Page 27 - GS210701
P. 27

CoverStory




              multifactor authentication, that require attackers to   3.  Test incident response: Test incident  response
              write specialized code, which in most cases is just     plans to confirm operations are sustainable.
              not worth doing," he said.                              4. Check security teams: Use third-party penetra-
            • Accuracy: Winslow pointed out that in addition to       tion testing to assess system security.
              outpacing humans, AIs have self-learning capabili-      5. Segment networks: Separate business functions
              ties that drive "hyper-accuracy," enabling them to      and manufacturing/production operations to ensure
              continuously improve with every identity, risk and      that networks can continue operating if isolated.
              compliance decision. Socure uses these advanced
              functionalities to enable clients and partners to au-  "The private sector also has a critical responsibility to pro-
              tomate new account onboarding and decisioning,    tect against these threats," Neuberger wrote in an open
              reduce manual reviews, fraud losses, and operation-  letter. "All organizations must recognize that no company
              al overhead and grow more rapidly.                is safe from being targeted by ransomware, regardless of
                                                                size or location."
              "Fraudsters are smart, but Socure's AI can outsmart
              those fraudsters while instantly approving the le-  A  free  copy  of  the  CISA/MS-ISAC  Ransomware  Guide
              gitimate individuals accessing services at incred-  is available at:  www.infosecinstitute.com/wp-content/up-
              ible scale, which is why it's so important to adopt a   loads/2021/05/IQ-Whitepaper-CISA-MS-ISAC-Ransomware-
              centralized identity strategy that meets your needs   Guide.pdf.
              across the user lifecycle," he said.

            • Agility: Smith-Taylor noted that ThetaRay's SONAR   Dale S. Laszig, senior staff writer at The Green Sheet and managing
              leverages AI and machine learning to detect anoma-  director at DSL Direct LLC, is a payments industry journalist and content
              lous activities. The solution applies these technolo-  strategist. She can be reached at dale@dsldirectllc.com and on Twitter
              gies across SWIFT traffic and real-time and auto-  at @DSLdirect.
              mated clearing house schemes to instantly
              unlock hidden insights and reveal suspicious
              transaction profiles.
              "SONAR ingests data in all major formats, in-                Grow your
              cluding RJE, API, CSV and XML," he said. "It
              offers user-friendly APIs and  flexible archi-
              tecture to simplify integrating, maintaining        ISO/Agent portfolio
              and running a diversity of fintech applica-
              tions, all backed by flexible global support."

            • Scale: Pashley cited AI's ability to reconfig-
              ure databases on the fly as another competi-
              tive advantage and mentioned that Kompli-
              Global recently launched Kompli-Investigate,
              a research utility designed to detect corporate
              entities and staff. The solution collates and
              reconfigures corporate structure data to keep
              new and changed information up to date and
              remaps the  entire database every night, he
              stated, adding that this enables in-house ex-
              perts to overlay known fraud characteristics
              and suspicious scenarios to protect users and
              alert stakeholders to hidden criminal activity.

        Join the fight
        On June 2, 2021, Anne Neuberger, deputy national
        security advisor for cyber and emerging technology,
        urged corporate leaders to be vigilant in detecting
        and preventing ransomware attacks by implement-
        ing the following five best practices:                 go.globalpaymentsinc.com/agent-iso
              1. Back up data: Ensure that backups are reg-
              ularly tested and stored offline.                    Visit us at MWAA | Booth GS09
              2. Update systems: Maintain updated operat-
              ing systems, applications and firmware.
                                                                                                                27
   22   23   24   25   26   27   28   29   30   31   32