Training

Enterprise Mobility Management / BYOD , Next-Generation Technologies & Secure Development

Mobile: Security Risk or Strength?

Mobile: Security Risk or Strength?

Fraud Summit - San Francisco 2014 - Mobile banking usage and acceptance is growing by 50%. How prepared are banks and technology vendors to mitigate these risks while meeting customer needs? Register for this session to learn first-hand from James Van Dyke of Javelin Strategy & Research:

See Also: OnDemand | Everything You Can Do to Fight Social Engineering and Phishing

  • The latest mobility trends;
  • The current fraud landscape;
  • How to use mobile security to get closer to your customers.

Background

Banking institutions and other organizations must change the way they think about mobile, says James Van Dyke of Javelin Strategy & Research.

"Banks can play offense, to use mobile in a justifiable way to engage customers into their security," Van Dyke says in this session recorded at the 2014 San Francisco Fraud Summit. "They can actually use mobile to stop security threats in all channels" if they can get outside their standard box of thinking.

The problem for most companies is that their departments and expertise are siloed. Even among fraud and security teams, a number of silos can exist that hinder cross-channel information sharing that could greatly benefit fraud prevention, Van Dyke says.

During this session, Van Dyke also discusses:

  • Why banks and credit unions don't have a realistic perspective about how consumers perceive mobile financial services;
  • Steps the industry must take to create a real roadmap for future mobile payments use and adoption.

ISMG's Fraud Summits are one-day events focused exclusively on the top fraud trends impacting organizations and the mitigation strategies to overcome those challenges.

All 2014 Fraud Summit San Francisco recordings:

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.