SlideShare a Scribd company logo
1 of 28
Download to read offline
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Driving Payments Security and
Efficiency during COVID-19
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Today’s Agenda
1) What does fraud look like during the COVID-19 crisis
2) Emerging threats in payments fraud
3) Best practices to combat payment fraud
• Security practices – especially while working from home
• Workflow controls – standardizing how transactions are initiated,
approved, and transmitted to the bank(s)
• Payment screening – External sanctions lists and internal fraud
scenarios
Driving Payments Security and Efficiency during
COVID-19
Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved.
Polling Question
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
What does Fraud look like during this
crisis?
4
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Advances in technology and growing sensitivity to support flexible work-life
balance have changed perceptions and expectations about remote work
options for many employees and organizations
5
Statistics & Trends
• Over the last 5 years there has been
a 44% increase in remote work, and a
91% increase in the last 10
• Currently 3.6% or 5 million US
employees work at home at least half
the time
• Currently 43% of US employees work
remotely with some frequency
• Currently 80% of US employees want
to work form home at least some of
the time
Employee Sentiment Employer Breakdown
• 35% of employees would change
jobs for the opportunity to work
remotely full time (47% of millennials
and 31% of baby boomers)
• Flexibility is one of the highest
ranked benefits by millennials, above
student loan or tuition reimbursement
• More than 33% of workers would
take a pay cut of up to 5% in
exchange for the option to work
remotely at least some of the time,
25% would take a 10% pay cut
• US employers offering flexible
workplace options increased by 40%
over the last five years
• 69% of US employers offer remote
work on an ad hoc basis to at least
some employees
• Larger companies are most likely to
offer telecommuting options to most
of their employees
• Full-time employees are 4 times
more likely to have work-at-home
options than part-time workers
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Research has shown us that this change in the modern workforce benefits
not only the employees but has substantial benefits for employers
6
Transactional relationship
EmployersEmployees
Remote workers make more and retain more of their salary
Achieve optimal work/life balance without sacrificing
productivity or career trajectory
Remote workers experience less job-related stress
Remote workers are more likely to be satisfied with their
job than the average American
Overall increase in productivity and quality of
employee work
Reduced overhead costs such as office space and supplies
Higher attraction and retention of top talent
Contrary to popular belief 85% of businesses confirm flexible
working options have increased productivity
Increased employee moral resulting in the increased
productivity and talent retention above
Ensures continuity of operations in the event of a disaster
(such as COVID-19)
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.7
These benefits do not come without risk, as organizations struggle to
combat the technical and security challenges introduced by remote
work
Using personal networks and devices
• Most workers will be in their homes where they are responsible to secure their wireless internet connection. Organizations have little control over how
remote workers configure their wireless networks, or what other devices could be connected to them.
• Some will have to use unsecured public networks which are prime spots for malicious parties to spy on internet traffic and collect confidential personal
and business-related information.
Lack of training and awareness
• In addition to the technical considerations, cybersecurity training and awareness-building initiatives are critical to reducing risk. Most notably, how to
keep work and personal activities as separate as possible.
• Organizations need to ensure employees know how to use the tools and technologies that support remote collaboration, as well as how to
recognize and prevent COVID-19 cyber threats, such as phishing, fraudulent emails, and phone calls offering tech support or posing as solicitations
from charities.
Phishing and other scams by bad actors
• The COVID-19 related spike in malicious phishing emails has seen cyber criminals using the pandemic to steal data and blackmail individuals for
money.
• Researchers found a 667% increase in phishing emails using the coronavirus as the hook to trick individuals into clicking links or downloading
attachments that included malware, ransomware, and viruses.
Using personal devices and applications
• Many workers are using personal devices for work tasks. These often lack the tools built into their organization’s approved devices such as strong
antivirus software, customized firewalls, and automatic online backup tools.
• This increases the risk of malware finding its way onto devices and both personal and work-related information being leaked.
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
8
Public Health
Government Checks
Business Emails
I.T. Support
Distraction & Deception
Bad actors impersonating the CDC or WHO asking for individuals
SSN, Tax IDs, or financial information
Impersonation of the IRS or other federal agencies
regarding the checks being sent to Americans
Fraudsters acting as the CEO or other executives, requesting
employees wire money or transfer funds to a fake account
An individual from IT is impersonated and requests an employee's business login
credentials or asks them to download malicious software
With more people working from home with increased distractions,
it makes it easier to fall victim to fraud
01
05
04
03
02
Top
COVID-19
Scam
Scenarios
More than ever, organizations must remain vigilant to protect
themselves, customers and employees from these targeted attacks
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Emerging Threats in Payments Fraud
9
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
As a historically targeted area, Payment Fraud has seen an increase
given the recent increased shift to remote work
10
81%
Percent of companies
reported being targets
of payment fraud in
2019
80%
Percent of
organizations who
experienced
Business Email
Compromise (BEC)
in 2019
54%
Percent of
organizations
reporting financial
loss as a result of
BEC
64%
Percentage of
payment fraud
committed by an
individual outside the
organization
As of 4/7/2020 the FTC had received 13,372 complaints related to the
virus outbreak, with more than 7,500 of these being a direct result of
coronavirus fraud.
The COVID-19 work environment places business-specific
communications at high risk for BEC. As a result bad actors will
focus on those with high-value information or access to an
organizations money.
3
1
Victims have reported over $9.6 million in losses due to these COVID-
19 related scams.
2
COVID-19 and Payment Fraud
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
How can Finance protect themselves?
CFOs need to leverage their technologies as
proactive weapons against payment fraud
instead of reacting to breaches or passing the
security responsibilities to another business
unit.
Finance teams need to assume the cybersecurity
responsibilities for the payments function and its
technology. This will require working with IT to
develop best solutions and risk mitigation plans,
and assuming ownership of those newly
developed methodologies.
There is no substitute for educating employees
about payment fraud and other cyber risks they
and the company face, based on COVID-19
working environment.
11
Leveraging
Payments
Technologies
Collaboration &
Responsibility
Secure
Payments
Workforce
Education
1
3
2
1
3 2
A robust and secure payments function
utilizing its technology to its fullest
potential, collaborating with other
business units to produce the best
solutions, educating other employees
about the cybersecurity risks they
individually and the company face,
especially during these uncertain
times, and the end-to-end ownership of
the payments cybersecurity function.
Secure Payments
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Best Practices to Combat Payments
Fraud
12
Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved.
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Information Security Practices
1) Embrace the cloud (your IT does)
2) Application security
3) Vendor security
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
2019 Kyriba Corp. All rights reserved. | Proprietary & Confidential
Embrace the Cloud
• IT favors the cloud as they know
that payments data and connectivity
can be safer when hosted externally
• But IT/Security has questions
because not all “clouds” are alike
when it comes to information
security
• Finance should align to information
security policies
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Application Security
• UserID/Password by themselves should not grant access
to the system
• 81% of data breaches from stolen/weak passwords Source: Verizon DBIR
• Especially when working from home, your systems should
use a combination of password controls and encryption:
 Strong password policy controls
 Multi-factor authentication (hard or soft token)
 IP Filtering
 Single Sign-On
 Data encryption at rest and in transit
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Vendor Security
The systems you use invest in safeguards to protect your data – but are
those safeguards good enough:
Typical questions to ask:
1) Are there detailed information security questionnaires (e.g. Cloud Security
Alliance or CSA)?
2) Does their governance & risk program follow an established standard (e.g.
ISO 27001)?
3) Frequent third party vendor risk assessments (e.g. penetration testing)?
4) What kind of Security Incident Event Management (SIEM) tools do they
have (e.g. Splunk)?
5) Does their RTO/RPO align to your needs?
6) Do they have a Network Operations Center?
Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved.
Polling Question
Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved.
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Workflow Controls
1) Eliminate exceptions
2) Standardization
3) Consistency
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
• Exceptions to a standardized process opportunity
• Consistency is the key: standardize controls across all
payments, in all geographies, by all people, within all
payment systems
You Your banks
Payment
Initiation
Payment
Approval
Payment
Documentation
Payment
Transmission
Payment
Request
Defending against fraud: Standardize Controls
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
• Global Financial Services Firm – lost
$18M in payment fraud in less than a
week in a phishing scheme.
• Large Manufacturing Firm – lost
~$3M over 1 year in a drip campaign
• Tech Firm – released $1.2M wire
from Deepfake CFO impersonation
• Engineering firm – lost $31M over
several years due to internal wire
fraud
Fraud Examples: Breakdown of Controls
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
• Multiple ERPs with different approval processes
• Regional treasury/shared services require lesser
numbers of approval due to limited in-country
staff
• CEO and/or CFO have ability to execute or
influence payments with only one other approval
• Payments backup documents stored in a
different system than payment approvals
• Payment files can be opened and modified
• No automated detection for duplicate and
unusual payments
• Lack of real-time visibility into all payments
Scenarios that are ripe for payments fraud
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Payment
Hub
ERP(s)
Document
Attachment
Single
Source of
Record
Automated
Confirmations
One Set
of
Approvals
Consistent
Security
Protocol
One Set of
Limits
Real-time
Visibility
Encrypted
Transfer
Banks
Consistency of Controls: Digitization helps
Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved.
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Payment Screening
1) Sanctions lists
2) Enforce payment policy
3) Detect payment anomalies
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Payment Screening
• Screening payments is as much about
compliance with internal policies as it is about
preventing fraud
• OFAC, EU, UN – sanctions list screening is a
good start, but not the complete picture
 What finance really needs is the ability to
screen against custom scenarios – to construct
a digitized version of your payment policy
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
To detect fraud, finance must…
Payment Policy Screening Rule
Payments should only go to approved
suppliers in approved countries
All payments to non-approved countries must
be stopped
Payments initiated by A/P within the ERP are
only approved or rejected by finance
Any payments that are modified after import
must be stopped
Single or multiple payments to same
beneficiary must not exceed a specified limit
Hold for review any payments that
cumulatively exceed specified limit per
day/week/month
All payments to a newly modified bank
account must be reviewed by Treasurer
First payment to a new or modified bank
account must be held for review
Exceptional payments should be reviewed by
Controller
All payments with a standard deviation of x%
from typical payments of the same type must
be stopped for further review
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
Rules-based automation and machine learning to detect violations of
payment policy and detection of payment anomalies (from normal behavior)
Dashboards expedite the
review process
Screening Payments: enforce payment policy
Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.
In Conclusion….
Threats Have Increased
Threat of fraud has raised the bar for
finance to prove that fraud controls
meet internal compliance and risk
policies
Consistent Policies
Finance controls and procedures
need to be aligned with the
organization – exceptions are the
danger
Standardized Controls
Standardized payment workflows =
critical to combat fraud
Payment Screening
Payment policies must exist within
the workflow, automatically screened
in real-time
Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved.
Thank You!

More Related Content

What's hot

Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Zeshan Sattar
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationEric Reehl
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Seungjoo Kim
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Business Days
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014- Mark - Fullbright
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceStatewide Insurance Brokers
 

What's hot (19)

Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce
 
Cyber liaility insurance the basics
Cyber liaility insurance   the basicsCyber liaility insurance   the basics
Cyber liaility insurance the basics
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 

Similar to Driving Payments Security and Efficiency During COVID 19

White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers BDO_Consulting
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry BrianHuntMSFCPACRISC
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy ManagementTrustArc
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Citrin Cooperman
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)Teo Caiying (Kyleigh)
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowTechSoup
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...TechSoup
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxcaniceconsulting
 

Similar to Driving Payments Security and Efficiency During COVID 19 (20)

Chapter 5.pdf
Chapter 5.pdfChapter 5.pdf
Chapter 5.pdf
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Treasury in a Time of Crisis
Treasury in a Time of CrisisTreasury in a Time of Crisis
Treasury in a Time of Crisis
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)
Crisis Management: Surviving and Thriving in a Post-Pandemic World (IR Global)
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 

More from Kyriba Corporation

Payments Hub 101: Consolidated and Secure
Payments Hub 101: Consolidated and SecurePayments Hub 101: Consolidated and Secure
Payments Hub 101: Consolidated and SecureKyriba Corporation
 
Why Treasurers Should Adopt Multilateral Netting
Why Treasurers Should Adopt Multilateral NettingWhy Treasurers Should Adopt Multilateral Netting
Why Treasurers Should Adopt Multilateral NettingKyriba Corporation
 
Public Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud ProtectionPublic Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud ProtectionKyriba Corporation
 
Cenveo's Liquidity Management Journey
Cenveo's Liquidity Management JourneyCenveo's Liquidity Management Journey
Cenveo's Liquidity Management JourneyKyriba Corporation
 
Two Studies in Easy Cash Investing
Two Studies in Easy Cash InvestingTwo Studies in Easy Cash Investing
Two Studies in Easy Cash InvestingKyriba Corporation
 
Modern Connectivity for Today’s Finance Organization
Modern Connectivity for Today’s Finance OrganizationModern Connectivity for Today’s Finance Organization
Modern Connectivity for Today’s Finance OrganizationKyriba Corporation
 
CFO’s Mandate to Treasury: A Reliable Cash Forecast
CFO’s Mandate to Treasury: A Reliable Cash ForecastCFO’s Mandate to Treasury: A Reliable Cash Forecast
CFO’s Mandate to Treasury: A Reliable Cash ForecastKyriba Corporation
 
Transform Microsoft Dynamics 365 Finance with Kyriba Payments
Transform Microsoft Dynamics 365 Finance with Kyriba PaymentsTransform Microsoft Dynamics 365 Finance with Kyriba Payments
Transform Microsoft Dynamics 365 Finance with Kyriba PaymentsKyriba Corporation
 
LIBOR Transition: Key issues corporates are currently facing
LIBOR Transition: Key issues corporates are currently facingLIBOR Transition: Key issues corporates are currently facing
LIBOR Transition: Key issues corporates are currently facingKyriba Corporation
 
Outgrowing Excel: Why Treasurers Transcend to a TMS
Outgrowing Excel: Why Treasurers Transcend to a TMSOutgrowing Excel: Why Treasurers Transcend to a TMS
Outgrowing Excel: Why Treasurers Transcend to a TMSKyriba Corporation
 
APIs The Catalyst for Real-Time Treasury
APIs The Catalyst for Real-Time TreasuryAPIs The Catalyst for Real-Time Treasury
APIs The Catalyst for Real-Time TreasuryKyriba Corporation
 
How International Treasury Centers Unlock Global Cash Visibility
How International Treasury Centers Unlock Global Cash VisibilityHow International Treasury Centers Unlock Global Cash Visibility
How International Treasury Centers Unlock Global Cash VisibilityKyriba Corporation
 
Tesorería Moderna: de la Hoja de Cálculo a la Plataforma de Gestión de Liquidez
Tesorería Moderna: de la Hoja de Cálculo a la Plataforma de Gestión de LiquidezTesorería Moderna: de la Hoja de Cálculo a la Plataforma de Gestión de Liquidez
Tesorería Moderna: de la Hoja de Cálculo a la Plataforma de Gestión de LiquidezKyriba Corporation
 
Debating Daily vs. Single Rate Balance Sheet Exposure
Debating Daily vs. Single Rate Balance Sheet ExposureDebating Daily vs. Single Rate Balance Sheet Exposure
Debating Daily vs. Single Rate Balance Sheet ExposureKyriba Corporation
 
Seven Reasons 7-Time NetSuite Partner of the Year Recommends Kyriba
Seven Reasons 7-Time NetSuite Partner of the Year Recommends KyribaSeven Reasons 7-Time NetSuite Partner of the Year Recommends Kyriba
Seven Reasons 7-Time NetSuite Partner of the Year Recommends KyribaKyriba Corporation
 
Put Your Excess Cash to Work: Dynamic Discounting Optimization & Considerations
Put Your Excess Cash to Work: Dynamic Discounting Optimization & ConsiderationsPut Your Excess Cash to Work: Dynamic Discounting Optimization & Considerations
Put Your Excess Cash to Work: Dynamic Discounting Optimization & ConsiderationsKyriba Corporation
 
Memo to IT: ERP Migrations & Bank Connectivity
Memo to IT: ERP Migrations & Bank ConnectivityMemo to IT: ERP Migrations & Bank Connectivity
Memo to IT: ERP Migrations & Bank ConnectivityKyriba Corporation
 

More from Kyriba Corporation (20)

Payments Hub 101: Consolidated and Secure
Payments Hub 101: Consolidated and SecurePayments Hub 101: Consolidated and Secure
Payments Hub 101: Consolidated and Secure
 
Why Treasurers Should Adopt Multilateral Netting
Why Treasurers Should Adopt Multilateral NettingWhy Treasurers Should Adopt Multilateral Netting
Why Treasurers Should Adopt Multilateral Netting
 
Public Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud ProtectionPublic Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud Protection
 
Cenveo's Liquidity Management Journey
Cenveo's Liquidity Management JourneyCenveo's Liquidity Management Journey
Cenveo's Liquidity Management Journey
 
Two Studies in Easy Cash Investing
Two Studies in Easy Cash InvestingTwo Studies in Easy Cash Investing
Two Studies in Easy Cash Investing
 
Modern Connectivity for Today’s Finance Organization
Modern Connectivity for Today’s Finance OrganizationModern Connectivity for Today’s Finance Organization
Modern Connectivity for Today’s Finance Organization
 
CFO’s Mandate to Treasury: A Reliable Cash Forecast
CFO’s Mandate to Treasury: A Reliable Cash ForecastCFO’s Mandate to Treasury: A Reliable Cash Forecast
CFO’s Mandate to Treasury: A Reliable Cash Forecast
 
Transform Microsoft Dynamics 365 Finance with Kyriba Payments
Transform Microsoft Dynamics 365 Finance with Kyriba PaymentsTransform Microsoft Dynamics 365 Finance with Kyriba Payments
Transform Microsoft Dynamics 365 Finance with Kyriba Payments
 
LIBOR Transition: Key issues corporates are currently facing
LIBOR Transition: Key issues corporates are currently facingLIBOR Transition: Key issues corporates are currently facing
LIBOR Transition: Key issues corporates are currently facing
 
Outgrowing Excel: Why Treasurers Transcend to a TMS
Outgrowing Excel: Why Treasurers Transcend to a TMSOutgrowing Excel: Why Treasurers Transcend to a TMS
Outgrowing Excel: Why Treasurers Transcend to a TMS
 
APIs The Catalyst for Real-Time Treasury
APIs The Catalyst for Real-Time TreasuryAPIs The Catalyst for Real-Time Treasury
APIs The Catalyst for Real-Time Treasury
 
Erp migration y pagos
Erp migration y pagosErp migration y pagos
Erp migration y pagos
 
How International Treasury Centers Unlock Global Cash Visibility
How International Treasury Centers Unlock Global Cash VisibilityHow International Treasury Centers Unlock Global Cash Visibility
How International Treasury Centers Unlock Global Cash Visibility
 
Sap bank connectivity
Sap bank connectivitySap bank connectivity
Sap bank connectivity
 
Tesorería Moderna: de la Hoja de Cálculo a la Plataforma de Gestión de Liquidez
Tesorería Moderna: de la Hoja de Cálculo a la Plataforma de Gestión de LiquidezTesorería Moderna: de la Hoja de Cálculo a la Plataforma de Gestión de Liquidez
Tesorería Moderna: de la Hoja de Cálculo a la Plataforma de Gestión de Liquidez
 
Debating Daily vs. Single Rate Balance Sheet Exposure
Debating Daily vs. Single Rate Balance Sheet ExposureDebating Daily vs. Single Rate Balance Sheet Exposure
Debating Daily vs. Single Rate Balance Sheet Exposure
 
Seven Reasons 7-Time NetSuite Partner of the Year Recommends Kyriba
Seven Reasons 7-Time NetSuite Partner of the Year Recommends KyribaSeven Reasons 7-Time NetSuite Partner of the Year Recommends Kyriba
Seven Reasons 7-Time NetSuite Partner of the Year Recommends Kyriba
 
Put Your Excess Cash to Work: Dynamic Discounting Optimization & Considerations
Put Your Excess Cash to Work: Dynamic Discounting Optimization & ConsiderationsPut Your Excess Cash to Work: Dynamic Discounting Optimization & Considerations
Put Your Excess Cash to Work: Dynamic Discounting Optimization & Considerations
 
5 wins for tms owners
5 wins for tms owners5 wins for tms owners
5 wins for tms owners
 
Memo to IT: ERP Migrations & Bank Connectivity
Memo to IT: ERP Migrations & Bank ConnectivityMemo to IT: ERP Migrations & Bank Connectivity
Memo to IT: ERP Migrations & Bank Connectivity
 

Recently uploaded

The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfGale Pooley
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfGale Pooley
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceanilsa9823
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Pooja Nehwal
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 

Recently uploaded (20)

The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdf
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 

Driving Payments Security and Efficiency During COVID 19

  • 1. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Driving Payments Security and Efficiency during COVID-19
  • 2. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Today’s Agenda 1) What does fraud look like during the COVID-19 crisis 2) Emerging threats in payments fraud 3) Best practices to combat payment fraud • Security practices – especially while working from home • Workflow controls – standardizing how transactions are initiated, approved, and transmitted to the bank(s) • Payment screening – External sanctions lists and internal fraud scenarios Driving Payments Security and Efficiency during COVID-19
  • 3. Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved. Polling Question
  • 4. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. What does Fraud look like during this crisis? 4
  • 5. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Advances in technology and growing sensitivity to support flexible work-life balance have changed perceptions and expectations about remote work options for many employees and organizations 5 Statistics & Trends • Over the last 5 years there has been a 44% increase in remote work, and a 91% increase in the last 10 • Currently 3.6% or 5 million US employees work at home at least half the time • Currently 43% of US employees work remotely with some frequency • Currently 80% of US employees want to work form home at least some of the time Employee Sentiment Employer Breakdown • 35% of employees would change jobs for the opportunity to work remotely full time (47% of millennials and 31% of baby boomers) • Flexibility is one of the highest ranked benefits by millennials, above student loan or tuition reimbursement • More than 33% of workers would take a pay cut of up to 5% in exchange for the option to work remotely at least some of the time, 25% would take a 10% pay cut • US employers offering flexible workplace options increased by 40% over the last five years • 69% of US employers offer remote work on an ad hoc basis to at least some employees • Larger companies are most likely to offer telecommuting options to most of their employees • Full-time employees are 4 times more likely to have work-at-home options than part-time workers
  • 6. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Research has shown us that this change in the modern workforce benefits not only the employees but has substantial benefits for employers 6 Transactional relationship EmployersEmployees Remote workers make more and retain more of their salary Achieve optimal work/life balance without sacrificing productivity or career trajectory Remote workers experience less job-related stress Remote workers are more likely to be satisfied with their job than the average American Overall increase in productivity and quality of employee work Reduced overhead costs such as office space and supplies Higher attraction and retention of top talent Contrary to popular belief 85% of businesses confirm flexible working options have increased productivity Increased employee moral resulting in the increased productivity and talent retention above Ensures continuity of operations in the event of a disaster (such as COVID-19)
  • 7. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved.7 These benefits do not come without risk, as organizations struggle to combat the technical and security challenges introduced by remote work Using personal networks and devices • Most workers will be in their homes where they are responsible to secure their wireless internet connection. Organizations have little control over how remote workers configure their wireless networks, or what other devices could be connected to them. • Some will have to use unsecured public networks which are prime spots for malicious parties to spy on internet traffic and collect confidential personal and business-related information. Lack of training and awareness • In addition to the technical considerations, cybersecurity training and awareness-building initiatives are critical to reducing risk. Most notably, how to keep work and personal activities as separate as possible. • Organizations need to ensure employees know how to use the tools and technologies that support remote collaboration, as well as how to recognize and prevent COVID-19 cyber threats, such as phishing, fraudulent emails, and phone calls offering tech support or posing as solicitations from charities. Phishing and other scams by bad actors • The COVID-19 related spike in malicious phishing emails has seen cyber criminals using the pandemic to steal data and blackmail individuals for money. • Researchers found a 667% increase in phishing emails using the coronavirus as the hook to trick individuals into clicking links or downloading attachments that included malware, ransomware, and viruses. Using personal devices and applications • Many workers are using personal devices for work tasks. These often lack the tools built into their organization’s approved devices such as strong antivirus software, customized firewalls, and automatic online backup tools. • This increases the risk of malware finding its way onto devices and both personal and work-related information being leaked.
  • 8. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. 8 Public Health Government Checks Business Emails I.T. Support Distraction & Deception Bad actors impersonating the CDC or WHO asking for individuals SSN, Tax IDs, or financial information Impersonation of the IRS or other federal agencies regarding the checks being sent to Americans Fraudsters acting as the CEO or other executives, requesting employees wire money or transfer funds to a fake account An individual from IT is impersonated and requests an employee's business login credentials or asks them to download malicious software With more people working from home with increased distractions, it makes it easier to fall victim to fraud 01 05 04 03 02 Top COVID-19 Scam Scenarios More than ever, organizations must remain vigilant to protect themselves, customers and employees from these targeted attacks
  • 9. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Emerging Threats in Payments Fraud 9
  • 10. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. As a historically targeted area, Payment Fraud has seen an increase given the recent increased shift to remote work 10 81% Percent of companies reported being targets of payment fraud in 2019 80% Percent of organizations who experienced Business Email Compromise (BEC) in 2019 54% Percent of organizations reporting financial loss as a result of BEC 64% Percentage of payment fraud committed by an individual outside the organization As of 4/7/2020 the FTC had received 13,372 complaints related to the virus outbreak, with more than 7,500 of these being a direct result of coronavirus fraud. The COVID-19 work environment places business-specific communications at high risk for BEC. As a result bad actors will focus on those with high-value information or access to an organizations money. 3 1 Victims have reported over $9.6 million in losses due to these COVID- 19 related scams. 2 COVID-19 and Payment Fraud
  • 11. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. How can Finance protect themselves? CFOs need to leverage their technologies as proactive weapons against payment fraud instead of reacting to breaches or passing the security responsibilities to another business unit. Finance teams need to assume the cybersecurity responsibilities for the payments function and its technology. This will require working with IT to develop best solutions and risk mitigation plans, and assuming ownership of those newly developed methodologies. There is no substitute for educating employees about payment fraud and other cyber risks they and the company face, based on COVID-19 working environment. 11 Leveraging Payments Technologies Collaboration & Responsibility Secure Payments Workforce Education 1 3 2 1 3 2 A robust and secure payments function utilizing its technology to its fullest potential, collaborating with other business units to produce the best solutions, educating other employees about the cybersecurity risks they individually and the company face, especially during these uncertain times, and the end-to-end ownership of the payments cybersecurity function. Secure Payments
  • 12. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Best Practices to Combat Payments Fraud 12
  • 13. Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Information Security Practices 1) Embrace the cloud (your IT does) 2) Application security 3) Vendor security
  • 14. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. 2019 Kyriba Corp. All rights reserved. | Proprietary & Confidential Embrace the Cloud • IT favors the cloud as they know that payments data and connectivity can be safer when hosted externally • But IT/Security has questions because not all “clouds” are alike when it comes to information security • Finance should align to information security policies
  • 15. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Application Security • UserID/Password by themselves should not grant access to the system • 81% of data breaches from stolen/weak passwords Source: Verizon DBIR • Especially when working from home, your systems should use a combination of password controls and encryption:  Strong password policy controls  Multi-factor authentication (hard or soft token)  IP Filtering  Single Sign-On  Data encryption at rest and in transit
  • 16. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Vendor Security The systems you use invest in safeguards to protect your data – but are those safeguards good enough: Typical questions to ask: 1) Are there detailed information security questionnaires (e.g. Cloud Security Alliance or CSA)? 2) Does their governance & risk program follow an established standard (e.g. ISO 27001)? 3) Frequent third party vendor risk assessments (e.g. penetration testing)? 4) What kind of Security Incident Event Management (SIEM) tools do they have (e.g. Splunk)? 5) Does their RTO/RPO align to your needs? 6) Do they have a Network Operations Center?
  • 17. Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved. Polling Question
  • 18. Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Workflow Controls 1) Eliminate exceptions 2) Standardization 3) Consistency
  • 19. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. • Exceptions to a standardized process opportunity • Consistency is the key: standardize controls across all payments, in all geographies, by all people, within all payment systems You Your banks Payment Initiation Payment Approval Payment Documentation Payment Transmission Payment Request Defending against fraud: Standardize Controls
  • 20. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. • Global Financial Services Firm – lost $18M in payment fraud in less than a week in a phishing scheme. • Large Manufacturing Firm – lost ~$3M over 1 year in a drip campaign • Tech Firm – released $1.2M wire from Deepfake CFO impersonation • Engineering firm – lost $31M over several years due to internal wire fraud Fraud Examples: Breakdown of Controls
  • 21. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. • Multiple ERPs with different approval processes • Regional treasury/shared services require lesser numbers of approval due to limited in-country staff • CEO and/or CFO have ability to execute or influence payments with only one other approval • Payments backup documents stored in a different system than payment approvals • Payment files can be opened and modified • No automated detection for duplicate and unusual payments • Lack of real-time visibility into all payments Scenarios that are ripe for payments fraud
  • 22. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Payment Hub ERP(s) Document Attachment Single Source of Record Automated Confirmations One Set of Approvals Consistent Security Protocol One Set of Limits Real-time Visibility Encrypted Transfer Banks Consistency of Controls: Digitization helps
  • 23. Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Payment Screening 1) Sanctions lists 2) Enforce payment policy 3) Detect payment anomalies
  • 24. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Payment Screening • Screening payments is as much about compliance with internal policies as it is about preventing fraud • OFAC, EU, UN – sanctions list screening is a good start, but not the complete picture  What finance really needs is the ability to screen against custom scenarios – to construct a digitized version of your payment policy
  • 25. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. To detect fraud, finance must… Payment Policy Screening Rule Payments should only go to approved suppliers in approved countries All payments to non-approved countries must be stopped Payments initiated by A/P within the ERP are only approved or rejected by finance Any payments that are modified after import must be stopped Single or multiple payments to same beneficiary must not exceed a specified limit Hold for review any payments that cumulatively exceed specified limit per day/week/month All payments to a newly modified bank account must be reviewed by Treasurer First payment to a new or modified bank account must be held for review Exceptional payments should be reviewed by Controller All payments with a standard deviation of x% from typical payments of the same type must be stopped for further review
  • 26. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. Rules-based automation and machine learning to detect violations of payment policy and detection of payment anomalies (from normal behavior) Dashboards expedite the review process Screening Payments: enforce payment policy
  • 27. Kyriba.com Copyright © 2020 Kyriba Corp. All rights reserved. In Conclusion…. Threats Have Increased Threat of fraud has raised the bar for finance to prove that fraud controls meet internal compliance and risk policies Consistent Policies Finance controls and procedures need to be aligned with the organization – exceptions are the danger Standardized Controls Standardized payment workflows = critical to combat fraud Payment Screening Payment policies must exist within the workflow, automatically screened in real-time
  • 28. Kyriba.com Copyright © 2019 Kyriba Corp. All rights reserved. Thank You!