CONTINUE TO SITE »
or wait 15 seconds

Blog

Five FFIEC compliance tips for banks

December 28, 2011 by Robert Siciliano — speaker, IDTheftSecurity.com

Experian's Chris Ryan addressed five major questions about compliance with the Federal Financial Institutions Examination Council's recent guidance on banking authentication. What follows are his responses, summarized:

What does "layered security" actually mean?

Layered security refers to the arrangement of fraud tools in a sequential fashion. A layered approach starts with the most simple, benign and unobtrusive methods of authentication and progresses toward more stringent controls as the activity unfolds and the risk increases.

What does "multi-factor" authentication actually mean?

A simple example of multi-factor authentication is the use of a debit card at an ATM machine. The plastic debit card is an item that you must physically possess to withdraw cash, but the transaction also requires the PIN number to complete the transaction. The card is one factor, the PIN is a second. The two combine to deliver a multi-factor authentication.

Who does this guidance affect? And does it affect each type of credit grantor/ lender differently?

The guidance pertains to all financial institutions in the U.S. that fall under the FFIEC's influence. While the guidance specifically mentions authenticating in an online environment, it's clear that the overall approach advocated by the FFIEC applies to authentication in any environment.

What will the regulation do to help mitigate fraud risk in the near-term and long-term?

The guidance is an important reinforcement of several critical ideas: Fraud losses undermine faith in our financial system. Fraud tactics evolve constantly and the tools that combat them have to evolve as well. The guidance provides a perspective on why it is important to be able to understand the risk and to respond accordingly.

How are organizations responding?

Experian estimates that less than half of the institutions impacted by this guidance are prepared for the examinations. Many of the fraud tools in the marketplace, particularly those that are used to authenticate individuals, were deployed as point-solutions. Few support the need for a feedback loop to identify vulnerabilities, or the ability to employ a risk-based, layered approach that the guidance is seeking.

Robert Siciliano is a personal security expert and blogs regularly for ATMmarketplace.com. Visit his site at www.robertsiciliano.com.

About Robert Siciliano

None

Connect with Robert:

Related Media




©2025 Networld Media Group, LLC. All rights reserved.
b'S1-NEW'