Bank Security through the Years
Without regard to dating myself, I started in bank security in 1987, after ten years as a police officer. As you can imagine,I have seen many technological and strategic changes through the years, but at the end of the day,the objectives remain the same. Those objectives are the protection of customers, employees, property, and the prevention of economic losses associated with fraud and other related crimes. On the physical security side of this, there have been significant changes over the last 30 years or so,concerning video surveillance, alarms and access control. For instance, in the old days, if we needed video surveillance footage, we would ask the bank office to interoffice the VHS tape and we would hope we could find a grainy black and white image of a suspect. Today, of course, we have access to a local or cloud-based video program for immediate retrieval of crisp, colorful images. Access control and alarms are enterprise wide systems controlled from afar. No old key boxes and bulky key rings. There is ongoing development of biometric access solutions and suspect identification through facial recognition. Instead of “phone call trees,” there are blast messaging emergency communication programs.
In terms of bank fraud, the landscape has changed dramatically since the 1980s. In the old days, it was primarily check fraud. In the 1990s, counterfeit credit and debit card fraud began to take root and the losses were significant. We formed task forces comprised of bank fraud investigators and law enforcement, and coordinated investigations in hope of identifying and prosecuting fraud ringleaders. Banks had multitudes of fraud investigators and their primary mission was trying to recover fraud losses and prosecute suspects.
Clearly, as the result of massive data breaches through the last few years, all customer personal information can be assumed to be floating out in the badlands
Today, the financial services industry is “all in” with prevention tactics, not just recovery and prosecution. Gone are the multitudes of fraud investigators. Their replacement is a throng of analysts reviewing thousands of daily fraud alerts generated from complex fraud detection programs. These programs are analyzing sophisticated, mostly behavioral–based algorithms, designed to detect fraud early, thus negating or mitigating a fraud loss. It is a strategic change that is considerably more impactful to the bottom-line than chasing the bad guys. Of course, law enforcement is still tracking fraud by their own sophisticated data and intelligence collection in an effort to identify and prosecute key perpetrators. Now, most of the fraud challenges relate to cyber threats in the form of phishing, email compromise, and ransom ware, which result in various fraud incidents. Clearly, as the result of massive data breaches through the last few years, all customer personal information can be assumed to be floating out in the badlands.
My successors would have grown up, so to speak, in the realm of hi-tech physical security and fraud prevention methods. These sophisticated approaches, rightly, will be the most productive strategies going forward. I wish the next generation’s fraud fighters the best in continuing to utilize and develop more sophisticated and savvy programs and tools to protect their institutions.
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sergey Cherkasov, CIO, PhosAgro
By Pascal Becotte, MD-Global Supply Chain Practice for the...
By Stephen Caulfield, Executive Director, Global Field...
By Shamim Mohammad, SVP & CIO, CarMax
By Ronald Seymore, Managing Director, Enterprise Performance...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
By Jim Whitehurst, CEO, Red Hat
By Clark Golestani, EVP and CIO, Merck
By Scott Craig, Vice President of Product Marketing, Lexmark...
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
By Amit Bahree, Executive, Global Technology and Innovation,...
By Greg Tacchetti, CIO, State Auto Insurance