Webinar
Management and Leadership
Cyber-Fraud Fusion: Strategies to Leverage Technology Across Silos and Align Investments, Operations and Detection
Financial services led the charge on building out fusion centers—co-locating the SOC and fraud teams—but many teams found that priorities, processes, metrics (and more) differed considerably across domains. Fusion was the goal, but these teams often still felt siloed and struggled to collaborate effectively. Today, we are seeing technology for cyber and fraud converging, and this “tech-fusion” is creating new opportunities for cyber teams to better align with fraud counterparts surrounding investments, operations and processes along the customer and fraud lifecycle. In this webinar, we’ll outline how to do just that, with a focus on the perimeter/login, threat intel and detection, and investigations. IANS Faculty Allison Miller, a cyber-fraud expert and banking industry veteran, shares:
- How considering the customer lifecycle end-to-end opens up opportunities to improve capabilities in cyber and fraud, maximizing the effectiveness of people, processes and technology by adopting a fusion lens
- How to reconsider designing perimeter controls (anti-bot, customer authentication technology) to aid both cyber and fraud prevention
- Different ways to think about leveraging and sharing threat intel data to be more usable in analytics and investigations across silos
Request your free content download
Find similar resources
Webinar
Management and Leadership
Incident Briefing: DeepSeek Disrupts the AI Market
Join IANS Faculty members Jake Williams and Summer Fowler as they dive into need-to-know implications of DeepSeek, a Chinese AI company that recently released a chatbot it claims rivals ChatGPT, but cost significantly less to develop.


Jake Williams
Summer Fowler
Webinar
Management and Leadership
Hacktivism and Financial Services: Top Attacks and Defenses
Financial services may be more frequently impacted by hacktivism attacks than other industries—not because they are targeted more frequently, but because they end up as part of the collateral damage.
This report explains how hacktivists differ from other threat actors, what attacks they use and how to limit their impact in financial services.

Jake Williams
Webinar
Management and Leadership
Compensation, Budget and Satisfaction Benchmark for CISOs in Financial Services, 2023–2024
Download a summary version of IANS’ Compensation, Budget and Satisfaction Benchmark for CISOs in Financial Services, 2023–2024 Summary Report.
IANS + Artico
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.