About the course
This course examines the enablement of new and traditional financial crimes by modern technologies, including the internet of things, big data, mobile devices and the internet. Explained to non-technical financial services audiences by way of numerous practical examples and case studies, the topic is brought to life by our experienced cybersecurity and fraud trainers.
The course also looks at the potential effects of emerging technologies and recent regulatory changes, such as GDPR and (Payment Services) Directive (EU) 2015/2366 (‘PSD2’) on future crime trends and related risks.
There are no prerequisites for this workshop other than an interest in good governance and effective control in the era of high-tech.
This is an excellent non-technical introduction to technology-dependent cybercrimes for anyone interested in the impact of high-tech on risks in financial services; compliance, fraud, risk, IT, FinTech, security and audit.
Why data sits at the nexus of fraud and cybercrime and how it is exploited
Why artificially intelligent decisioning platforms and rogue insiders represent the next big threat to financial services security
How modern technology is exploited by fraudsters
How unregulated payment mechanisms and new technologies can be used to bypass sanctions and fund terrorism
Understand the impact of modern technology on financial crime and compliance today
Gain insights into what financial crime and compliance risks might look like in the near future
Develop ideas for ways in which they can use online resources to conduct more effective Know Your Customer (KYC), Customer Due Diligence (CDD) and Politically Exposed Person (PEP) checks
The workshop is delivered as a single 1-day unit. It is hard-hitting and interactive, and relevant to today’s headlines, regulatory environment and cyber security challenges. The workshop is presented by dynamic senior associates with decades of experience addressing top management in financial services firms and regulatory bodies:
Data protection, Big Data and the Internet of Things
Phishing, online searching and de-anonymization
Fraud, identity theft and account takeover
AI decisioning technologies
Automated payment validation challenges
Ransomware and spyware
Rogue state actors
Critical national infrastructure
Denial of service attacks
Unregulated payment mechanisms and eMoney-laundering
Sanctions bypass and terrorist funding via online means
PEPs and enhanced due diligence opportunities
Open Banking and Big Data
Supercomputing and trading
Quantum computing and the challenge to cryptography
Wearables, robotics and implants