• Home
  • Education
  • News and Resources
  • Advocacy
  • Associate Members
  • Contact
  • Search
  • Menu Menu

Tag Archive for: Technology

Posts

News, Products

FIPCO Serves Compliance Concierge® Customers With Software Updates

By Annette Witkowski

Customers have always been, and will always be, top of mind for FIPCO staff members. That is why we continually revise the Compliance Concierge® software with updated documents, regulation changes, and user enhancement requests.

Some of the items we have released lately are:

  • HOEPA/HPM rates, so Compliance Concierge® notifies when users are outside of their range;
  • Reg Z threshold amount, so Truth-in-Lending documents appear when required;
  • Bank holidays that allow Compliance Concierge® to calculate rescission;
  • Over 40 secondary market documents that the GSEs have changed;
  • Updated Ascensus* IRA documents;
  • User-requested warning messages on certain screens;
  • Factual Data by CBC interface;
  • Revisions to WBA 382 P.O.D. Beneficiary Designation document;
  • User-requested commercial application document; and
  • Updated Automatic Payment Authorization to comply with NACHA rules.

We continue to distribute timely information through software release notes, notices, and the monthly FIPCO Focus e-publication. If you are not receiving these items and would like to, please visit fipco.com and edit your profile or, if you are not registered with our website, click “Sign Up” to request these items.

As always, FIPCO staff members are here for you. If there is anything we can help with, please contact our business development team at fipcosales@fipco.com or fipcosupport@fipco.com.

*Ascensus is a WBA Associate Member.

 

January 5, 2023/by Jaclyn Lindquist
https://www.wisbank.com/wp-content/uploads/2021/09/Untitled-3_Blue.jpg 972 1920 Jaclyn Lindquist https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Jaclyn Lindquist2023-01-05 16:57:492023-01-06 08:53:57FIPCO Serves Compliance Concierge® Customers With Software Updates
Community, Education, News

Passwords: Ensuring Secure Data

How you can be your own best first line of defense against hackers

By Rob Foxx, CCBTO

Depending on how old you are, you will have a different perspective on passwords. The more seasoned professionals would have come in at a time when a minimum of six characters, no capital letters, numbers, or symbols was a commonplace practice. In comparison, passwords today usually consist of eight characters — at least one being one upper case — a number, and a symbol.

With a good computer and access to a vulnerable system, even now those passwords could be cracked by a common tool to brute force into the system in less than six hours. While our technology continues to evolve, unfortunately, so too do the bad actors and threats to our data security.

Digital Security Threats

While some threats are technology based, a consistent number of threats to our passwords are not. Saving a password to a browser is an invitation for trouble. Once you walk away from an unlocked computer, it would not take much effort to log in or even change your credential without your knowledge. There are many tools that can copy these passwords quickly and with very little expertise.

Additionally, those who reuse passwords or only slightly change them is a direct invite to bad actors. If your password was compromised on a common website and associated with your email, someone has that information, and there is a good chance they are going to try it elsewhere. For example, changing a password from Carl!123 to Carl@123 is also risky as a list of passwords associated with users’ names fed into a computer could guess this in seconds rather than hours.

Many people write their passwords down and tape it to a monitor. The inside of a desk drawer, or under the keyboard or mousepad are not much safer a hiding spot.

As many of us are aware, sharing passwords is a bad idea from an accountability point of view. Once someone else has it, you can no longer secure it from being written down or re-shared.

Be aware if your passwords or accounts have been breached in the past. The website have ibeenpwned.com is a staple for those in the information security field. This allows you to check if both passwords and email accounts have been used or discovered in past breaches.

Additional Protective Steps

Like many threats, the best answer is in the hands of the people most at risk. With a little education and a few resources, you could be on your way to making yourself an unappealing target.

  • Multi-Factor Authentication

Multi-Factor Authentication (MFA) is the latest and greatest in terms of locking an account if available. It requires a token or application on your phone to give a random code that matches up to a login service. Using MFA makes unauthorized access very difficult.

  • “Real” Passwords

The NIST (National Institute of Standards and Technology) in their 800-63 publication points out that complexity does not matter to a computer. It only makes it harder for users to remember. Password length makes it exponentially more difficult for a computer to guess or break a password that has not been breached. A 15-character password with all lowercase letters would take a computer an estimated 12 million years to breach. Passwords can be as simple as three unrelated words or based on items found on your desk — coffeelampmouse is a good example. The internet is filled with random password generators, but they are only of limited use as the passwords they generate are impossible to remember.

  • Password Vaults

Password vaults are very reliable and inexpensive or free. They can make and save passwords for you requiring a single password to access all your other passwords. Additionally, they can generate passwords for you. This removes the requirement to come up with something new every time you make a password. Some vaults are cloud based, and for those who are looking for a business version or an entirely offline vault, these are also available.

Armed with the knowledge of the problem and the tools presented you can use them to be your own best first line of defense against people trying to take over your digital life. You would not choose a lawyer, doctor, or bank officer who barely meets minimum requirements to do something important, so do not skimp on the passwords that secure your data with a minimum requirement either. If you have questions, feel free to ask your local IT or information security professional — they are generally very happy to help people safeguard themselves, as it makes their lives easier as well!

Foxx is director – infosec and IT audit services for FIPCO, a WBA Gold Associate Member.

November 11, 2022/by Hannah Flanders
https://www.wisbank.com/wp-content/uploads/2021/10/digital_cyber_security_banner-1.jpg 864 1152 Hannah Flanders https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Hannah Flanders2022-11-11 07:00:592022-11-10 22:34:05Passwords: Ensuring Secure Data
Compliance, News, Resources

The New Face of Identity Theft

The rapid growth of synthetic identity fraud

By Hannah Flanders

Like many aspects of our day-to-day lives, the expansion of technology has both enhanced and complicated the ways in which we operate. As more and more of our information lives online, identity theft — once more likely to occur because of a stolen wallet — has also assumed a digital appearance: synthetic identity theft.

What is Synthetic Identity Fraud?

Synthetic identity fraud is defined as the use of a combination of pieces of personally identifiable information (PII) to fabricate a person or entity in order to commit a dishonest act for personal or financial gain.

This form of identity theft has allowed bad actors to combine a stolen Social Security Number (SSN) and other false information — such as a fake name, address, date of birth, or phone number — to create a counterfeit identity to steal funds, escape prosecution, or any other number of criminal and fraudulent activities.

An Alarming Trend

In 2020, the Federal Bureau of Investigation (FBI) named synthetic identity theft as the fastest growing financial crime in the United States. Fraud targets are often those who do not typically use credit or are less likely to monitor their credit activity — including children, homeless individuals, and the elderly. These victims may find themselves blindsided as fraudsters create a new identity, apply for credit, and after years of building good credit by making payments for a time, abandon the account without paying anything back to the financial institution.

While this type of fraud is already difficult to detect due to its elusive or “normal” nature, many bad actors go to incredible lengths to appear as such, states Forbes. In addition to establishing good credit by making payments quickly and on time, some create digital profiles or use P.O. boxes for addresses.

Not only has technology and access to the dark web made PII more accessible to fraudsters, in 2011 the Social Security Administration (SSA) began randomizing the nine-digit social security codes rather than assigning them to individuals based on their geographical location and group number. No longer do social security numbers raise red flags when enrolling or opening accounts “out of state.”

As online banking grows in popularity, so too do concerns for synthetic identity theft. Between prevalent phishing schemes and heightened risks for data breaches — accessing PII and conducting synthetic identity fraud has become much easier than in years prior.

How to be Proactive Against Bad Actors

Inconsistent categorization and reporting make it difficult to identify and mitigate this type of fraud — as far as banks and credit bureaus can tell, these individuals are just like anyone else. . . until they “bust out” or abandon the maxed-out account with no intention of repayment.

After abandoning the false identity’s account, a fragmented file is created. This additional file not only becomes associated with the original SSN but also holds the additional credit report information and other fabricated PII. Unfortunately, this information could negatively impact the credit rating of the real individual.

When working with customers, bankers should advise frequent credit report checks or freezing unused credit at credit bureaus throughout the U.S. as to deter criminals or catch them early.

In addition, customers may take additional steps to protect themselves and their family against synthetic identity theft. One way parents can protect their children from fraudsters is by requesting their child be added to their credit profile. By adding a child to an adult’s credit profile, not only does the child’s own credit profile become established in his or her name and SSN, but the child is also able to begin building their credit.

The Cost of Synthetic Fraud

While victims of identity theft typically are not liable for fraudulent purchases or accounts, as long as they can prove they are the real SSN holder and not the thief, banks and other financial institutions are left to absorb the cost. This scheme is not only incredibly costly to banks across the country — with losses estimated at $20 billion in 2020, according to the Federal Reserve Bank of Boston — but gaps in the U.S. Fair Credit Reporting Act may have also increased the likelihood of repeat offenders.

The Federal Reserve has reported that bad actors are able to ‘flood the financial institution with an overwhelming number of claims’ on their fake accounts, and when creditors are unable to fulfill the investigation in the allotted timeframes, the disputed item is removed from the false credit report and time and time again, fraudsters get away with the act.

“Synthetic IDs are a struggle for community banks to identify,” states Lenore Breit, vice president – compliance manager at Wausau’s Prevail Bank. “Based on a recent presentation, [community banks] most likely have synthetic ID fraud in their deposit and loan accounts that remains undetected with traditional third-party ID verification programs that most community banks use.”

“There are other, more robust ID verification programs available to detect synthetic ID fraud,” adds Breit. “But they are costly and may not interface with legacy software.”

One such software program, the electronic Consent Based SSN Verification service, was created in part by the Economic Growth, Regulatory Relief, and Consumer Protection Act. The electronic service offered by the SSA was created in 2018 to aid financial institutions in combating synthetic identity fraud and verify an authorizing individual’s name, date of birth, and SSN against the SSA records. Services are based on the annual transaction volume and can cost thousands or even millions of dollars.

Common Signs of Synthetic Identification Theft

While difficult to trace, there are a few significant ways bankers can remain attentive to PII and other key indicators of synthetic identity fraud.

Most obvious is ensuring all SSNs match to the PII given. Do not assume a name change or relocation; ask questions or require verification for the sake of your bank and the security and privacy of all customers. This extra step could make all the difference in protecting the personal information of every customer.

If an account is already open, bankers should note applicants who have the same contact information or SSN as well as those with multiple authorized users.

As synthetic identity fraud becomes increasingly prevalent throughout the U.S., it is critical, for the safety of customers and security of all financial institutions, that Wisconsin bankers are prepared to combat this emerging fraudulent activity, caution community members against sharing unnecessary personal information with others, and assist individuals in regaining their rightful identity if necessary.

If you are interested in learning more about synthetic identity fraud, how these schemes can impact your bank or customers, or more ways you can take a stand against bad actors, please contact WBA’s Legal Team at wbalegal@wisbank.com or 608-441-1200.

November 11, 2022/by Hannah Flanders
https://www.wisbank.com/wp-content/uploads/2022/11/Cyber-Hacker-scaled.jpeg 1036 2560 Hannah Flanders https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Hannah Flanders2022-11-11 07:00:192022-11-10 22:21:41The New Face of Identity Theft
News

The Importance of Communication: How to Assist the Non-Technical in Understanding Technology

By Rob Foxx, CCBTO

As an information technology or information security professional, have you ever had a conversation with a member of your team and watched their eyes glaze over and think to yourself, ‘did they just understand a word I said?’ Welcome to the industry — this is part two in my series assisting technical and non-technical staff to better communicate on the subject of technology. Before breaking down a few simple ideas tech professionals can keep in mind when communicating with non-technical peers — we should first discuss where (and why) we as technology professionals falter in our communication.

Gaps in Experience

Like many of my peers, I spent my younger years studying both in college and independently to absorb as much information as I could in preparation for my career. In many ways, college helped me build my baseline for what I would need to learn both on my own as well as on the job. In addition to the standard classes within my major, I was also required to take speech classes like many college students. I did very well in speaking classes, however, my speeches were often on topics far more engaging to the audience than disaster recovery, firewalls, or server specifications.

Since then, I’ve spent much of my career working in teams with non-technical co-workers and, considering my target audience is usually within the banking industry, more than likely you too are a single individual or part of a very small team supporting your enterprise with minimal contact with those sharing your understanding of technology.

If you are of my generation or older, you were likely told somewhere along the way that you were very gifted or had aptitudes that leaned towards the up-and-coming field of information technology. Unfortunately, if you had any degree of awkwardness, it may have also been sold to you as something that would not require you to regularly communicate with people — a detail probably very few people have found to be true.

Having technical skills, aside from communication, is one of the most important skills one can have. On the upside, many of us have found being an effective communicator does not mean being a master orator or an excellent writer. As proof to that, I will tell you in all honesty that I am neither. I stumble over my words, and I need someone to proofread anything holding more content than a short email or technical report.

Four Things to Keep in Mind

As I continue through my career and often work closely with non-technical individuals, I have found that there are a few ways our profession can not only communicate better, but also build relationships for better future communications.

  • Do not get frustrated with your audience.

None of us learned our profession overnight, so do not set the expectation that your non-technical team members will learn yours after one chat. By getting frustrated, you do a great disservice to the effort of everyone who was patient enough to make sure you understood your profession well enough that you could work successfully and independently.

In further developing good communication skills, technical people will realize the importance of asking co-workers to be specific in their requests. You may frequently get calls from peers saying, “my computer does not work.” By asking follow up questions such as “what are you trying to do,” “what does the computer do when you do that,” or “walk me through the problem,” tech professionals will generally get a better overall response and diagnosis of the issue at hand.

  • Know your audience.

Knowing who you’re talking to and their level of understanding in the subject you are talking about is the major difference between public speaking and speaking with business leaders. Never make assumptions about their level of understanding or be afraid to ask how familiar they are with virtual environments. The least technical executive at your bank most likely still receives business articles that could offer a baseline understanding of the subject matter at hand. Either assuming too much or too little could lead to your target getting frustrated with you expending their limited time.

  • Find a beta user.

My original career goal was to become a software developer. I said from day one that I would want to hire someone who is older and less tech savvy to work with my team and test my product. If my non-technical mother could operate it without significant guidance, then I would have succeeded in developing a product that offers an intuitive and user-friendly design and would be well accepted for its ease of use.

To apply this idea in dealing with business leaders, remember that if you can explain it to someone non-technical — be it a spouse, parent, or even a helpful co-worker — business leaders should have a better chance of understanding what thoughts you are trying to convey.

  • Don’t be judgmental.

Make sure to have a non-judgmental way of communicating if a decision that is being made or considered is problematic. In technology, it may be stating that “this is a band aid to the problem,” or “we will need to readdress this problem sometime in the near future.” In information security, the cue is often “we can do that if you are willing to accept the risk and sign a risk acceptance form.”

Now that we have looked at the issues and a few things to help keep in mind, I encourage you to keep in mind that learning complex concepts and making decisions is a process. Talking over the heads of your coworkers and business leaders may only make this process more difficult. Remember, technology is your profession — not theirs.

Foxx is director – infosec and IT audit services for FIPCO, a WBA Gold Associate Member.

October 21, 2022/by Hannah Flanders
https://www.wisbank.com/wp-content/uploads/2022/10/Technology-scaled.jpeg 1707 2560 Hannah Flanders https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Hannah Flanders2022-10-21 07:00:232022-10-19 13:31:12The Importance of Communication: How to Assist the Non-Technical in Understanding Technology
News

The Importance of Communication: How to Understand Technology for the Non-Technical

By Rob Foxx, CCBTO

Have you ever had a conversation with a member of your information technology or information security staff and after they left, wondered to yourself what they just said? You are not alone, and it is not an uncommon occurrence. This two-part series (the next to be released in the October 2022 Wisconsin Banker) will help non-technical and management staff better communicate with — and understand — technical staff. Before breaking down the best ways teams can improve their communication — we first should understand how we got into this situation.

Like I image many people with computer and technology background did, I came from a more technical side of IT. There were two distinct points in my education where the need for communication skills were downplayed, if not ignored entirely.

Experiences Shape Us

In high school, I was given a career aptitude test that assisted my school advisor in determining what they would best recommend I do after graduation. I scored high in many areas; however, I did not have many social experiences with my peers and spent my days labeled as a “nerd,” which skewed my results and stated that I had a low score for interpersonal skills.

My advisor suggested a career involving computers and technology, which would allow me to work independently and avoid much social interaction. While I am not a full-blown extrovert, I do very much enjoy working with and helping people — something I think many of my peers share with me, even if they are not the best at communicating it.

Though public speaking courses are often required in high schools, technical colleges, and universities, the classes often do not cover critical skills such as how to explain complex concepts to people who don’t have a baseline understanding of the requirements to understand them. In addition, many computer and technology students may only have experience communicating tech-related ideas and concepts with peers, causing a significant gap in communication and understanding between technical and non-technical individuals.

Communicate Expectations

Often the communication gap doesn’t seem as obvious in other majors or professions however, with the rise of technology in our daily lives and the increased use of computers and technologies to better facilitate and perform day-to-day tasks in nearly every industry, it is important that professionals either have a strong understanding of technology or rely on technology experts.

The major problem that often occurs with improper communication is failure to set, understand, and meet expectations. Ideally to set these expectations, experts should be able to both ask and understand business requirements and explain solutions to make informed decisions. This is something college does not prepare these experts for. In fact, it is something they have been told — either directly or by implication — is not important.

In a business scenario, the inability to pass along knowledge of the differences between options presented could lead to business leaders making decision based on what they can understand (usually financial cost). In the long term, making the wrong decision could require having to revaluate and revisit decisions before the end of their intended lifecycle.

Avoiding Common Mistakes

So, we see the problem, now how do we fix it? First and foremost, good communication is a two-way commitment. There is no shame in not understanding or asking for a clearer explanation. I promise that there are many aspects of the bank that the technology professionals do not completely understand.

The knowledge many IT professionals are trying to pass along is not expected to be learned overnight and might not even be able to be conveyed in a single meeting. However, this information is often very important for leader to consider when making informed business decisions for the benefit of the organization.

Frustration and lack of understanding can be the enemy of all productivity and growth within the organization — don’t pretend to understand a topic. Rather, non-technical individuals should ask follow-up questions or for explanations of terms that are not understood. This will assist every computer and technology professional in more effectively relaying IT-related information to all.

Foxx is director – infosec and IT audit services for FIPCO, a WBA Gold Associate Member.

September 2, 2022/by Hannah Flanders
https://www.wisbank.com/wp-content/uploads/2021/09/Untitled-3_Lime-Green.jpg 972 1920 Hannah Flanders https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Hannah Flanders2022-09-02 07:58:562022-09-02 08:00:04The Importance of Communication: How to Understand Technology for the Non-Technical
Education, News

See Into the Mind of a Cybercriminal

WBA’s Secur-I.T. & BSA/AML Conference returns in 2022

As cybersecurity and fraud continue to be rising topics of discussion throughout the banking industry, bankers are encouraged to stay informed on the latest trends experts are seeing and how regulations will continue to impact Wisconsin banks by attending WBA’s annual Secur-I.T. & BSA/AML Conference held in Wisconsin Dells.

The two-day conference — beginning September 20 and adjourning at noon on September 21 — draws over 125 BSA/AML, operations, security, and technology professionals from around the state for over seven hours of educational presentations and networking.

This year’s keynote session will feature Bryan Seely, a world-famous cyber security expert, ethical hacker, author, and former U.S. Marine. Seely became one of the most famous hackers in 2014 when he became the only person to ever wiretap the United States Secret Service and FBI. Before he was caught, he confessed to the two agencies that there was an issue that needed to
be fixed.

Unlike many hackers, Seely is passionate about fighting for consumers rights, privacy, and educating the public about how to stay safe in a constantly changing technological landscape. In this keynote session, Seely will highlight the different ways in which hackers think and the new, creative ways professionals must approach security in order to protect the most critical information of the business and customers.

In addition to this captivating keynote speaker, the Secur-I.T. & BSA/ AML Conference offers several breakout sessions and networking opportunities that will assist banking professionals from throughout Wisconsin in further developing their bank’s customer experiences, BSA/ AML program, security, and technology capabilities as the banking and technology industries continue to evolve.

August 17, 2022/by Hannah Flanders
https://www.wisbank.com/wp-content/uploads/2021/10/istock_89059287_xlarge_cybersecurity_banner.jpg 1120 1680 Hannah Flanders https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Hannah Flanders2022-08-17 07:51:262022-08-17 08:37:21See Into the Mind of a Cybercriminal
News, Resources

How Do Business Leaders Protect Data?

By Rob Foxx, CCBTO

I frequently get asked, “How do I or my other non-technical staff help keep my institution safe from electronic threats?” Ransomware is the topic of the day, and I don’t know that there will be changes to that any time soon. There are a few things that can make protecting yourself easier. Good security is done in multiple layers of defense and requires participation of all members of your team.

Involve Your Whole Team

Cybersecurity is the responsibility of all members of the business, not just IT. To that end, everyone needs to know what common tactics are used to compromise your security. Learning how to identify phishing emails as well as business email compromise and reporting these types of events could be the difference between fighting a breach or dodging one. This kind of mindset has been in physical security for a very long time, but it has been a lot slower to be adopted into data security. By educating your staff and yourself and reporting it to the right people in your organization, you can avoid a very common but costly pitfall.

Ensure System Maintenance is Up to Date

The next item is a task that IT performs but is something leadership should both understand the basics of and require accountability for. Keep your systems updated and patched. An alarming number of breaches over the years could have been prevented by simply keeping systems up to date. Microsoft pushes out Windows patches the second Tuesday of every month, which should be reviewed for issues with your environment and deployed as soon as possible. There are tools that make this very easy to perform should you invest in them. Less obvious patches to other software like Adobe Reader, Google Chrome, and even your remote connection software, are equally important. Keeping an inventory of your software assets and checking them regularly for updates and patches can reduce your attack surface. Updates should not only be done, but they should also be reported to management and/or the board of directors at a regular frequency.

Secure Your Passwords

Get secured passwords or, if possible, multi-factor authentication. Insurance companies offering cyber insurance policies are pushing for people to utilize tools such as authenticators on your phone for multifactor authentication. While this is ideal, it may not be in place in many institutions. The National Institute of Standards and Technology (NIST) security framework used by the U.S. Department of Defense recommends longer passwords (16+ characters) without complexity and no expiration unless you have reason to believe it was exposed. Passwords can be as simple as picking out 3 random words such as doorbluecomputer. This is easy to remember and difficult for a computer to guess. If you can’t use multifactor authentication, using a password manager can enable you to use many complex and long passwords that you could never otherwise remember.

Give IT and Security a Seat at the Table

Bring IT and information security into your decision-making process. If this is something that is not being done currently, consider adding these people to the team that makes your highest-level decisions. They will have a perspective on additional costs as well as potential problems and conflicts that may occur. While they may not represent the majority of your staff or income, they speak for a considerable portion of your assets. There are few things as frustrating as going forward with a new project and not having considered how it will work with the rest of your environment or whether you have the hardware or software to support it without extra expenditure of assets. Additionally, there are many problems that exist within a business that your more technical staff could offer a solution to that the rest of the staff may not have known about.

Keep Up With Advancements in Technology

Don’t let technology outpace you. New technologies come out every day, and while you’re not expected to be on the leading edge, you should at least keep a healthy pace with it. For example, if you are using a conventional virus scanner, you are already behind the times. Zero-day exploits (bugs that are either unknown or unpatched) and fileless malware and viruses are also not detected by traditional antivirus products. Fileless attacks are becoming more prevalent, and you can get them any number of ways. It could be as innocent as going to a website and without any need clicking or downloading — without your permission, you could have brought an unwanted problem to your institution. Though a bit on the pricier side compared to traditional antivirus, next-generation products in this field are far more capable than their older counterparts.

Most of the items presented are of a non-technical nature and should be part of making your staff work well with your information security team and vice versa. In our more modern environments of work from home, it is more important than ever to make cybersecurity a part of everyone’s day to day.

Foxx is information security and audit advisor for FIPCO, a WBA Gold Member.

July 7, 2022/by Hannah Flanders
https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg 0 0 Hannah Flanders https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Hannah Flanders2022-07-07 07:39:462022-07-07 07:39:46How Do Business Leaders Protect Data?
Community, Education, Resources

Executive Letter: Bankers Helping Bankers Platform, New Benefit for WBA Members

Rose Oswald PoelsBy Rose Oswald Poels

I’m pleased to announce that the Wisconsin Bankers Association (WBA) is partnering with state bankers associations nationwide and data provider FedFis to offer access to Bankers Helping Bankers to WBA members.

Bankers Helping Bankers is a bankers only platform for collaboration and research. Through data tools and dynamic user groups, Bankers Helping Bankers provides community bankers with a knowledge base focused on bank technology and emerging Fintech companies, as well as hot topics such as cryptocurrencies, banking as a service, and direct digital banking.

In October 2021, the Independent Bankers Association of Texas (IBAT) was the first state banking association to partner with FedFis, a provider of fintech data analytics and a strategy system which tracks financial, M&A, and vendor data (including technology vendors) on every bank and credit union in the United States. Since then, the exclusive, banker-only platform has been expanding to states across the nation.

Given the rapidly changing landscape of banking technology, it is hard to keep up through in-person events alone. Bankers Helping Bankers provides an additional way for bankers to connect with one another via forums and access a wide range of fintech data.

WBA continues to offer our WBA Connect and CEOnly/CFOnly peer groups that provide in-person and online networking for Wisconsin bankers only. Through the new collaboration with Bankers Helping Bankers, we aim to bring even more value to WBA members by offering an additional opportunity that lets bankers connect with their peers across the country, with a focus on banking technology.

If you or any member of your team would like to take advantage of the Bankers Helping Bankers opportunity, please fill out the form to gain access to the platform. You will receive an email within a couple of weeks with details on how to create your account.

June 9, 2022/by Hannah Flanders
https://www.wisbank.com/wp-content/uploads/2021/09/Triangle-Backgrounds_Dark-Blue-on-Light-Blue.jpg 972 1921 Hannah Flanders https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Hannah Flanders2022-06-09 07:29:412022-06-09 07:43:01Executive Letter: Bankers Helping Bankers Platform, New Benefit for WBA Members
Triangle Background
Community, News

Reimagining Accessibility for Banks

The second in a series exploring the effects of the COVID-19 pandemic on banks in Wisconsin.

By Hannah Flanders

As COVID restrictions continue to subside and the days of isolation have since passed (we hope), bankers and customers alike return in droves to their community banks. However, the challenges
presented by the pandemic will forever leave a lasting impact on the way banks operate.

Like most Americans, banks were forced into the confusion and chaos of the COVID-19 lockdown with little to no time to prepare. With disaster plans in place, many banks quickly turned remote, began servicing loans through drive-ups or in the parking lot, and relied on technology to stay connected to their team and customers.

The pandemic’s ongoing impact has allowed banks around the country to reassess the needs of both their customers and staff in connection to the bank and its physical or online branches.

For well over a century, brick and mortar banks have been the cornerstones of communities throughout Wisconsin. Be it for the safety and security of their money, or the personal connection associated with meeting in person, consumers across the state highly value their local, physical bank branches. However, many banks are rethinking their approach to the ‘traditional’ bank.

“[The ways in which] banks interact with clients and where employees get their work done has changed,” says Laurie Richards, vice president and partner at LERDAHL, a workplace interiors company and WBA Associate Member. “Bank branches are remodeling their locations to accommodate a wider variety of expectations that have emerged over the last two years as competition increases for clients and employees.”

A key component of embracing post-pandemic life for Americans around the country has been implementing the lessons learned — and this is certainly no different for Wisconsin bankers. As new branches — including Capitol Bank on Madison’s east side and Farmers and Merchants State Bank in Lake Mills — pop up around the state, new challenges arise as to how banks reimagine themselves in their communities.

As the pandemic proved, accessible banking is the most important factor to both banks and consumers. “Horicon Bank has a renewed commitment to innovate the way we help our customers. The needs of our customers are changing — and in 2020 they changed rapidly,” says Grace Bruins, marketing officer at Horicon Bank. “We’ve had to take a look at the things that make us unique — personal service, community commitment — and find a way to offer that in a digital environment as well as a physical one.”

Throughout Wisconsin, community banks envision new ways of exceeding the expectations of their customers. “Our plan is to continue to invest in our people and technology to help the bank grow and be successful,” says Prevail Bank President Nathan Quinnell. Many banks throughout the state have made upgrades such as e-signatures, ITMs, and online chat functionality for customers — Prevail Bank also hopes to upgrade their online mortgage process, add online account opening functionality, and sustain remote employees.

While many banks offered remote options during lockdown, many Wisconsin bankers have returned with full force to their branches and remote employment is considered on a case-by-case basis. Finding ways to leverage technology and space within the office is not only critical to staying relevant to customers in a world with increasing interest in digital banking, but to finding and retaining talent in a competitive job market.

“As we are in the relationship business, in addition to valuing our customers, we value the presence and safety of our employees,” says Capitol Bank President and CEO Ken Thompson. With insight from having successfully navigated the challenges created by the pandemic, Thompson understands the value this new space adds for both his customers and employees.

The combination of private office locations balanced with the increasing need for open, conference-style spaces planned for the new Capitol Bank location highlights a shift from individual to collaborative work and supports the idea that the type of task, privacy, and level of collaboration required is flexible throughout the day. With the assistance of technology, bankers are now able to maintain the office environment and culture as well as offer support to branches across towns, cities, or the state.

“As well as providing legendary customer service, embracing future technology is an important aspect of nurturing our current and future customer relations,” says William Campbell, Farmers and Merchants State Bank president and CEO.

“As we transition into our new Lake Mills branch, offering secluded spaces where customers can meet with Lake Mills staff as well as virtually meet with Waterloo and Marshall team members, will not only allow for an easier transition but offer our customers a variety of services,” adds William Hogan, Farmers and Merchants State Bank CFO.

In reimagining accessibility, bankers have considered new ways customers are able to interact with bankers — via the drive-up, ITMs, and through their digital branches — and explored elevating
existing offerings.

“Since the pandemic started, [Horicon Bank] believes there are more customers looking for digital banking services,” says Horicon’s CFO Robert Traylor. Whether it be mobile banking or the desire to digitalize services already offered at the bank — there is no doubt to bankers that the use of technology in some capacity offers customers a greater personalized banking experience and, in the case of online banking, allows their money and other banking services to become accessible to customers no matter where they are.

Accessibility, be it of the physical branch or the online services, continues to be amplified by the days of COVID-19. In understanding the need for both brick and mortar and virtual banking practices as well as approaches to combine the two, Wisconsin bankers hit their stride and continue their growth looking beyond the pandemic.

Community banking is, and always has been, concerned with the relationship built between the banker and the customer. Providing safe and productive spaces — both in-person and online — that offer the relevant tools and foster growth for both the employees and clients, is ultimately beneficial to the success of any community bank.

 

May 13, 2022/by Cassandra Krause
https://www.wisbank.com/wp-content/uploads/2021/09/Triangle-Backgrounds_Lime-Green.jpg 972 1921 Cassandra Krause https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Cassandra Krause2022-05-13 06:27:012022-05-12 15:28:23Reimagining Accessibility for Banks
Education, News

WBA Featured by Cvent for Delivering Industry-Leading Events

Read more
March 14, 2022/by Cassandra Krause
https://www.wisbank.com/wp-content/uploads/2022/03/Lori-Cvent.png 530 905 Cassandra Krause https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Cassandra Krause2022-03-14 08:46:302022-03-14 08:47:31WBA Featured by Cvent for Delivering Industry-Leading Events
Page 1 of 212

Events

Compliance, Internal Audit, Risk Management, Webinar

Building an IT Strategic Plan that Helps You Make Decisions

Does your IT Strategic Plan work for you, or is it just a document that you review once a year? Traditional FFIEC regulatory guidance calls for an IT Strategic Plan that identifies medium-to-long-term goals and allocations of IT resources over a three-to-five-year timeframe.

But how does your IT Strategic Plan help you to make decisions about which types of technology you WANT to deploy and WHO your institution wants to be when it comes to deploying technology?

What You’ll Learn

  • FFIEC Guidance on IT Strategic Planning
  • The Law of Diffusion of Innovation
  • What Kind of Bank Are You?
  • What’s Your Acceptable Level(s) of Risk?
  • Lining Up Risk with Strategy
  • Creating an IT Strategic Plan that can be your “North Star”

Who Should Attend
Information Security Officer, IT Manager, Risk Officer, Internal Auditor, and Executives looking to improve their Information Security Program.

Instructor Bio
John Helland
is an Information Security Consultant at SBS CyberSecurity (SBS), a company dedicated to helping organizations identify and understand cybersecurity risks to make more informed and proactive decisions.

Helland maintains Certified Information Security Manager (CISM), Certified Banking Security Manager (CBSM), Certified Banking Vendor Manager (CBVM), and Certified Banking Business Continuity Professional (CBBCP) certifications. He received a degree in Network Security and Administration from Dakota State University.

Helland joined the SBS team in 2021, bringing over 20 years of experience in the IT industry. He specializes in information security management and bridging the gap between information technology and information security.

Helland is passionate about making a difference for his clients and co-workers by providing valuable contributions, making well-informed decisions, and advocating for the best path forward for the project they are collaborating on.

Registration Option

  • Live Access, 30 Days OnDemand Playback, Presenter Materials and Handouts – $279
  • Available Upgrades:
    • 12 Months OnDemand Playback + $110
    • 12 Months OnDemand Playback + CD  + $140
    • Additional Live Access + $75 per person
January 20, 2023/by Katie Reiser
https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg 0 0 Katie Reiser https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Katie Reiser2023-01-20 10:21:132023-01-20 10:21:13Building an IT Strategic Plan that Helps You Make Decisions
Operations, Security, Technology, Training and Development

GSB – Bank Technology Security School

Online bank fraud has been described as epidemic, with numbers that are staggering — it’s estimated that U.S. banks lose $1.5 billion to phishing attacks annually. Consider also that mobile devices are now ubiquitous and hackers are getting ever-more sophisticated in their ability to gain access to sensitive data and it’s clear that there is a need for proactive IT security offense and defense to stop attacks including phishing, malware, coordinated denial of service attacks, hacktivist breeches and more. The threats to the banking sector are multiple and significant — both financially and reputationally. Today’s bank customer is rightfully concerned about online banking fraud and studies show that the majority of customers would change banks if they became a victim of fraud at their current institution. Security breeches not only cost significant dollars, but they also destroy erode consumer trust. Being proactive is key.

Don’t miss this innovative school that’s designed by, and especially for, information security officers in the financial industry. This state-of-the-art program will broaden your understanding of the business of banking including key drivers of bank profitability, along with an in depth, interactive and hands-on study of the latest IT security techniques and strategies.

The school uses a mix of lecture, small group discussions, and interactive computer labs. The hands-on, computer-based simulation labs will allow you to explore penetration and vulnerability testing, security attacks, early detection of data breeches and more. You’ll spend class time diving deep with IT security experts and knowledgeable colleagues who will become a network to call upon for years to come. Apply today to take advantage of this opportunity to learn from experts in the banking industry about today’s key issues in information assurance.

Who Should Attend

Whether you’re a veteran Information Security Officer or new to the IT security field, this powerful program will give you the skills and knowledge to effectively secure your bank’s and your customers’ most sensitive information.

When: October 16–20, 2023

Enrollment Deadline: September 15, 2023

Program Fee: $2,725

January 13, 2023/by Anna Poloncarz
https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg 0 0 Anna Poloncarz https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Anna Poloncarz2023-01-13 11:48:412023-01-13 11:48:41GSB – Bank Technology Security School
All-Staff Training, Bank Directors, Bank Management, Branch Manager, Business Bankers, CEO, Commercial Lending, Compliance, Consumer / Retail, CRE Lending, Credit Management, Lending, Marketing / Sales, Mortgage Lending, New to Banking, Operations, Personal Banker, Risk Management, Supervisior, Technology, Training and Development, Webinar

GSB – Digital Banking School

Banking continues to evolve — and as consumer preferences have moved from lobby to service multi-channel, multi-touch interactions, the demand for digital banking services has grown exponentially.

This shift — plus pressure from new and non-traditional competitors for all types of financial services — has led to an entirely new banking landscape. To remain competitive today — and viable tomorrow — community banks need to devote attention, staffing and financial resources to innovation, digital product mix, online customer engagement, technological advances, vendor partnerships and more.

GSB’s Digital Banking School is the first school of its kind — focused exclusively on demystifying these sometimes-intimidating topics — to help community banks move into and/or grow in the digital banking space.

This immersive experience will showcase the key elements of a bank’s effective digital strategy and will be led by industry thought leaders who are experts in digital banking and innovation.

What You’ll Gain

  • Defining the Game
  • Get off the Sidelines — Why Digital Banking?
  • Which Version Do You Want to Play?
  • Create Your Team — The People Factor in Digital Banking
  • What Equipment Do You Need?
  • Building the Foundation to Help You Achieve Digital Banking Success
  • Promoting Your Digital Bank and Building Your Brand
  • Technology & Risk: Cybersecurity Challenges

Who Should Attend

Given the scope of all that’s involved in digital banking, we encourage broad participation across all various areas of the bank — and that’s why we’ve priced this school with a single, affordable per-bank fee. We encourage community bank CEOs to attend, along with leadership teams from operations, retail strategy, lending, business development, marketing, technology, project management, cybersecurity and compliance. All will benefit from the program and be better positioned to make the important shifts that drive digital banking success.

When: April 3–27, 2023

Program Fee: $3,300/bank

January 13, 2023/by Anna Poloncarz
https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg 0 0 Anna Poloncarz https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Anna Poloncarz2023-01-13 11:47:432023-01-13 11:47:43GSB – Digital Banking School
CEO, In Person, Operations, Senior Management, Technology, Training and Development

GSB – Bank Technology Management School

As the technologies used to support banking become more important, and as banking products demand more sophisticated technology solutions, it’s vital that IT professionals and information security officers understand how to effectively choose, deploy and lead the use of current and emerging technologies to meet business goals and regulatory requirements.

Don’t miss this innovative school that’s designed by, and especially for, IT professionals and information security officers in the financial industry. This state-of-the-art program will broaden your understanding of the business of banking including key drivers of bank profitability, along with an in depth and interactive study of information technology management.

The school will share practical insights for disaster response and business continuity, IT exam preparation, technology risk assessment, vendor management, IT strategic planning, project management and more.  Designed to help improve your productivity and value at your bank, you’ll also establish a network of professional colleagues with whom to collaborate and exchange ideas for years to come. Apply today to take advantage of this opportunity to learn from experts in the banking industry about today’s key issues in information technology management and how those critical issues relate to the bank’s goals and bottom line.

What You’ll Gain

  • A clear understanding of your role in technology management and how it contributes to bottom-line bank profitability
  • An in-depth study of the business of banking
  • An improved technology management process
  • Knowledge for enhanced information security through effective use of technology
  • Strategies to improve efficiency, productivity and profitability
  • A network of peers to share ideas and resources now and in the future

Who Should Attend

Whether you’re a veteran IT professional or new to the IT management field, this powerful program will give you the skills and knowledge to effectively manage your bank’s IT function. CEOs and other senior managers are also encouraged to attend to gain a better understanding of how the bank’s IT function is a key element in bottom-line profitability.

When: April 17–21, 2023

Enrollment Deadline: March 17, 2023

Program Fee: $2,725

January 13, 2023/by Anna Poloncarz
https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg 0 0 Anna Poloncarz https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Anna Poloncarz2023-01-13 11:46:362023-01-13 11:46:36GSB – Bank Technology Management School
Compliance, Human Resources, Operations, Security, Webinar

Beginning Security Officer: Dos, Don’ts, & Compliance

Snap up this expert training for new security officers. Everyone has to start somewhere — even security officers. They are foundational to the safety of each financial institution and training is essential to their success. This practical program will address the security officer’s role, best practices, regulatory compliance, physical security issues, and more.

After This Webinar You’ll Be Able To:

  • Comprehend exactly what the security officer is responsible for under the Bank Protection Act and implementing regulations
  • Understand lighting, landscaping, locations, and locks – the four Ls of security
  • Determine the proper steps to take with cash recyclers and ITMs
  • Explain to management the need for an annual risk assessment
  • Identify the records the bank security officer should keep

Webinar Details
The Bank Protection Act (BPA) and implementing regulations specify security officer requirements. This program will focus on these regulations, especially on Regulation H, to demonstrate what your security program should contain. Although the regulations are very specific, they allow leeway for risk-management decision-making. This program will include industry standard practices and demonstrate (with pictures) how to comply. Security officer dos, don’ts, and best practices will be covered. Other topics will include:

  • How often your staff should be trained on security
  • How new equipment will change your training strategies
  • How often the security officer should receive specialized training, like active shooter
  • What the security officer should consider when evaluating equipment or training issues

Who Should Attend?
This informative session is designed for security officers, risk management professionals, internal auditors, and compliance officers.

Take-Away Toolkit

  • Regulation H checklist to determine if your security program is current
  • Night inspection form to help implement your physical security inspections
  • Proper Employee Conduct During and After a Robbery form for training
  • Risk Management Basics: Before, During, and After the Robbery
  • Risk Management Basics: Robbery Styles
  • Risk Management Basics: Physical Risk Assessments, Thinking Like the Robber
  • Sample incident report
  • Employee training log
  • Interactive quiz
  • PDF of slides and speaker’s contact info for follow-up questions
  • Attendance certificate provided to self-report CE credits

NOTE: All materials are subject to copyright. Transmission, retransmission, or republishing of any webinar to other institutions or those not employed by your agency is prohibited. Print materials may be copied for eligible participants only.

Presenter
Barry Thompson, CRCM – Thompson Consulting Group, LLC
Barry Thompson
is an international speaker, trainer, consultant, and writer. He is a security and compliance “guru” for a leading national training organization and regularly presents security conferences for trade groups – he has trained over 54,000 financial professionals.

Thompson is recognized worldwide, presenting in Brussels, Belgium to European bankers on internal fraud; at the United Nations on identity theft; and to Japanese bankers on bank security. Thompson has worked in the financial services industry for over four decades, and has held the positions of security officer, compliance officer, treasurer, senior vice president, and executive vice president. He has handled over 900 security cases and has been involved with investigations and prosecutions at the federal, state, and local levels. Thompson is the author of 101 Security Tips for the Beginning Security Officer and Inside the Vault and has been interviewed by Newsweek, Computer World, USA Today, and other national publications.

Registration Options

  • $245 – Live Webinar Access
  • $245 – OnDemand Access + Digital Download
  • $350 – Both Live & On-Demand Access + Digital Download
November 18, 2022/by Katie Reiser
https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg 0 0 Katie Reiser https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Katie Reiser2022-11-18 08:51:372022-11-18 08:51:37Beginning Security Officer: Dos, Don’ts, & Compliance
Branch Manager, Compliance, Risk Management, Senior Management, Technology, Webinar

Managing Vendor Management and Assessing IT Risks Seminar OnDemand with Live Streaming

We rely on third party service providers and other financial institutions for products and services either to enhance the services performed in-house or to offer services that are otherwise not cost effective. Outsourcing comes with risks, which may be realized in a different manner than if the functions were in-house resulting in the need for controls designed to monitor such risks as loss of funds, loss of competitive advantage, damaged reputation, improper disclosure of information and regulatory action. The decision to outsource should fit into your bank’s overall strategic plan and corporate objectives.

Join us for this informative session where we will discuss the initial and ongoing due diligence and provide you with loads of tools to help guide you through the vendor management process.

What You’ll Learn

  • Understanding Regulatory Requirements – A review of FFIEC Guidance and GLBA 501(b) requirements for third party oversight
  • Details of New Interagency Guidance – A deep dive into the recent Interagency Guidance on Third-Party Relationships and the impact on how you manage risks associated with your third-party vendors
  • Identifying Critical Vendors – How to identify and establish your bank’s critical vendors and the due diligence process required for them
  • Developing a Vendor Risk Assessment – A review of a sample vendor risk assessment will be utilized to discuss risk factors and internal controls to mitigate vendor risks to your bank
  • Contract Review Components – Overview of what examiners expect to see in your vendor contracts and best practices for tracking contract terms and expiration dates
  • Ongoing Monitoring and Due Diligence – A thorough discussion of how to properly maintain up-to-date due diligence files and ensure your vendors are meeting the terms of their agreements

Who Should Attend
This informative session is designed for Risk Managers, Compliance Officers, Information Security Officers, and any other individual responsible for vendor management due diligence.

Instructor Bio
Dawn Kincaid began her banking career while attending The Ohio State University. She has 19 years of experience in client service, operations, information technology, administrative and board relations, marketing, and compliance. Most recently Kincaid served as the Senior Vice President of Operations for a central-Ohio-based community bank, where she created and refined policies and procedures, conducted self-audits and risk assessments, and organized the implementation of new products and services. Kincaid has served in the roles of Compliance, BSA/AML, CRA, Privacy, and Security Officer. She has led training initiatives, prepared due diligence information, completed a variety of regulatory applications, coordinated internal and external audits, and exams, and presented for numerous state associations.

Registration Options

Live Stream: Includes access to the recording for 12 months: $1049

November 11, 2022/by Katie Reiser
https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg 0 0 Katie Reiser https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Katie Reiser2022-11-11 08:40:452022-11-11 08:40:45Managing Vendor Management and Assessing IT Risks Seminar OnDemand with Live Streaming
Branch Manager, BSA/AML, Frontline Retail, Security, Technology, Training and Development, Webinar

Preventing Human Smuggling, Human Trafficking, Elder Fraud, and Identity Theft

We will look at the red flags and scenarios for Elder Abuse, Identity Theft, Business Email Compromise Schemes, and Human Trafficking. We will look at the misuse of POAs, Cash, Fake Emails, Romantic Scams, and more. Learn what the response of your financial institution should be when these activities hit our accounts and our customers. Two of the most disturbing crimes in our country which involve harm to those who are being smuggled into the country and then those who are exploited by human trafficking. Learn how big the crime is in the U.S. and what our response should be. Learn what the differences in these two crimes are and how we can detect these criminals in the banking system.

What You’ll Learn

  • Red Flags for Elder Abuse
  • Privacy Issues in Elder Fraud
  • Romantic Scams, POAs, debit card abuse in elders
  • Identity Theft programs
  • Use of ITIN after SSN
  • Stealing purses and writing bad checks is back
  • How to detect bad identification
  • New Cyber Crimes on the New SAR are focused on business email attacks and compromises
  • Learn how good wire procedures can prevent this
  • Human trafficking
  • Human smuggling
  • Learn how your customers hide and disguise transactions
  • Filing Suspicious Activity Reports

Who Should Attend
All branch personnel, tellers, new accounts, loan officers and call centers who help and protect our customers.

Instructor Bio
Deborah Crawford is the President of Gettechnical Inc., a Florida based training company. She specializes in the deposit side of the financial institution and is an instructor on IRAs, BSA, Deposit Regulations and opening account procedures. She was formerly with Hibernia National Bank (now Capital One) and has bachelor’s and master’s degrees from Louisiana State University. She has 35+ years of combined teaching and banking experience.

Registration Options

Live Access, 30 Days OnDemand Playback, Presenter Materials and Handouts $279

  • Available Upgrades:
    • 12 Months OnDemand Playback + $110
    • 12 Months OnDemand Playback + CD + $140
    • Additional Live Access + $75 per person
September 22, 2022/by Katie Reiser
https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg 0 0 Katie Reiser https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Katie Reiser2022-09-22 10:10:572022-09-22 10:10:57Preventing Human Smuggling, Human Trafficking, Elder Fraud, and Identity Theft
Bank Directors, Compliance, Internal Audit, Security, Webinar

Anatomy of a Cyber Attack: Ransomware

Nearly every ISO and IT Manager’s greatest fear is getting that phone call — the one where a user says they have a ransom note popping up on their screen. This is one of our greatest fears as well, but with a different spin — getting that phone call from a client. Unfortunately, we’ve been in this situation before and helped numerous organizations recover from ransomware.

In this session, we’ll review two different ransomware attack scenarios from two different organizations that got different results while dealing with ransomware — and why.

What You’ll Learn

  • Current Ransomware Stats and Tactics
  • Typical Ransomware Attack Scenario Walk-Through
  • Case Study #1 and #2
  • Differences and Results
  • Top Controls to Mitigate Ransomware Risk

Who Should Attend
Information Security Officer, IT Manager, Risk Officer, Internal Auditor, Board members, or other management team members looking to understand risks from Ransomware.

Instructor Bio
Buzz Hillestad is a VP Information Security Consultant and heads the Incident Response team at SBS CyberSecurity in Madison, South Dakota. SBS is a premier cybersecurity consulting and audit firm dedicated to making a positive impact on the banking and financial services industry. Hillestad has a bachelor’s degree in Computer Information Systems for Business and has performed masters work in Information Security at the SANS Institute — an internationally recognized best source for cybersecurity education. Hillestad has been involved with Information Security practice in Healthcare, Banking, Government, and many other industry verticals since 2004 and has helped over 200 organizations improve their information security processes and programs. Hillestad additionally has numerous security publications in magazines such as 45 Magazine and MED Midwest Medical, and speaks nationally on various cybersecurity topics.

Registration Options

Live Access, 30 Days OnDemand Playback, Presenter Materials and Handouts $279

  • Available Upgrades:
    • 12 Months OnDemand Playback + $110
    • 12 Months OnDemand Playback + Digital Download + $140
    • 12 Months OnDemand Playback + CD + $140
    • Additional Live Access + $75 per person
September 15, 2022/by Katie Reiser
https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg 0 0 Katie Reiser https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Katie Reiser2022-09-15 11:09:502022-11-16 14:30:06Anatomy of a Cyber Attack: Ransomware
BSA/AML, Featured Event, Operations, Security, Technology

WBA Secur-I.T. & BSA/AML Conference

BACK AGAIN IN 2022: The 2022 Secur-I.T. Conference is now combined with the annual BSA/AML Conference!

The 2022 WBA Secur-I.T. & BSA/AML Conference will be held on September 20-21 at Glacier Canyon Lodge in Wisconsin Dells. The conference will kick off at 8:30 a.m. on Tuesday and adjourn at Noon on Wednesday.

This annual meeting brings together BSA/AML, Operations, Security and Technology banking professionals from all around the state of Wisconsin for education and networking. Attendees will benefit from over 7 hours of presentations from nationally recognized speakers and local professionals; network with more than 125 banking peers; and meet several exhibitors who offer products and services geared to better your bank’s customer experiences, BSA/AML program, security, and technology. You won’t want to miss this great event!

Registration Information

Banker Registration:

The registration fee of $350/attendee includes conference materials, Tuesday refreshments, lunch and reception; and Wednesday breakfast and refreshments. If your bank brings multiple attendees, each person after the first registrant is $300/attendee.

To receive the published discount, you must register everyone at the same time.

Associate Member Registration: 

The registration fee of $450/attendee includes conference materials, Tuesday refreshments, lunch and reception; and Wednesday breakfast and refreshments.

Refund Policy: A refund, less a $25 administrative fee, is provided for cancellations requested on or before Thursday, September 15, 2022.

Exhibitor Registration:

Exhibit Booths are available for $650 for Associate Members and $1,150 for non-Associate Members. Exhibit booth registrations include one attendee. Additional booth attendees can be registered for $250/attendee. Visit the Information for Exhibitors/Sponsors tab for more information.

June 24, 2022/by Miranda Gustafson
https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg 0 0 Miranda Gustafson https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Miranda Gustafson2022-06-24 09:33:162022-07-11 13:34:02WBA Secur-I.T. & BSA/AML Conference
BSA/AML, Compliance, Risk Management, Technology, Webinar

Three Key Risk Assessments in Your ERM Program: ERM, IT and Internal Controls

The presenter will first conduct a basic review of what is ERM, the three key phases of ERM, and how Risk Assessments fit in. Then the presenter will explain how the Risk Assessment Process works and will specifically focus on three key Risk Assessments you must have as critical components of your ERM Program: the Enterprise Risk Management Risk Assessment, Information Technology Risk Assessment, and the Internal Controls Risk Assessment. You will walk away with practical tools and examples you can implement in your organization immediately.

This webinar is for participants who have a basic foundational knowledge of Enterprise Risk Management and are looking for specific examples on how to complete these three important Risk Assessments. The presenter will focus on how COVID-19 impacted each risk category — including a new COVID-19 Risk Assessment, the consequences, and mitigating and monitoring tools banks can use to mitigate the effects of the Pandemic now and going forward.

Covered Topics
ERM Overview and Key Definitions
Three Key Phases of ERM and how Risk Assessments fit in
The Risk Assessment Process
ERM Risk Assessment– Complete example

Information Technology Risk Assessment
Definitions
Areas Assessed
Categories Included

Internal Controls Risk Assessment
Definitions
Areas Assessed
Categories Included
Internal Controls Risk Assessment – Complete example

Who should attend
This informative session is designed for Risk Managers and Risk Leaders, Chief Risk Officers, Compliance Officers, Chief Operating Officer, Chief Credit Officer, Internal Auditors, and the entire risk management team.

Instructor Bio
Marcia “Marci” Malzahn is the president and founder of Malzahn Strategic, a community financial institution management consultancy focused on strategic planning, enterprise risk management, treasury management, talent management, and EOS’ Implementation.

Malzahn has 30 years of banking experience, ten of those years as the EVP/CFO and COO of a community bank she co-founded where she oversaw all areas of operations. In her last year as EVP/COO/CRO, Malzahn created and focused on the bank’s enterprise risk management program.

Malzahn is the recipient of several professional awards, is a published author of four books, and an international bilingual keynote speaker, speaking frequently at banking and credit union conferences and associations as well as leadership and women’s conferences. As a Certified Virtual Presenter, Malzahn also provides online and onsite training for financial institutions.

Malzahn is a certified life coach, holds a B.A. in business management from Bethel University, and is a graduate of the Graduate School of Banking in Madison, Wisconsin.

Registration Options

  • Live Access, 30 Days OnDemand Playback, Presenter Materials and Handouts – $279
  • Available Upgrades:
    • 12 Months OnDemand Playback + $110
    • 12 Months OnDemand Playback + CD  + $140
    • Additional Live Access + $75 per person
March 4, 2022/by Katie Reiser
https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg 0 0 Katie Reiser https://www.wisbank.com/wp-content/uploads/2021/09/Wisconsin-Bankers-Association-logo.svg Katie Reiser2022-03-04 10:57:362023-01-24 10:06:50Three Key Risk Assessments in Your ERM Program: ERM, IT and Internal Controls
Page 1 of 212

Categories

  • Advocacy
  • Community
  • Compliance
  • Credit Unions
  • Education
  • Member News
  • News
  • Products
  • Resources
  • Uncategorized

Recent Posts

  • Bailey Promoted to Vice President and Director
  • Community State Bank Announces 2023 Promotions
  • Announcing the 2023 Bank Executives Conference
  • From The Fields: Rising Interest Rates and Their Effect on Production Agriculture
  • Wolf River Community Bank Announces Promotions to Executive Team

Archives

  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • November 2019
  • October 2019
  • September 2019
  • July 2019
  • May 2019
  • April 2019
  • March 2019
  • November 2018
  • September 2018
  • August 2018
  • June 2018
  • April 2018
  • March 2018
  • January 2018
  • November 2017
  • October 2017
  • September 2017
  • May 2017
  • December 2016
  • November 2016
  • August 2016
WBA logo
  • About
  • Community
  • Subsidiaries
  • Staff

questions@wisbank.com

608-441-1200

4721 S Biltmore Ln.
Madison, WI 53718

Get our Newsletter!
Subscribe

© 2023 Wisconsin Bankers Association. All rights reserved. | Website Design by Bizzy Bizzy
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OKLearn more×

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Terms of Use
Accept settingsHide notification only

Subscribe

* indicates required








Membership