Maybe this is the one that gets us seriously talking about socio-technical systems and the inherent vulnerability of human factor contributions in any system.
Which will win here; blame or learning?
Continue ReadingMaybe this is the one that gets us seriously talking about socio-technical systems and the inherent vulnerability of human factor contributions in any system.
Which will win here; blame or learning?
Continue ReadingBlockchain Technology for Compliance and Managing Risk (Part 2) Join us on this episode of FraudCast as we discuss blockchain technology for compliance and managing risk with Ian Worrall, CEO of Encrypted Labs. We answer questions such as: How did you get started? How do you address people being skeptical about robots? Regulatory concerns? Private and/or government? And much more. YouTube link: https://youtu.be/Uw4gsd4z-pQ Also see:Unlocking Economic Advantage with Blockchain: A guide for asset managers (J.P. Morgan, 2016) PDFCall for Subject Matter Experts to become a guest speaker on FraudCast.Helpful Speaker Tips for step by step instructions on the interview process.
Continue ReadingBlockchain Technology for Compliance and Managing Risk Join us on this episode of FraudCast as we discuss blockchain technology for compliance and managing risk with Ian Worrall, CEO of Encrypted Labs. We answer questions such as: What is Blockchain Technology? How can it be used to reduce systemic Fraud? What is the competitive advantage of BigchainDB? And much more. YouTube link: https://youtu.be/8m9RblWfORM Also see:Unlocking Economic Advantage with Blockchain: A guide for asset managers (J.P. Morgan, 2016) PDFCall for Subject Matter Experts to become a guest speaker on FraudCast.Helpful Speaker Tips for step by step instructions on the interview process.
Continue ReadingThe other day I was at a client site assisting them with building their global antifraud program. While there, I realized they did not have a process for back-up related to employees who travelled. They had a robust system-level process for backing up desktops and laptops while they were actively connected to their network. However, there was no process in place (manual or otherwise) to back-up the data on employee’s laptops when they were travelling and thus not connected to the organization’s network. Many of the thousands of people who travelled would be in the field (yes, sometimes an actual field near a tiny village in the jungle) for weeks… Read More
Continue ReadingSocial engineers get useful information from unsuspecting people and use it in potentially nefarious ways. Simple conversations provide the opportunity for the social engineer to get seemingly benign information from individuals over the course of one or many encounters. That information can then be combined with other open source information to then provide the social engineer with everything they need to carry out an attack on a system, enter a secure building, or any number of applications that could cause harm to your organization. Protect your employees by educating them about the direct implications this can have on your company. Teach them what to look for so they can avoid… Read More
Continue Reading