How to avoid internal Fraud I
Facebook Twitter LinkedIn

Rogue Trading and the changing Face of Threats

Combined Session
Wednesday, April 23, 2008 15:00—16:00
Location: Solaris

Most financial institutions nowadays have sophisticated risk management tools in place, maybe even profiling traders and their habits, searching email traffic for keywords which might be worth checking for fraudulent activities, and much more. But what sense would all that make, if authorizations and priviliges are not provisioned or, more important, de-provisioned in time, and if access to internal applications is not secured with strong authentication and even biometric identification? If banks don't leave the doors of their bullet-proof safes open - why do they leave access to applications open, where billions of Euros can be moved to places where they are not supposed to be moved to?

Cases like the recent one at Société Générale show that internal risks can only be kept at a manageable level through an integrated Enterprise GRC & Identity Management strategy. This panel will highlight and discuss various types of internal threats and mark the key points of such a strategy eliminating these threats.

Rogue Trading and the changing Face of Threats
Presentation deck
Rogue Trading and the changing Face of Threats
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Marc Hudavert
Marc Hudavert
ActivIdentity
Marc Hudavert has been Vice President and General Manager EMEA, since joining ActivIdentity. Before then, Mr Hudavert was VP sales and marketing of Telis TSC, a systems integrator specialized in...
Berthold Kerl
Berthold Kerl
Deutsche Bank AG
Berthold studied economics and computer science at the University of Nürnberg and graduated in 1988. Berthold has been with Deutsche Bank AG since 2002 where he performed in different roles:...
Calum MacLeod
Calum MacLeod
Cyber-Ark
Calum MacLeod has over 30 years of expertise in IT, with the majority having been spent in networking and security. Following several years working in the financial sector as a security specialist...
Jaap Scheepstra
Jaap Scheepstra
IDMpartners
Jaap Scheepstra has more than 8 years experience in Identity & Access Management, business role based access, IAM audit, federation, strong authentication, PKI, provisioning, access management,...
Terry Schoen
Terry Schoen
Entrust
Terry Schoen is Entrust’s European Business Director for Fraud Detection & Consumer Authentication. With over 20 years international security software technology experience Terry is...
Jackson Shaw
Jackson Shaw
One Identity
Jackson Shaw is Senior Director of Product Management for One Identity, the Identity & Access Management (IAM) business of Quest Software. Prior to Quest, Jackson was an integral member of...
David Ting
David Ting
Imprivata
Named one of Infoworld's Top 25 CTO's of 2006, David has more than 20 years of experience in developing advanced imaging software and systems for high security, high-availability systems. Prior to...
Subscribe for updates
Please provide your email address