2021 has given rise to sophisticated Carbanak style attacks. The original investigation discovered that the attackers had launched a combined cyber and malware-based bank theft totaling more than $1 billion. This organized criminal gang gained access to systems through phishing, then mimicked the institution’s staff to transfer fraudulently inflated balances to their own accounts in addition to programming ATMs to dispense cash to waiting accomplices. This type of fraud reaches across multiple bank anti-fraud and investigation silos including AML, Fraud and Cyber investigation groups. The attacks reveal that internal firewalls between the investigational groups of cyberattacks, fraud, and financial crime must be broken down or institutions will face massive losses. This session will focus on how to synchronize the efforts of investigation groups to allow a response in real time and thus avoid sanctions and fines.
This event is designed in a speed dating format, focusing on key topics for under 15 minutes in order to maximize the insights. During this webinar, teams of experts from Expero and TigerGraph will show you how to leverage current technologies with TigerGraph, Machine Learning, and Visualizations to unlock the potential in your organization.
Key Learning Topics:
Unique Challenges in Cyber Security - Discuss the new FinCen reporting rules for Cyber Security and other impacts on compliance and how to identify real time threats
Watch List & Technology Innovations - How to utilize watch list data & breech data in real time with new technologies like master data matching, graph analytics, and ML, and how they assist in the reduction of false positives and increase accuracy
Empower the Cyber Investigator & Risk Team - Discuss capabilities in visualization and human intelligence technologies that will increase throughput and provide valuable data analytics, and create quicker and more efficient outcomes for Fraud Managers, Investigators, and Data and Analytics teams
Rise of ML & AI with ‘Explainable’ ML - How to implement practical methods of cyber identification, complex dependency and case management using ‘human-in-the-loop’ technology for higher accuracy and process streamlining