AICM Webinar: Information Security for Credit Managers PowerPoint Slides

Page 1


Information Security

For Credit Managers

We help customers…

Onboard customers quickly

Online credit applications

Automated credit decisioning

Ensure timely payment

Debtor Risk Insights

Automated Collections

Debtor Management solution for Small Businesses

Make informed decisions and minimise risk

Credit Risk Insights Credit Reports (AU & International) Third party financial risk assessments AML/CTF Compliance Reports

Keep up-to-date with customer changes and risks

Monitoring & Alerts Portfolio Health Check

Custom RiskScore

Our Unique Data

We set ourselves apart by providing unique data not accessible anywhere else. In total, you will have access to over 50 public and private data sources to inform your risk decisions better.

1

2

3 Credit Applications Fraud Protecting your company’s reputation

Information Security

Acquisition - Credit Application

Some important questions to ask yourself:

• What are we doing with the data?

• Why do we want this data?

• Is there a different way?

Acquisition – Identity Documentation

Key questions to ask:

• Why do I need this information?

• How long should I keep this information?

• Are there certain parts I can destroy immediately?

Fraud - Costs

My margins are too small. I can’t afford this.

• Alternatives such as email and SMS verification

• Video recording

• Zoom/Team call verification

Acquisition - Credit Cards

Key questions to ask:

• Why do I need this information?

• How long should I keep this information?

Acquisition – Financial Documents

Move away from bank statements

• Consumer Data Rights

• Financial Risk Assessments

Acquisition – Processes

Technology changes isn’t the only option!

• Cash on Delivery

• Segment your customers

• Change processes

Review your internal processes to see if there are other ways to limit data collecting data

Protecting your company’s reputation

RULE #1

Storage

Know where data is being stored

• Classify data

• Audit Trails

• Vendor Security Check

Usage

Which employees have access?

• Audit Trails

• Least Privileged Access

• Prevent bulk downloads

Deletion

Delete delete delete

• Remove PII

• Review usefulness

• Review Vendor Policies

Impact

• Average data breach cost AUD$6 million

• Fines > $50 million

• Employee devices are the weakest link

Cyber incident breakdown

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.