This course examines the enablement of new and traditional financial crimes by modern technologies, including the internet of things, big data, mobile devices and the internet. Explained to non-technical financial services audiences by way of numerous practical examples and case studies, the topic is brought to life by our experienced cybersecurity and fraud trainers.
The course also looks at the potential effects of emerging technologies and recent regulatory changes, such as GDPR and (Payment Services) Directive (EU) 2015/2366 (‘PSD2’) on future crime trends and related risks.
There are no prerequisites for this workshop other than an interest in good governance and effective control in the era of high-tech.
This is an excellent non-technical introduction to technology-dependent cybercrimes for anyone interested in the impact of high-tech on risks in financial services; compliance, fraud, risk, IT, FinTech, security and audit.
- Why data sits at the nexus of fraud and cybercrime and how it is exploited
- Why artificially intelligent decisioning platforms and rogue insiders represent the next big threat to financial services security
- How modern technology is exploited by fraudsters
- How unregulated payment mechanisms and new technologies can be used to bypass sanctions and fund terrorism
- Understand the impact of modern technology on financial crime and compliance today
- Gain insights into what financial crime and compliance risks might look like in the near future
- Develop ideas for ways in which they can use online resources to conduct more effective Know Your Customer (KYC), Customer Due Diligence (CDD) and Politically Exposed Person (PEP) checks
The workshop is delivered as a single 1-day unit. It is hard-hitting and interactive, and relevant to today’s headlines, regulatory environment and cyber security challenges. The workshop is presented by dynamic senior associates with decades of experience addressing top management in financial services firms and regulatory bodies:
- Data protection, Big Data and the Internet of Things
- Phishing, online searching and de-anonymization
- Fraud, identity theft and account takeover
- AI decisioning technologies
- Insider threats
- Market abuse
- Automated payment validation challenges
- Ransomware and spyware
- Rogue state actors
- Critical national infrastructure
- Denial of service attacks
- Unregulated payment mechanisms and eMoney-laundering
- Sanctions bypass and terrorist funding via online means
- PEPs and enhanced due diligence opportunities
- Open Banking and Big Data
- Supercomputing and trading
- Quantum computing and the challenge to cryptography
- Wearables, robotics and implants