Page 27 - GS210701
P. 27
CoverStory
multifactor authentication, that require attackers to 3. Test incident response: Test incident response
write specialized code, which in most cases is just plans to confirm operations are sustainable.
not worth doing," he said. 4. Check security teams: Use third-party penetra-
• Accuracy: Winslow pointed out that in addition to tion testing to assess system security.
outpacing humans, AIs have self-learning capabili- 5. Segment networks: Separate business functions
ties that drive "hyper-accuracy," enabling them to and manufacturing/production operations to ensure
continuously improve with every identity, risk and that networks can continue operating if isolated.
compliance decision. Socure uses these advanced
functionalities to enable clients and partners to au- "The private sector also has a critical responsibility to pro-
tomate new account onboarding and decisioning, tect against these threats," Neuberger wrote in an open
reduce manual reviews, fraud losses, and operation- letter. "All organizations must recognize that no company
al overhead and grow more rapidly. is safe from being targeted by ransomware, regardless of
size or location."
"Fraudsters are smart, but Socure's AI can outsmart
those fraudsters while instantly approving the le- A free copy of the CISA/MS-ISAC Ransomware Guide
gitimate individuals accessing services at incred- is available at: www.infosecinstitute.com/wp-content/up-
ible scale, which is why it's so important to adopt a loads/2021/05/IQ-Whitepaper-CISA-MS-ISAC-Ransomware-
centralized identity strategy that meets your needs Guide.pdf.
across the user lifecycle," he said.
• Agility: Smith-Taylor noted that ThetaRay's SONAR Dale S. Laszig, senior staff writer at The Green Sheet and managing
leverages AI and machine learning to detect anoma- director at DSL Direct LLC, is a payments industry journalist and content
lous activities. The solution applies these technolo- strategist. She can be reached at dale@dsldirectllc.com and on Twitter
gies across SWIFT traffic and real-time and auto- at @DSLdirect.
mated clearing house schemes to instantly
unlock hidden insights and reveal suspicious
transaction profiles.
"SONAR ingests data in all major formats, in- Grow your
cluding RJE, API, CSV and XML," he said. "It
offers user-friendly APIs and flexible archi-
tecture to simplify integrating, maintaining ISO/Agent portfolio
and running a diversity of fintech applica-
tions, all backed by flexible global support."
• Scale: Pashley cited AI's ability to reconfig-
ure databases on the fly as another competi-
tive advantage and mentioned that Kompli-
Global recently launched Kompli-Investigate,
a research utility designed to detect corporate
entities and staff. The solution collates and
reconfigures corporate structure data to keep
new and changed information up to date and
remaps the entire database every night, he
stated, adding that this enables in-house ex-
perts to overlay known fraud characteristics
and suspicious scenarios to protect users and
alert stakeholders to hidden criminal activity.
Join the fight
On June 2, 2021, Anne Neuberger, deputy national
security advisor for cyber and emerging technology,
urged corporate leaders to be vigilant in detecting
and preventing ransomware attacks by implement-
ing the following five best practices: go.globalpaymentsinc.com/agent-iso
1. Back up data: Ensure that backups are reg-
ularly tested and stored offline. Visit us at MWAA | Booth GS09
2. Update systems: Maintain updated operat-
ing systems, applications and firmware.
27