Free Essay

The Risks of Not Investing Into Cybersecurity

In:

Submitted By jmdacd
Words 1992
Pages 8
The Risks of NOT Investing into CyberSecurity

In 2002, preparations were being made for me to transition from the Navy to civilian life. I wanted to start a career in the IT field, and, unfortunately, the Navy wasn’t capable of providing me that opportunity. At the time though, careers in the IT field were still uncommon and considered overhead to corporations. After realizing this, I had decided to stay in the Navy since I hadn’t acquired the necessary education or experience to be competitive in the IT market yet. Over 10 years ago, IT and Cybersecurity were not considered to be as worthwhile a career field to pursue. Today, the financial industry is learning just how valuable cybersecurity is, and according to an article, Friedenberg remarks that, “Companies, on average, spend 1,600 work hours per incident at a cost of $40,000 to $92,000 per victim” (2006). In an effort to compromise the confidentiality, integrity, and availability of the financial institutions, cyber terrorists have taken an active role declaring war on one of our nation's critical key infrastructure. There are major risks in the financial industry that are causing the institutions to invest more into the protection of their assets which are in jeopardy of compromise every time a cyber attack occurs. Consumers want to know that their money is protected when they put in a financial institution. The personal information that consumers are required to present, for instance Name, Date of Birth, account number, in order so they can withdraw money needs to be safeguarded. According to Servidio and Taylor in their article about safeguarding community banks, “many small and medium-size banks lack the resources they need to fight cyber attacks” (2015). Countering terrorism and protecting human rights may provide contradictory results. Mass government surveillance and enhanced airport security resulted from the 9/11 terrorist attacks in an effort to prevent such an attack from taking place again. In a an attempt to implement countermeasures that would provide sense of security from terrorism in our nation while protecting our citizen’s rights actually resulted in the opposite in where, citizens felt violated by the new measures implemented. Like many others, I remember 9/11 and felt just as angry and upset over how we had allowed the terrorist attack to happen on our own soil. At that time, I was ready to sacrifice whatever was required to protect our nation from being attacked in that matter again. Unfortunately, the cost was the violation of privacy for many citizens of our nation. It can’t be argued whether it was effective or not, even though this nation has yet to experience another terrorist like 9/11. 9/11 is an example of how the nation reacted when their sense of safety was compromised and demands and inquiries were made by those responsible as to why and how we could prevent that attack in the future. The financial industry is a primary target of cyber terrorism and the cost is the consumer’s identity, their investment in the future and their children’s future. Cyber terrorists exist with many identities; one of them could be yours. Identity theft has many definitions, but I prefer Lynch’s definition which is defined as “the theft for fraudulent purposes of personal information, such as account numbers, social security numbers (SSNs), and other personal identifiers such as a mother's maiden name.” (2005). Through these increasing and sophisticated attacks, the financial industry is losing the trust of consumers through compromise of their personal information. Friedenberg says that, “if you experience a security breach [of customers’ personal information], 20 percent of your affected customer base will no longer do business with you, 40 percent will consider ending the relationship, and 5 percent will be hiring lawyers!” (2006). The cost of a security breach is loss of business, lawsuits, and consumer’s sense of betrayed trust all from a single incident that could of been prevented. My wife and I were victims of identity theft when our bank was attacked, and our personal information was acquired by the attackers. The thought of what our personal information could be used for was a frightening and sobering realization that anyone was vulnerable and there was much that could be done to have prevented it. Brody, Mulig, and Kimaball recommend that “creating awareness is one of the most important tools in fighting identity theft” (2007). Financial institutions have become better about notifying the consumers of fraud alerts and email phishing which is providing consumers the awareness necessary to protect against these type of cyber attacks. Smaller community financial institutions are struggling to keep up with the larger institutions in protecting their consumer’s assets. In many cases, as a result of not being able to appropriately implement countermeasures, the smaller institutions could be targeted more often and easily. Servidio and Taylor make a valid point that “given the close relationships a community bank has with its customers, a major data privacy breach or cyber incident could damage the local community and impact the safety and soundness of the bank.” (2015). The local banks provide a sense of community in the local areas and the cyber attacks have the capability to jeopardize that close relationship. Additionally, for a cyber terrorist or hacker, the lowest hanging fruit and most accessible are the Automated Teller Machines (ATMs). ATM frauds, for instance deposit and check, are common in the US and tend to happen at local banks. Banks have a practice of crediting and allowing withdraws against the deposit prior to manual reconciliation and verification. The attacks on the smaller financial institutions could possibly lead to strategic assaults on other financial institutions, since there is the danger of communication when processing transfer of funds between two banks. The bank that was initially attacked was used as a patsy in order to gain access to the actual targeted bank; allowing the attacker to achieve it’s goal of more theft and possible destruction. A course of action that could be utilized in an effort to proper prepare and defend against cyber attacks would be the development and implementation of what Gardner calls in his terms, “Enterprise Risk Architecture” (2015). Gardner goes on to define this this Enterprise Risk Architecture as a “body of work” that “guides organizations through the capture and documentation of their IT, processes, information flows, and dependencies and is used with sophisticated IT vulnerability analyses.” (2015). A report that is produced on the potential risks of the IT systems and scenarios of how the attackers could exploit and captures the data in their bank. The report can be the visual aid to assist the community bank in identifying and implementing the appropriate safeguards to protect their consumer’s assets and personal information. It will require a team effort to prevent and defend the financial industry from cyber attacks. Gardner suggests that there are many affordable actions that address the cyber threat. Activities such as employee training, diligent password management, timely patch management (routinely installing and testing software updates and fixes), and cyber incident drills could eliminate 70% or more of cyber risk and its consequences. (2015). Currently, the Federal Financial Institutions Examination Council (FFEIC) has developed a cybersecurity tool that has the capability to assess the risk factor of financial institutions and "to help management and directors of financial institutions understand supervisory expectations, increase awareness of cybersecurity risks, and assess and mitigate the risks facing these institutions,” (NEW TOOL ASSESSES BANKS' CYBERSECURITY READINESS, 2015). However, the responsibility of preventing the cyber attacks doesn't necessarily fall on the institution, but it falls on all including the consumers. The financial data compromise due to the cyber attack is unfortunate loss and none feel it more than the consumers who trusted their data to the institution. Brody, Mulig, and Kimball state a valid point when they express the necessity of, “Financial institutions and consumers need to work together to prevent future occurrences” (2007). The sophistication of the attacks to steal personal information make it difficult for a machine or piece of software to detect every incident, but it also requires that consumer educate themselves in order to discern what is a scam and what is genuine. Prevention of cyber attacks against the financial industry has to be an objective of both the institution and the consumers. There are capabilities that exist in the identification and to mitigation of countermeasures to risks that are present in the financial industry. The investment in cybersecurity will certainly bring risk, but the lack of investment will only continue to harm the financial industry and consumers. Trope makes the comment about the integration of technology and the unexpected risks with the following statement, “adoption of digital technologies has come with what has proven to be a gross underestimation of the risk of cyberattacks, the undiminished vulnerability to such attacks, and the growing extent of damage they can inflict”. My interpretation of what Trope is stating is that introduction of technology may provide a convenience to the consumer, such as accessing your bank account from the internet, will unfortunately introduce avenues for the cyber terrorist or “hacker”to potentially attack and steal the consumer’s personal information or assets. The ultimate goal lies in developing a cybersecurity framework that supports business processes. Such a framework will require a new security mindset and changes to processes such as risk management and risk mitigation. This will produce a stronger cybersecurity framework and more efficient regulations that promote a trust between financial institutions and their clients. (Mohammed, 2015). As newer technologies and conveniences are introduced, such as apple pay and google pay, which take advantage of wireless technologies, hackers will see this as an opportunity to attack. As consumers, we still need to educate ourselves as to what the new technologies are and how they could be used as an opportunity to steal our personal data. There is no set and forget countermeasure or framework either. A constant refresh and review quarterly to annually of policies, frameworks and implemented countermeasures will still need to be conducted.

References

Brody, R. G., Mulig, E., & Kimball, V. (2007). PHISHING, PHARMING AND IDENTITY THEFT. Academy Of Accounting & Financial Studies Journal, 11(3), 43-56. Retrieved from http://ezprox y.umuc.edu/login?url=http://search.ebscohost.com/login.aspx? direct=true&db=bth&AN=89147589&site=eds-live&scope=site

Gardner, R. K. (2015). CYBER RISK THROUGH THE COMMUNITY BANK LENS: ADDRESSING ISSUES NOW BEFORE IT'S TOO LATE. The RMA Journal, 98(3), 66-69,13. Retrieved from http://ezprox y.umuc.edu/login?url=http://search.proquest.com.ezproxy.umuc.edu/docview/ 1756060642?accountid=14580

Lynch, J. (2005). IDENTITY THEFT IN CYBERSPACE: CRIME CONTROL METHODS AND THEIR EFFECTIVENESS IN COMBATING PHISHING ATTACKS. Berkeley Technology Law Journal, 20(1), 259-300. Re trieved from http://ezproxy.umuc.edu/login? url=direct=true&db=iih&AN=16940518&site=eds-live&scope=site

Mohammed, D. (2015). Cybersecurity Compliance in the Financial Sector. Journal Of Internet Banking & Commerce, 20(1), 1-11. Retrieved from http://ezproxy.umuc.edu/login? url=http://search.ebscohost.com/login.aspx? direct=true&db=iih&AN=110209808&site=eds-live&scope=site

NEW TOOL ASSESSES BANKS' CYBERSECURITY READINESS. (2015). The RMA Journal, 98(3), 60-65. Retrieved from http://ezproxy.umuc.edu/login?url=http://search.proquest.com.ezprox y.umuc.edu/docview/1756060824?accountid=14580

SERVIDIO, J. S., & TAYLOR, R. D. (2015). Safe and Sound: Cybersecurity for Community Banks. Journal Of Taxation & Regulation Of Financial Institutions, 28(4), 5-14. Retrieved from http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx? direct=true&db=bth&AN=102071237&site=eds-live&scope=site

Trope, R. L., & Hantover, L. L. (2014). In the Wake of Cyber Damage: Significant Decisions in Cybersecurity 2013-2014. Business Lawyer, 70(1), 223-230. Retrieved from http:// ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx? direct=true&db=bth&AN=100670067&site=eds-live&scope=site

Similar Documents

Premium Essay

Cybercrime Law, Regulation, Effects on Innovation

...Cybercrime Law, Regulation, Effects on Innovation Human Aspects in Cybersecurity: Ethics, Legal Issues, and Psychology CSEC 620 9024 Summer Semester May 18, 2015 Table of Contents Introduction 1 The Role of the Government in Protecting National Security 1 Acceptance of Government Intervention on Protecting National Security 2 Reaction to the Security Intervention on the Private Sector 3 Impacts/Effects of Government Regulations to Private Industries 4 Compliance Measures to Protect National Security 5 Responsibility to Protect National Security 5 Conclusion 6 Introduction Government has the responsibility to protect its national security and citizen. This could be done by providing policies and procedural guidance to private industries. This relationship between government and private industry are not conflict immune as the balance between protecting the national interest and invading privacy is in question. Senior management from the private industry caught in between making the right decision to protect their customer or investing in cyber security. This research paper covers the impact of government regulations, security laws, and legal concepts on the private sector to protect national security and its interpretation and acceptance by the public. The Role of the Government in Protecting National Security The US government invested a lot to protect its critical infrastructure from cyberattack by creating and implementing policies...

Words: 1899 - Pages: 8

Premium Essay

Private and Public Sector Cyber Security Needs

...Private and Public Sector Cybersecurity Needs George Gritten Table of Contents Executive Summary 3 Introduction 4 The Current State of Cybersecurity 4 The Evolution of Cybersecurity 7 Moving Towards a More Secure Tomorrow 9 Conclusion 10 References 11 Executive Summary Today’s world is quickly evolving into a world that relies solely on technology as a way to do business and communicate. With this move towards a technology-centered society, both public and private sectors have to keep up with and evolve just as quickly, while trying to be proactive when it comes to security. The world today is not as safe as it once was, and as it changes to a more paperless, technological-based society, access to information is becoming increasingly accessible. With this, cyber-attacks and security breaches have become a significant risk of doing business. As hackers, botnets, and various other cyber-based threats have become progressively more malicious and continue to attack organizations and governments alike, a prevailing question is how to unite the public and private sectors so that they can evolve to defend against that which they cannot see. Introduction Today's reality is rapidly advancing into a world that depends exclusively on technology as an approach to work together and connect. With this move towards a technology-focused culture, both government and private sectors are needing to stay aware of and develop almost as fast, while attempting to be proactive...

Words: 2198 - Pages: 9

Premium Essay

Cs Is Not Free

...Forward for Cybersecurity Research Stefan Savage UC San Diego Fred B. Schneider Cornell University Version 4: February 3, 2009 Computers at Risk , a 1991 report by the Computer Science & Telecommunications Board of the National Research Council begins: We are at risk. Increasingly, America depends on computers. They control power delivery, communications, aviation, and financial services. They are used to store vital information, from medical records to business plans to criminal records. Although we trust them, they are vulnerable—to the effects of poor design and insufficient quality control, to accident, and perhaps more alarmingly, to deliberate attack. The modern thief can steal more with a computer than with a gun. Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb. When these words were written, the first web browsers were still on the drawing board and the Internet was a place for high-tech aficionados. How far we have come! Today, our dependence on inter-networked computing systems means that virtually every walk of American life—whether personal or commercial, public or private, civilian or military—is intermediated by computer systems. But virtually none of these systems are trustworthy; all are subject to attack; in fact, many are actively under attack today. It is 2009 and we very much remain a nation at risk. Moreover, we are embarking on a trajectory that will only put us further at risk as we...

Words: 2849 - Pages: 12

Premium Essay

Cybersecurity

...restricted by geographical boundaries these threats target all technologies, service providers, and consumers. The threats are at an all-time high, in terms of sophistication and volume, and continue to trend upwards. WHAT IS CYBERSECURITY? Twenty years ago businesses did not think twice about cyber security. In a world of mainframes and dumb terminals with no connectivity to anything outside, viruses, malware, and hacking was unheard of, however, with the introduction of the Internet things have now changed. The term cyber security is getting more and more mixed usage lately, so much so that it is almost as ambiguous as the term "cloud". Cyber security, referred to as information technology security, is the focus on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Cyber security also encompasses ten different security domains. The following domains provide a foundation for security practices and principles: • Access Control - to maintain information confidentiality, integrity, and availability, it is important to control access to information. Access controls prevent unauthorized users from retrieving, using, or altering information. They are determined by an organization's risks, threats, and vulnerabilities. • Telecommunications and Network Security - Telecommunication and Network Security is one of the most technical of the domains, because it addresses the various structures for a network, methods...

Words: 1611 - Pages: 7

Premium Essay

Challenges Facing the Finance Industry

...Challenges Facing the Finance Industry This paper will explore three problems facing the finance industry. Those problems include cybersecurity, compliance with regulation, and risk management. Three solutions will also be addressed later in this paper. 1 When one thinks about the finance industry, banks, credit agencies, insurance companies, and equity firms may come to mind. Over the years financial institutions have not been up to par. With the financial crisis that happened in 2008, the world is still recovering and paying high taxes for the amount of debt that it acquired. As a result of that crisis, the financial industry faces challenges that include cybersecurity, complying with regulation, and risk management. Although the industry faces these challenges, there are solutions that can make things operate smoother. One of the finance industries biggest challenge this year is cybersecurity. According to Hewitt, “The potential hacking of sensitive customer information is a top threat facing the financial industry in 2014.” Technology is vastly changing, and more people are beginning to use different softwares to handle the financial side of the business. With technology evolving, hackers are getting more experienced, and cyber-attacks are beginning to occur more frequently and more wide spread than they have been in the past. According to Rodriguez, “As the cost of technology decreases, the barriers to entry for cybercrime drop, making it easier...

Words: 2377 - Pages: 10

Free Essay

Cyber Warfare

...September 9, 2012 A New Kind of Warfare Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals and foreign governments, mainly China. Increasingly, however, the focus is on developing offensive capabilities, on figuring out how and when the United States might unleash its own malware to disrupt an adversary’s networks. That is potentially dangerous territory. Such malware is believed to have little deterrent value against criminals who use computers to steal money from banks or spies who pilfer industrial secrets. But faced with rising intrusions against computers that run America’s military systems and its essential infrastructure — its power grid, for instance, and its telecommunications networks — the military here (and elsewhere) sees disruptive software as an essential new tool of war. According to a study by the Center for Strategic and International Studies, the 15 countries with the biggest military budgets are all investing in offensive cyber capabilities. The latest step occurred last month when the United States sent out bids for technologies “to destroy, deny, degrade, disrupt, corrupt or usurp” an adversary’s attempt to use cyberspace for advantage. The Air Force asked for proposals to plan for and manage cyberwarfare, including the ability to launch superfast computer attacks and withstand retaliation. The United States, China, Russia, Britain and Israel began developing basic cyberattack...

Words: 492 - Pages: 2

Free Essay

Cybersecurity

...Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 February 2012 Authors’ Note F or the last year, the John L. Thornton China Center and the 21st Century Defense Initiative at Brookings have convened a working group on cybersecurity and U.S.-China relations, which the two authors organized and co-chaired. The research was motivated by our sense that: 1) the many policy issues involved in cybersecurity, especially in its impact on foreign relations, were already significant and would grow rapidly in importance in the coming years; 2) that such issues, if not well managed, could provide a major source of international friction, especially in U.S.-China relations; and 3) the newness of the field added a particularly complicating factor, making cybersecurity one of the most important but least understood emerging flashpoints in global security. A key aspect of the effort was to convene several dozen knowledgeable Americans from both the private and public sector, including the civilian government, military, corporate, think tank, and university communities. With such dynamic and fast-changing events playing out, the Brookings project not only sought to study the key issues in cybersecurity and how they impact U.S.-China relations, but also to break down some of the organizational and bureaucratic stovepipes that have limited...

Words: 17963 - Pages: 72

Premium Essay

Annual Report Paper

...Annual Report Project on Northrop Grumman Corporation (NOC) Fiscal year 2012 Accounting 100 Abstract An annual report which is also called a 10k report contains many useful informational items for its investors and stakeholders. It provides a synopsis of what the business is about, the risk factors, financial statements, auditor reports, summary of financial data, and other corporate information. This information can help investors determine if it’s worth investing in the company. For the purpose of looking further into an annual report I have chosen Northrop Grumman’s (NOC) Fiscal Year 2012 10k report. I will review the major areas of the annual report and discuss the assets and liabilities. Also I will discuss how the performance of the company was in 2012. I will also review the internal controls of the company. The 10k report for Northrop Grumman starts with the cover letter of “United States Securities and Exchange Commission” followed by the Table of Contents. Though we will not pick through every topic discussed in the annual report we will discuss the few points listed in the abstract. Historical information is very critical in order to see the success of the company. The business section clearly describes what Northrop Grumman’s business is about. It also states how the company started and has grown by acquiring more companies. The current sectors of the company are also listed in the annual report as well as each sectors business and responsibilities...

Words: 1685 - Pages: 7

Premium Essay

I Am an Online Writer

...Effects of Cybercrime Name: Course: Course code: Tutor: Date: Effects of Cybercrime Introduction According to Brenner, Cybercrime, commonly known as e-crime/computer crime, is a criminal act whereby computer or computer networks serves as a target, location, means or as the source of the activity. Its scope covers all the criminal activities revolving around the computer. Such malicious activities include identity theft, web site defacement, financial fraud, and cyber bullying. In an organization, computer crimes involve hacking customer databases as well as stealing of intellectual property. Usually, computer users think that they can protect themselves, their personal computers and their accounts by using antivirus software or anti-spyware, but this is not always the case. E-crimes are very sophisticated and target consumers, public and private institutions (Wall). Computer crimes range from outside parties hacking the computer networks and phish in malicious programs that give users a deceitful sense of security, instigating them to disclose vital information. Some of the effects of cybercrimes are: Loss of intellectual property The greatest effect of cybercrime is the loss of intellectual property as well as confidential information of the business. However, it is not easy to determine the exactly the extent of the losses. Partially, cybercrime is not a zero-game because the stolen information is not fully gone. Infiltrators steal only the company plans including the customer...

Words: 1354 - Pages: 6

Free Essay

Frm Study Guide

...2016 FRM Exam Study Guide ® The designation recognized by risk management professionals worldwide 2016 Financial Risk Manager (FRM®) Exam Study Guide TOPIC OUTLINE, READINGS, able to deal with them effectively. As TEST WEIGHTINGS such, the Exams are comprehensive in The Study Guide sets forth primary nature, testing a candidate on a number topics and subtopics covered in the FRM of risk management concepts and Exam Part I and Part II. The topics were approaches. selected by the FRM Committee as ones that risk managers who work in practice today have to master. The topics and READINGS Questions for the FRM Exams are related their respective weightings are reviewed to and supported by the readings listed yearly to ensure the Exams are timely under each topic outline. These readings and relevant. The study Guide also were selected by the FRM Committee contains a full listing of all the readings to assist candidates in their review of that are recommended as preparation the subjects covered by the Exams. It is for the FRM Exam Part I and Part II. strongly suggested that candidates review Key concepts (knowledge points) these readings in depth prior to sitting for appear as bullet points at the beginning each exam. All of the readings listed in the of each section and are intended to help FRM Study guide are available through candidates identify the major themes GARP. Further...

Words: 4160 - Pages: 17

Premium Essay

Management Information System

...1. In decision making process focusing only on technology will give companies a very narrow perspective, as technology is only one of the variables in the equation. While Technology can be a great and helpful tool in decision and judgment making and it can empower people by increasing their abilities, on its own doesn’t add any value. IT can produce significant strategic and competitive advantage only if it is used effectively, therefore it needs to be managed by highly motivated people. Every company needs to make decisions how to position itself in the market and how to create unique mix of values in order to successfully compete. Therefore, it is crucial to understand the industry structure and strategic positioning of the firm in terms of its portfolio products and services, looking only through the technology lenses could be misleading and incomprehensive. Also, organizations need to constantly research the market and recognize customer needs, so that they can deliver new products by utilizing technology and applying their knowledge. Strong understanding of industry structure and strategic positioning of the firm, allow organizations make necessary modification and adjustment to its business model. Moreover, new entrants wouldn’t be able to outperform industry giants by employing only technological resources. What drive these small startups upmarket are passionate and creative people, who are obsessed with winning. Moreover, Technology can be standardized and imitated,...

Words: 4899 - Pages: 20

Free Essay

Home Depot Data Breach

...Home Depot Data Breach Background on the 2014 Home Depot Data Breach Home depot was the target of a cyberattack on their information system infrastructure that lasted from April of 2014 to September of 2014. As a result of the attack and following data breach, 56 million credit-card accounts and 53 million email addresses were stolen. (“Home Depot Hackers Exposed 53 Million Email Addresses”) The cyberattack involved several steps. First, the attackers gained third party credentials allowing them into the system. Next they exploited an unknown weakness in the system that allowed for the attackers to elevate their own access privileges. Finally, they installed malware on Home Depot’s self-checkout systems in the U.S. and Canada, allowing for the data to be stolen. Because this was a multistage attack, there were several stages of failures. While this shows that there were multiple lines of defense, the fact that there were multiple failures as well is a large issue. It demonstrations that even with multiple lines of defense Home Depot was still not adequately protected. The first failure was that the attackers acquired credentials from a third party vendor. This may not have been Home Depot’s fault directly, but there are still governance processes they could’ve employed to prevent it. Once the attackers were in the system they exploited yet another vulnerability that allowed themselves to elevate their access rights. The third vulnerability that was exploited was the lack of...

Words: 2954 - Pages: 12

Premium Essay

Ordina

...2014 Siwar Chihi, Bas Geelen, Konstantin Kraft & Ines Garic Zuyd University of Applied Sciences 2014 Siwar Chihi, Bas Geelen, Konstantin Kraft & Ines Garic Zuyd University of Applied Sciences Table of contents 1.1 Introduction to the research 3 1.2 Problem statement 3 Current 3 Desired 4 Gap 4 1.3 Methodology 5 1.4 Justification of methods 9 Research design 9 Research method 10 Research format 10 Research technique 10 2.1 Ethics 13 Data protection U.S. banks 15 Banks cash in on big data 16 Privacy vs. Security 17 Predicting with privacy 18 Privacy selling 19 Contrast between consumers privacy expectation versus their own online behavior 20 Expectations for growth internet users 2025 20 2.2Technology 22 Online banking approaches by different banks 22 SaaS business models 23 Why cloud computing for banks? 24 Privacy Trends 2014 – privacy trends in the age of technology 25 In-memory computing 27 2.3 Legislation 30 Europe Union 30 2.4 Future 31 Out in the open 31 Future sharing of finances 32 Changing Online ignorance 34 Cyber security trends for financial services 34 2.4 Results in-depth interviews 36 3.1 Basic needs 38 3.2 Drivers of change 39 3.3 Emerging consumer expectations 41 3.4 Inspiration 43 Target 43 Innovation by other banks 44 Luth Research 44 4.1 Technology 46 4.2 Changing user behaviors 46 4.3 Inconsistency 47 4.4 Legislation 47 5.1 Value...

Words: 13422 - Pages: 54

Premium Essay

2015-Annualreport-Jpmorganchase

...A N N U A L REPORT 2015 Financial Highlights As of or for the year ended December 31, (in millions, except per share, ratio data and headcount) Reported basis1 Total net revenue Total noninterest expense Pre-provision profit Provision for credit losses Net income Per common share data Net income per share: Basic Diluted Cash dividends declared Book value Tangible book value2 2015 $ $ $ Selected ratios Return on common equity Return on tangible common equity2 Common equity Tier 1 (“CET1”) capital ratio3 Tier 1 capital ratio3 Total capital ratio3 Selected balance sheet data (period-end) Loans Total assets Deposits Total stockholders’ equity Headcount 93,543 59,014 34,529 3,827 24,442 6.05 6.00 1.72 60.46 48.13 2014 $ $ $ 95,112 61,274 33,838 3,139 21,745 5.33 5.29 1.58 56.98 44.60 11% 13 11.6 13.3 14.7 $ 837,299 2,351,698 1,279,715 247,573 234,598 10% 13 10.2 11.4 12.7 $ 757,336 2,572,274 1,363,427 231,727 241,359 Note: 2014 has been revised to reflect the adoption of new accounting guidance related to debt issuance costs and investments in affordable housing projects. For additional information, see Accounting and Reporting Developments and Note 1 on pages 170 and 183, respectively. 1 Results are presented in accordance with accounting principles generally accepted in the United States of America (U.S. GAAP), except where otherwise noted. 2 Non-GAAP financial measure. For further discussion, see “Explanation and Reconciliation of the Firm’s Use Of Non-GAAP ...

Words: 207037 - Pages: 829

Premium Essay

Disney

...in The New York Times, analyzed in Wall Street reports, and e-mailed around the world. But without such a dramatic and reckless title, I doubt the article would have been much noticed. It’s a sloppy mix of ersatz history, conventional wisdom, moderate insight, and unsupportable assertions. And it is dangerously wrong. Author Nicholas Carr’s main point is that information technology is nothing more than the infrastructure of modern business, similar to railroads, electricity, or the internal combustion engineering advances that have become too commonplace for any company to wangle a strategic advantage from them. Once-innovative applications of information technology have now become merely a necessary cost. Thus Carr thinks today’s main risk is not underusing IT but overspending on it. But before we get any further, let’s have a reality check. First, ask Jeff Immelt, the CEO of General Electric Co., one of the premier business corporations in the world, this question: “How important is information technology to GE?” Here’s his answer: “It’s a business...

Words: 4492 - Pages: 18