A case for unification of financial crime, fraud, and cybersecurity? operations

A case for unification of financial crime, fraud, and cybersecurity operations

In general risks associated with financial crime involve three kinds of counter measures: identifying and authenticating the customer, monitoring and detecting suspicious transaction and behavioral anomalies, and responding to mitigate risks and associated issues. Each of these activities, whether taken in response to fraud, cybersecurity breaches or attacks, or other financial crimes, are supported by many similar data and processes. Indeed, bringing these data sources together with analytics materially improves visibility while providing much deeper insight to improve overall detection capability. In many instances it also enables prevention efforts.

In taking a more holistic view of the underlying processes, financial inst. can streamline business and technology architecture to support a better customer experience, improved risk decision making, and greater cost efficiencies. The organizational structure can then be reconfigured as needed. 

Converging crime pathways: Crime pathways are merging and converging, that leads to blurring traditional separation among cyber breaches, fraud and financial crimes.

Fraud and Insider threat: Internal / insider and external threats, market abuse and misbehavior, retail / nonmetal threats.

Cyber security breaches: includes system availability, confidentiality, integrity.

Financial crimes: Money laundering, Tax evasion and tax fraud, bribery and corruption. 

Now, in typical modern attack on financial institution scenario:  

  • SWIFT credentials gets stolen with help of insider or phishing attack 
  • Malware installed on computers prevent discovery of withdrawals
  • Funds routed to another account out of country to third back
  • Withdrawals made at third bank through multiple transactions not blocked until too late 

Holistic unification: Three models for addressing financial crime are important for our discussion. They are distinguished by the degree of integration they represent among processes and operations for the different types of crime 

Generally speaking organizational and governance design are the main considerations for the development of the optimal operating model. Institutions will need to take a more holistic approach to common processes and technologies and doubling down on analytics—potentially creating “specialized solution groups” to develop more sophisticated solutions. It is feasible that an institution will begin with the collaborative model and gradually move toward greater integration, depending on design decisions. To begin with financial inst. can identify partial integration as their target state, with a view that full integration is an aspiration state.

  1. Initial collaborative model In this status quo model, each of the business domains financial crime, fraud, and cybersecurity maintain independent roles, responsibilities, and reporting. Each unit builds its own independent framework, cooperating on risk taxonomy and data and analytics for transaction monitoring, fraud, and breaches. The approach is familiar to regulators, but this model offers little of the transparency needed to develop a holistic view of financial-crime risk. In addition, this often leads to coverage gaps or overlaps among the separate groups and fails to achieve the benefits of scale that come with greater functional integration.
  2. Partially model for cybersecurity and fraud: In which cybersecurity and fraud are partially integrated as the second line of defense. Each unit maintains independence in this model but works from a consistent framework and taxonomy, following mutually accepted rules and responsibilities. Thus a consistent architecture for prevention (such as for customer authentication) is adopted, risk-identification and assessment processes (including taxonomies) are shared, and similar interdiction processes are deployed. Deeper integral advantages prevail, including consistency in threat monitoring and detection and lower risk of gaps and overlap. The approach remains, however, consistent with the existing organizational structure and little disrupts current operations. Consequently, transparency is not increased, since separate reporting is maintained.
  3. Unified model: In this fully integrated approach, the financial crimes, fraud, and cybersecurity operations are consolidated into a single framework, with common assets and systems used to manage risk across the enterprise. The model has a single view of the customer and shares analytics. Through risk convergence, enterprise-wide transparency on threats is enhanced, better revealing the most important underlying risks. The unified model also captures benefits of scale across key roles. The main disadvantages of this model are that it entails significant organizational change, making bank operations less familiar to regulators. And even with the organizational change and risk convergence, risks remain differentiated.


要查看或添加评论,请登录

Bhalchandra (Bhal) Madhekar的更多文章

  • Startup Metrics: Financial

    Startup Metrics: Financial

    In the world of startups, where every decision founders takes can make or break a company’s future. The startup metrics…

    1 条评论
  • LLM Model Serving : An Interesting Challenge

    LLM Model Serving : An Interesting Challenge

    Text Generation Short Summery Large Language Models (LLMs) generate text in a two-step process: pre-fill, where the…

  • Measuring SaaS Startup Success

    Measuring SaaS Startup Success

    It has always fascinated me working for more than a decade with various SaaS startups, how difficult it is to device…

    12 条评论
  • Effectively Leading a DataScience Initiative

    Effectively Leading a DataScience Initiative

    New data science leaders aspiring to manage advanced analytics teams face a set of challenges and are required to think…

    2 条评论
  • New Gen India: socially re-engineered?

    New Gen India: socially re-engineered?

    During my recent visit to India, I had a unique opportunity to interact with millennials and Gen Zs - true digital…

    12 条评论
  • Machine Learning: Dimensionality

    Machine Learning: Dimensionality

    One of the tough problems in machine learning is dimensionality, in other words, number of features. This term was…

    2 条评论
  • Machine Learning: Feature Engineering

    Machine Learning: Feature Engineering

    Data has become a first-class asset for modern businesses, corporations, and organizations irrespective of their size…

  • Application Containers Security, Monitoring and Compliance Challenges

    Application Containers Security, Monitoring and Compliance Challenges

    Application Container such as Docker—is relatively young application container technology with a lot of momentum think…

    8 条评论
  • IoT Security: Threats, Constrains & Challenges -II

    IoT Security: Threats, Constrains & Challenges -II

    The Internet of Things [IOT] will and is overhauling the way which we all use technology. Its proliferation although…

    3 条评论
  • Cyber Security: Advanced Persistent Threats

    Cyber Security: Advanced Persistent Threats

    Advanced Persistent Threats (APT) are long-lived malware with specific goals has recently emerged as the major threat…

社区洞察

其他会员也浏览了