Plotting Your Course: Operationalizing an Enterprise Approach to Fighting Fraud

In previous posts, I have shared links to webinars I have conducted with our friends at CFO Publishing and CFO.com. In November, we presented another hour-long discussion for CFOs around how to operationalize an enterprise approach to fighting fraud. A replay of that discussion is available for you (at no charge) and I encourage you to invest an hour of your time.

I talked about converging forces are creating a new landscape of fraud risks and the three strategic imperatives we at IBM recommend to counter fraud.

In addition to presenting our counter fraud point of view, I made the case as to why counter fraud challenges are significant enough to require strong senior leadership to address at an enterprise level…and why the CFO is the one best positioned to tackle and ‘own’ this business problem.

The balance of the webinar was spent on the steps CFOs can initiate to start of this journey of countering fraud across four dimensions: detect, respond, discover, and investigate.


To gain easy access to the CFO.com recorded webinar, Plotting Your Course: Operationalizing an Enterprise Approach to Fighting Fraud, click here. I also encourage you to listen to two other recorded webinars we conducted with CFO Publishing earlier this year: The True Cost of Fraud and Using Advanced Analytics to Counter Fraud in a Big Data World. I know you will take a good deal away from those complimentary sessions, as well.

I look forward to hearing your examples of how you are operationalizing an enterprise approach to fighting fraud. This will continue to be a major focus area for CFOs and there are many approaches that can be taken based on an organization’s business, strategy, industry, and specific pain points.

More stories

The benefits of automation you didn’t see coming

Automation pays out, and relatively quickly too. But some of the benefits come from less obvious places. The recent Forrester Total Economic Impact study looked at the impact — costs and benefits — of automation in the world of application management, based on in-depth interviews with IBM clients. For many organizations, the catalyst for considering […]

Continue reading

GDPR and protecting data privacy with cryptographic pseudonyms

Within two years, most of today’s cybersecurity technologies will be obsolete. Since the beginning of 2016, hackers have stolen more than 8 billion records — more than double the two previous years combined — and that doesn’t account for unreported intrusions. The current system of patches, firewalls and blacklists isn’t working. It’s no match for […]

Continue reading

The progress of automation in the financial services industry

Working across a range of industries as I do, I’m always interested to get the perspective of a peer group on the way automation is impacting their own particular industry. So when I gave the keynote speech at the recent Millennium Alliance FSI event in Palm Beach, FL, I relished the opportunity to meet with […]

Continue reading