Whitepaper

 

Guideline Data Acquisition for Investigation Purposes

19 June 2015

IT security incidents sometimes are of such nature that the organisation affected by the incident wants to pursue prosecution. However, often the facts are not necessarily immediately communicated to the police for a variety of reasons, including the fact that the ir scope and nature is not clear from the beginning. For prosecution to be successful, the chain of custody needs to be preserved in a legally accepted manner, which requires the evidence to be preserved immediately after the detection of the incident.

It should be noted that communication to law enforcement authorities must be made as soon as possible after discovery of the facts given the volatility of traces and actions that could be taken (Internet identification, etc.). The purpose of these guidelines in this white paper is to help IT services to preserve evidence in an IT security incident in such a way that the investigation by IT security experts or law enforcement authorities can be carried out in an optimal manner.

Whitepaper

 

Endogenous Instability

10 June 2015

Financial Risk Management is strongly hindered by the conventional macro-economic vision of the world, assuming stabilising cyclical processes, that are once in a while temporarily taken out of equilibrium due to external shocks. Reality is much more hectic and has more similarities with debt-driven instability created from within the economy. This results in much more severe market crashes and deeper depressions than conventional theory teaches us. This is the theory of Endogenous Instability.

Whitepaper

 

Is an outdated investment management system damaging your business ?

27 May 2015

Legacy issues will always be there, even in an outsourcing relationship. What is important for asset managers and their operations teams is that they are able to spot the signs of impending legacy and are prepared for the necessary changes. The following report is designed to help you identify these signs and give you some ideas about how to replace any outdated technology.

Fraud and fighting fraud anno 2015: in practice

21 May 2015
Knowledge Base

by Andy Scherpenberg

VAT carousels, intentional road collisions to defraud the insurance companies, ‘man in the browser’ technology that intercepts your financial transactions and modifies both amount and account number while you are still seeing the usual transaction screens: fraud has permeated every sector and is taking new forms and shapes. Fraudsters are becoming smarter by the day and they have access to more and more resources. In a previous blog post you could already get a sense if the impressive weaponry that the fraudsters have at their disposal. Continue reading…

Exciting opportunities for risk professionals wanting a more strategic influence

11 May 2015

Businesses should consider appointing an executive risk leader to navigate today’s increasingly complex world, or risk leaving their company exposed to the next big crisis, according to Airmic and other leading business organisations. The association’s CEO, John Hurrell, (see photo above)  has said this would open up exciting opportunities for risk professionals wanting a more strategic influence in their business.

 

Continue reading…

How can banks re-invent the services they offer in the digital economy?

06 May 2015

by Mike Wood

‘European Digital Banking Forecast’ by Forrester Research (*)  suggests that technology has transformed financial services, that online and mobile banking are widespread, and will continue to grow over the next few years. Digital banking is far more comprehensive than simply automating and optimising processes – it’s a case of business transformation to shake up existing ways of operating and thinking in order to better support customer demand.

Continue reading…