This training program will discuss how cyber-attacks affect payment processing. It will highlight to attendees how best to record appropriate sound business practices for managing operational risk due to a cyber-attack. Attendees will also learn to identify critical operational communications, from internal staff to customers and institutions to vendor support.
It is critical that you have an already tested plan and are prepared in advance to deal with these devastating situations. Building off of the February 9th session Cyber Attacks, Incident Response Checklist, Testing & Resources - Beyond Disaster Recovery, attendees of this session will test their operational incident response plan knowledge and gain valuable insight into the unique payments environment.
Even in the face of a cyber-attack, payments must continue. How do you process payroll when you can’t connect to your bank’s platform to submit files? How do you pay vendors when your network is shut down? How do you reimburse employees for travel expenses timely when their information is at risk? Suggested resolutions to these questions and more are presented in this information-packed webinar.
This webinar will cover:
Why Should You Attend:
Continuing operations and the flow of payments when disaster strikes is nothing new to financial institutions and businesses. However, how you continue processing while under a cyber-attack is very different than other types of disasters. The decisions you make, from processing to communicating with customers, can significantly affect your organization’s risk and loss potential.It is critical that you have an already tested plan and are prepared in advance to deal with these devastating situations. Building off of the February 9th session Cyber Attacks, Incident Response Checklist, Testing & Resources - Beyond Disaster Recovery, attendees of this session will test their operational incident response plan knowledge and gain valuable insight into the unique payments environment.
Even in the face of a cyber-attack, payments must continue. How do you process payroll when you can’t connect to your bank’s platform to submit files? How do you pay vendors when your network is shut down? How do you reimburse employees for travel expenses timely when their information is at risk? Suggested resolutions to these questions and more are presented in this information-packed webinar.
This webinar will cover:
- How cyber-attacks are often smoke-screens for more nefarious frauds.
- How a cyber-attack can affect processing.
- Unique incident response from a payments professional perspective.
- Suggested additional authentication techniques to approve legitimate transfers.
- Communicating with customers and staff.
- Highlight resources for threat identification.
Learning Objectives:
- Isolate how cyber-attacks affect payment processing.
- Record appropriate sound business practices for managing operational risk due to a cyber-attack.
- Identify critical operational communications, from internal staff to customers and institutions to vendor support.
- Recognize threat intelligence resources.
Areas Covered in the Webinar:
- Cyber-attack effects on payment processing.
- Common methods criminals use to circumvent authentication techniques.
- Sound business practices to manage threats.
- Communications from an operational perspective.
- Working with an institution during a cyber-attack (i.e. enhanced authentication).
- Gauging a solution provider/vendors ability to support an organization during an attack.
- Implementing advanced measures to secure and send payments.
- Threat intelligence.
Who Will Benefit:
- CPAs
- Legal counsel
- Accounting
- Payment processors
- Operations
- Management
- Vendor managers
- Disaster recovery professionals
- Information security personnel
Course Provider
Rayleen M Pirnie,