Video

Banking Fraud: Trends and Technologies

George Tubin, Senior Security Strategist, Trusteer
Banking Fraud: Trends and Technologies

Fraud threats are evolving, and so are banking institutions' defensive strategies. George Tubin of Trusteer discusses the latest trends, technologies and banks' efforts to conform to the FFIEC guidance.

See Also: Corelight's Brian Dye on NDR's Role in Defeating Ransomware

Generally, institutions have done well in conforming to the authentication guidance supplement, says Tubin, senior security strategist for Trusteer. But fraud threats are evolving in ways that challenge traditional security solutions.

In a video interview about the latest fraud threats and anti-fraud technologies, Tubin discusses:

  • The latest fraud threats;
  • Banks' relative preparedness for these threats;
  • Gaps that must be filled be anti-fraud technologies.

Tubin is the Senior Security Strategist for Trusteer where he heads the thought leadership program to advance online and mobile banking adoption and safety, and apply best practices in fighting advanced malware to enterprise threat protection. With over 25 years in the banking and high-technology industries, his areas of expertise include consumer online and mobile banking, online fraud and identity theft prevention, and enterprise fraud management strategies.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.