasts übernehmen.
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Jan 21 2020 8:00 pm UTC 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • Customer Journey for Retail Banking Video
    Customer Journey for Retail Banking Video
    TIBCO Software Jan 22 2020 11:00 am UTC 9 mins
    TIBCO’s Connected Intelligence Platform offers enterprise connectivity through API-led and Event-driven integrations to provide a connected, real-time foundation to build differentiated customer experience. This short video demonstrates how TIBCO provides real-time ways to connect apps and data, understand events, and to act in real-time, all in a cloud-native manner
  • Digital Identity and Connected Cars - Leveraging the Power of IAM
    Digital Identity and Connected Cars - Leveraging the Power of IAM
    Dr. Heiko Klarl, CMO, iC Consult Group and Gerhard Zehethofer, Vice President IOT, ForgeRock Jan 22 2020 3:00 pm UTC 40 mins
    As vehicles become smarter and more connected, their technology relies on digital identity to personalise and secure the customer experience. For the fleet manager, insurance provider, consumer, and anyone else in the modern connected vehicle environment, knowing “who” can access “what” is essential.

    In this joint webinar with iC Consult and ForgeRock you learn how to build up your connected identity strategy. Not only will you create synergies with other business areas, you also gain speed and a shorter time to market when rolling out connected services and explore new business models.

    Webinars / Webcasts
    With your registration you agree that we submit your data to the Sponsor of this webinar to enable them to contact you and to do follow-up marketing. The legal basis for processing your personal data this way is our legitimate interest according to Art. 6 (1) (f) GDPR, which would be the participation of our sponsors, which contribute large portions of the costs of the Webinars / Webcasts.
  • Northern Trust Distribution: All change in Switzerland
    Northern Trust Distribution: All change in Switzerland
    Sascha Calisan, Head of Distribution Support, Northern Trust and Luis Pedro, CEO, Oligo Fund Services Jan 22 2020 3:00 pm UTC 60 mins
    This webinar will focus on the upcoming changes in the regulatory framework in Switzerland, and we will examine what this means for your distribution strategy and sales force.
  • Satisfying the 2020 NACHA Data Security Supplement
    Satisfying the 2020 NACHA Data Security Supplement
    Ulf Mattsson, Head of Innovation, TokenEx Jan 22 2020 5:00 pm UTC 60 mins
    This session will discuss changes to the Nacha Operating Rules that will enhance quality and improve risk management and the implementation phases.

    The effective date is June 30, 2020 for Originators and Third-Parties with ACH volume greater than 6 million in 2019 and June 30, 2021 for Originators and Third-Parties with ACH volume greater than 2 million in 2020.

    We will discuss potential impacts, compliance obligations, and the API standardization that is key to creating efficiency and interoperability in financial services. This includes the Afinis Interoperability Standards that unites diverse, global stakeholders to bring security and interoperability throughout the financial services industry.

    We will also discuss the Nacha rules, implemented in September 2013, that allow us to identify and track healthcare payments via ACH and provide for the automatic re-association of healthcare payments with payment information.
  • 4 limitations of the three-way match you need to consider
    4 limitations of the three-way match you need to consider
    Ryan Birdsall Jan 22 2020 7:00 pm UTC 60 mins
    The three-way match, which cross-references invoices, purchase orders, and receiving documents before issuing payments, has been considered the industry-standard procedure in accounts payable departments for years—until now.

    As businesses become more sophisticated, there are far more data points to confirm the validity of an invoice. Does it include all early payment discounts? Are the payment terms (net 30, net 60) enforced?

    Unfortunately, many accounts payable departments don’t have the time or resources to manually check these items and are unknowingly being overcharged for services that they didn’t receive, or products that aren’t for the negotiated rates or terms.

    Join Ryan Birdsall, Customer Success Manager, AppZen, as he discusses why Star Match brings far greater precision to the spend approval process than you’ve had in the past.
  • Enhancing QA Strategy to Achieve Agile Quality Engineering
    Enhancing QA Strategy to Achieve Agile Quality Engineering
    Katie Kavanaugh, QA Director - Mansfield , Vasanth Manickam, Technical Test Manager- Aspire Systems Jan 23 2020 10:00 am UTC 46 mins
    The purpose of this webinar is to discuss how choosing the right Agile Program Framework influences Quality Engineering and Testing. It also briefs how it plays a pivotal role in adding value to the IT landscape of Mansfield.

    Key Takeaways

    •Approach to handling quality through the right combination of Strategical and Tactical Testing
    •How to leverage test automation to help the entire agile process
    •Continuous learning and proactive planning to minimize defects
    •Aligning QA vision abreast the futuristic needs of the business
    •Implementing continuous improvement and assurance that the Agile Program Framework remains relevant
  • AI's Impact on Financial Service & Insurance - The Good, The Bad & The Ugly
    AI's Impact on Financial Service & Insurance - The Good, The Bad & The Ugly
    Mark Palmer, SVP and General Manager of Analytics at TIBCO Software & David Skerrett, Digital Transformation Leader Jan 23 2020 11:00 am UTC 59 mins
    Delve into the FSI computing trends that will facilitate next-generation banking systems. From adaptive data science for real-time and predictive intelligence, to visual intelligence that helps humans effectively “query the future,” this webinar examines:

    - How artificial intelligence is innovating the industry and how humans and machines can combine to achieve strategic enhancement
    - How FSI leaders can make sense of millions of data points and turn them into meaningful insights, and how AI is making this easier than ever before
    - How data analytics is transforming risk and fraud management
    - Discussions and participant poll results surrounding the good, the bad, and the ugly of AI
  • Third-Party Vendor Security and Risk Management
    Third-Party Vendor Security and Risk Management
    Sam Heiney, Director of Product Management, Netop Tech Jan 23 2020 2:00 pm UTC 45 mins
    How many vendors need at least some access to your network? For most businesses, service providers and other third parties are critical to success, but they can also introduce additional risks.

    Sign up for this webinar, where we cover the best practices for managing third-party risk using remote access software.
  • Empower the Workplace using Modern Authentication
    Empower the Workplace using Modern Authentication
    Jeff Broberg, Senior Director of Product Management, OneLogin / Karen Larson, Integrations Program Manager, Yubico Jan 23 2020 5:00 pm UTC 44 mins
    Passwords typically lead the entryway for accessing a company’s assets. However, with the increase in data breaches due to weak passwords, organizations are looking for better alternatives when it comes to authentication.

    Learn how WebAuthn helps organizations move away from passwords and towards a reduced password environment. Now organizations have the flexibility and options to leverage biometrics authentication for seamless user experience, without compromising security.

    View this webinar to learn:

    -How modern biometrics authentication impacts today’s workforce
    -Use cases of WebAuthn/FIDO2
    -Best practices to employ WebAuthn/FIDO2 authentication to enable secure access to your organization’s assets
  • Data-Driven Insights from Safely Combined Datasets
    Data-Driven Insights from Safely Combined Datasets
    Federico Benedetto, Product Manager, Privitar Jan 23 2020 5:00 pm UTC 30 mins
    Linkability between datasets is essential, as some of the most valuable insights in data science come from connecting different data sources.

    But as you combine these different datasets, the data becomes increasingly sensitive and at risk. Seemingly innocuous attributes can be combined together to give reveal sensitive information.

    This webinar will demonstrate how to safely collect and join data from various sources, as well as control linkage of disseminated datasets.

    Join this session to:

    - Learn about the benefits and risks of linking datasets.

    - Learn about the techniques that can be employed to control direct and indirect linkability with Protected Data Domains and generalisation techniques.
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem Jan 23 2020 8:00 pm UTC 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • Fraud Scams: Red Flags & Best Practices to Prevent Loss
    Fraud Scams: Red Flags & Best Practices to Prevent Loss
    Josh McCarthy, Verafin Jan 24 2020 5:30 pm UTC 59 mins
    Presented by Verafin

    From mass marketing fraud, to romance and work-from-home scams, and Business Email Compromise, savvy fraudsters are targeting your customers with a variety of illicit tactics — and inflicting millions of dollars in losses.

    Join Josh McCarthy as he discusses the potential reputational and financial risks to your institution and outlines best practices to protect your customers from the devastating emotional and financial effects of fraud scams.

    Highlights of this educational webinar include:

    - Evolution of fraud schemes & scams perpetrated through digital channels.
    - Red flags for common scams scenarios targeting customers.
    - Best practices for loss prevention, early detection, and investigation strategies.
    - Role of technology in fraud mitigation, including cloud data and multi-channel analysis.
  • A Practical Data Privacy and Security Approach to FFIEC, GDPR and CCPA
    A Practical Data Privacy and Security Approach to FFIEC, GDPR and CCPA
    Ulf Mattsson, Head of Innovation, TokenEx Jan 24 2020 6:00 pm UTC 61 mins
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.

    This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.

    Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.
  • Protect against phishing threats in a post-perimeter world
    Protect against phishing threats in a post-perimeter world
    Aaron Cockerill, Chief Strategy Officer, Lookout Jan 27 2020 10:00 am UTC 51 mins
    As phishing attacks evolve, organisations must protect corporate data in the cloud. Register for this exclusive webinar now to learn:

    - The latest tactics attackers are using to exfiltrate enterprise data
    - Why phishing is more problematic and successful on mobile
    - How to identify if an employee device has been phished
    - How to remain compliant by reducing cyber risk from mobile endpoints
  • Mobile Banking Malware
    Mobile Banking Malware
    Edan Cohen Jan 27 2020 6:00 pm UTC 25 mins
    As people are constantly depending on their cell phones, cybercriminals have also focused their efforts and mobile banking malware has increasingly become a threat. In this webinar, Edan Cohen will discuss the two main types of mobile banking malware, mobile banking trojans and rogue banking applications, and also talk about how their capabilities can extend far beyond just stealing your banking credentials.
  • Expert Analysis on ServiceNow New York: Mobile, DevOps & Predictive Intelligence
    Expert Analysis on ServiceNow New York: Mobile, DevOps & Predictive Intelligence
    Sreeni Yallasir, Sr. ServiceNow Architect; Raghav Udupi, Sr. ServiceNow Architect; Stephen Makowski, ServiceNow Consultant Jan 28 2020 3:30 pm UTC 60 mins
    Although ServiceNow has already established itself as an industry leader leveraging its powerful modules and applications, they constantly expand their existing capabilities through new releases. ServiceNow’s latest release “New York” has been launched recently with multiple new features and products. In this webinar, we will conduct an expert analysis on new features and products from the New York release.

    Key takeaways from this session include:

    - Now Mobile App, Agent Mobile App, and Mobile Onboarding App
    - Transform the IT experience with ServiceNow DevOps
    - Guided App Creator
    - Integration Hub: Powerful Integrations & Workflow Automation
    - Predictive Intelligence
    - ITOM : Operational Intelligence
    - Scaled Agile Framework (SAFe)
    - Other new features on, SAM, PA, Service Portal and more
  • Managing Model Complexity in the Fight Against Fraud
    Managing Model Complexity in the Fight Against Fraud
    Ajay Andrews, Ekata VP of Product Management and Trevor Anderson, Ekata Director of Solutions Architecture Jan 28 2020 5:00 pm UTC 37 mins
    Fighting fraud is a complex business. As new trends emerge across different regions and product lines, it can be a challenge to manage the large amounts of data required to build effective fraud models.

    Instead of spending time cleansing and normalizing data from various sources, join our webinar and learn how to optimize your models by:

    -Leveraging robust data sets that improve performance
    -Avoiding the time suck of endless feature engineering and overfitting
    -Consolidating data vendors to focus your horsepower on sophisticated algorithms
  • How Native Payments Can Unlock Value for Your Startup
    How Native Payments Can Unlock Value for Your Startup
    Kristopher Riley, Head of Business Development @ Paystand & Eduardo Lopez, Content Marketing Manager @ Paystand Jan 28 2020 6:00 pm UTC 26 mins
    Are you losing 3-5% of revenue to your payments partner? Using native payments, startups like Airbnb, Lyft, and Shopify are enabling new types of on-platform transactions to drive billions in revenue. Join us for a live webinar on how startups can use native payments to outgrow their competitors.

    What you’ll learn:

    -How Fintech-enabled marketplaces can upend both traditional offline industries and incumbent marketplaces
    -Actionable ways on-platform transactions drive exponential value
    -Our step-by-step process for enabling 2-sided marketplaces
    -How to remove friction during new user on-boarding
  • CCPA Compliance Beyond Deadline Day
    CCPA Compliance Beyond Deadline Day
    Guy Cohen | Lisa Hawke | Joanne Furtsch | Laura Koulet Jan 28 2020 7:00 pm UTC 60 mins
    On January 1st 2020, the California Consumer Privacy Act (CCPA) is going into effect. Are you familiar with the CCPA's privacy requirements? Is your organization ready for the most far-reaching data privacy regulation in the U.S. to date? 
    Join this panel of privacy experts for an interactive Q&A session to learn more about how CCPA will impact your organization, as well as dive into the main differences between CCPA and GDPR.
    - The CCPA privacy requirements- CCPA checklist beyond deadline day
    - Data mapping: how and why it is important for CCPA and GDPR
    - Data Subject Access Requests 
    - Other key similarities and differences between GDPR vs. CCPA
    - The future of privacy and compliance in 2020 and beyond

    Speakers:
    - Guy Cohen, Strategy and Policy Lead, Privitar
    - Lisa Hawke, VP Security and Compliance, Everlaw
    - Joanne Furtsch, Director, Deputy Data Governance Officer, TrustArc
    - Laura Koulet, Vice President, Head of Legal & Privacy, Tapad
  • SkyStem: Back to Basics with Reconciliations
    SkyStem: Back to Basics with Reconciliations
    Nancy Wu, Sales and Customer Support, SkyStem Jan 28 2020 8:00 pm UTC 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • Why operational excellence in payments is critical to your future success
    Why operational excellence in payments is critical to your future success
    FinTech Futures & Red Hat Jan 29 2020 2:00 pm UTC 30 mins
    Improving your operational efficiency is on the forefront of competitive advantages. And it’s your leadership that is helping you thrive in this hyperconnected world. But could you be doing more? Should you be considering different approaches?

    Join us for this virtual firechat chat from Sibos with Red Hat and FinTech Futures and learn:

    •Steps taken to improve the design of their payment operational processing
    •Strategic tips and lessons learned in building and executing payments strategy
    •How technology that simplifies complexity can also help create a more agile culture?