- A Guide to Secure E-Delivery of Disclosures for Financial Services
- Pursue Fraud With IBM Intelligent Investigation Manager
- Data Loss Prevention White Paper
- Unified Information Access for Financial Services Institutions
- Optimize Programs and Fulfill Mandate Expectations with Project and Portfolio Governance
Why are effective incident responses - those which not only "fix" the current compromise, but incorporate lasting, corrective measures to avoid future attacks taking so long? A lack of clarity has emerged as the primary, driving factor. On the technical side, organizations still deal with a mishmash of siloed systems that can't "talk" to each other.
The co-authors of this white paper, are chief information security officers (CISOs) representing the financial sector. In ...
April 2014- Your organization may be at risk because of issues that aren't on your radar but offer significant exposure."Leaky" Risk: Hidden Losses that Cost Insurance Companies Money, offers an industry veteran's perspective on how to identify potentially troublesome areas and use process and content management technology to mitigate the risk
February 2013- As insurers work to achieve self-sufficiency, they need to proceed with eyes wide open. They should be well prepared, and take stock of both their organization, and the vendor's organization and solution offering.
Productivity is critical in today's claims processing organizations, and there's no shortage of systems and methodologies to improve it! While helpful, these systems overlook the most important resource in claims processing-the people who perform the work.
In this eBook, Verint Systems takes a closer look at the opportunities for improved efficiencies left on the table by current technology and practices. Verint explains how workforce optimization solutions, adapted specifically for back-office operations, are now ...
Information security is no longer a mere compliance matter or the cost of doing business. It has become the primary business challenge that financial organizations must address.
In the new era of cybersecurity threats, highly sophisticated adversaries seek not only to do harm but also to reside in the background undetected, so they can access your intellectual property, operational resources and mission-critical data.
A new white paper by CSC uses a ...
September 2011- Read how insurance companies can gain added value through governance, risk and compliance, which embed rules, processes and controls in keeping their operating policies and strategic objectives. This provides greater transparency into daily operations helping identify potential risks and address them quickly.
Enterprises are seeking ways to simplify and reduce the scope of the Payment Card Industry’s Data Security Standard (PCI DSS) compliance by shrinking the footprint where cardholder data is located throughout their organization. By reducing the scope, these enterprises can dramatically lower the cost and anxiety of PCI DSScompliance and significantly increase the chance of audit success.
Compliance with the PCI DSS is a combination of documented best practices and technology solutions ...
July 2010- Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. Companies know they can’t afford a data breach – customer churn, loss of business, brand damage, fines and litigation. In today’s global market, where business data and personal information know no boundaries, traditional point solutions that protect certain devices or applications against specific risks are insufficient to provide cross-enterprise data security. As enterprises seek to protect data from ...
March 2009- As the global economic crisis continues to batter the financial services industry, insurers’ very survival increasingly depends on their ability to manage risk. By weaving analytics into the fabrics of their organizations, innovative carriers are turning their massive stores of data into actionable intelligence, gaining a more complete view of their risk exposure and driving greater profitability to the bottom line.
June 2008- The U.S. Department of Treasury released in October 2005 the final ruling that life insurance and annuity companies must implement money laundering-prevention programs and comply with Suspicious Activity Report (SAR) guidelines by May 2006. This white paper takes a brief look at ways SAS Anti-Money Laundering is designed to help these companies comply with regulations. You will learn about SAS' ability to detect a variety of suspicious activities. Anti-Money Laundering helps life insurance and annuity companies ...
December 2008- Hurricane Katrina. A terrorist attack. A market panic. Even a planned presidential visit can disrupt communications. The costs can be extraordinary. Within minutes, a bank can lose millions of dollars due to disrupted financial transactions. Customers unable to reach a live agent can cause waves of panic within an insurers’ customer base. Sprint’s Emergency Response Team (ERT) ensures that financial services organizations will never miss an email or phone call. The team, staffed with ...
June 2008- Committed to continually enhancing the security of its members’ information, Verity Credit Union requires all employees to remember complicated passwords consisting of 12 characters to access several applications. "Unfortunately, the number and complexity of passwords led to slow log-on times or calls to the helpdesk for password resets. This negatively impacted productivity, our ability to serve members, and our helpdesk costs," explained Jon Wu, System Engineer for Verity Credit Union. The IT team wanted to make ...
April 2008- Does Your Testing Practice Get a Passing Grade?
March 2006- Business continuity is a goal of every business. Managing operations effectively, maintaining profitability, and making sure customers and employees are satisfied are vital elements for continuity, but they do not provide a guarantee against closure. A successful, profitable business that is located in an area where natural disasters are a seldom occurrence does not mean that it will remain open. Chemical spills, ice storms, and pandemics can prevent access to the office. Far more common ...
View All Categories
INSURANCE: Architecture/Infrastructure, Claims, Customer Insight/Business Intelligence, Distribution, Management Strategies, Policy Administration & Management, Regulation/Financial Systems, Security/Risk Management