Index
A
- A/B testing
- Accountability
- Accounting
- Achievement, alignment (contrast)
- Actionable insights
- Addresses
- account holders, association
- change process, consideration
- digital address validation, possibility
- existence/number
- repository, national change
- types
- Agile (project management process)
- branch issues
- stakeholder familiarity
- usage, timing
- AirBnB
- AirDC
- Algorithm-based technology
- Alignment, achievement (contrast)
- AlphaRank
- Amazon Echo/Alexa
- Amazon Web Services (AWS)
- AML checks
- Analytics, types
- Apocalypse
- risk
- staffing
- Apple Pay
- Application, engagement
- Application programming interface (API)
- access
- account level security
- business logic
- creation, reason
- documentation
- implementation
- initiation
- steps
- VPN/Web accessibility
- Aramco, DDoS
- Artificial intelligence
- fee
- future
- intelligent augmentation, contrast
- personal assistant
- threat
- usage
- Authentication methods, normalization
- Automated clearing house (ACH)
- charge
- credits
- fraud
- payees, downloading
- processing
B
- Backup fire drills
- Banking
- competitors
- evolution
- Bank processes, flaws
- Bank Security Act (BSA)
- Bennett, Tom
- Best-practice perimeter, enforcement
- Big data
- Billpay
- Bill pay fraud
- Bill pay platform
- Bitcoin
- advantages
- decentralization
- history
- security
- Bitcoin Plan
- Blockchain
- usage
- Botnets
- Bring Your Own Platform (BYOP)
- Budgeting process
- Business continuity
- support
C
- Call center representatives (CSR)
- Cannibalization
- Capabilities, determination
- Capital One, cloud usage
- Career paths
- Castle approach
- Catmulls, Ed
- Centers of Excellence (CoE), team organization
- Change control
- Change, reality
- Chief analytic officer (CAO), role
- Chief digital officer (CDO), impact
- Cloud
- cloud-based email service provider, scaling
- cloud-based system
- control, problem
- data, sharing
- direct expense
- ecosystem
- expense
- fears
- financial cloud
- impact
- players
- products, selection process
- regulatory needs, conforming (problems)
- reliability, absence
- security, absence
- services, leverage
- transition, strategies
- usage
- Cloud services, types
- Code
- creation
- defects, tracking system
- review process
- storage/securing, platform
- Cognitive analysis
- Collaboration
- Communications
- Compensation
- Computers, trainability
- Consumer Financial Protection Bureau (CFPB)
- Consumer privacy, concerns
- Continual improvement
- Contract intelligence
- Control Objectives for Information and Related Technologies (COBIT)
- Conversational commerce
- Corda
- Corporate facility, survivability
- Credit card
- processing
- usage
- Credit risk
- Creditworthiness, determination
- Cross-functional teams, involvement
- Cryptocurrency
- CryptoCurrency revolution
- Cryptonym, provision
- CULedger
- Culture
- breakdowns
- example
- initiation
- innovation, relationship
- issues
- talent, relationship
- technology, relationship
- Current Expected Credit Loss (CECL)
- Customer
- addresses, existence
- composite persona
- login problem
- self-service platform, exposure
- Customer relationship management (CRM) platform, setup
- CU trust
- Cyberattacks
- Cybercriminals, attempts
- Cyber infrastructure attack
- Cyberterrorism
D
- Dark web
- Data
- actionable insights
- analytics
- big data
- collection
- conversion
- deletion
- discipline
- duplication
- ecosystem, truth (authority/source)
- encryption
- engineering
- map, high-level overview
- mapping
- monetization
- money, equivalence
- quality
- sharing
- testing
- usage
- value
- Data center
- problems
- redundancy/fault tolerance, implementation
- Data governance
- committee
- cycle
- group
- Data security
- encryption, relationship
- Data Security Standards (DSS)
- David, Scott
- Department of Defense (DOD)
- Digital active users, proportion
- Digital address validation, possibility
- Digital base, mobile usage
- Digital card, usage
- Digital change
- Digital customers, expense (reduction)
- Digital data, characteristics
- Digital governance
- charter, usage
- committee
- group
- Digital gridlock
- Digital insight/intuition
- Digital marketing
- Digital platforms
- continuity
- features, API support
- Digital products, organizational boundaries
- Digital projects, overseeing
- Digital security
- Digital systems, complexity
- Digital transformation, attempt
- Digital workflow, impact
- Digitization
- Direct deposit, usage
- Disintermediation
- Distributed denial of service (DDoS) attacks
- Distributed ledger
- network, diversity
- technology
- truth, source (creation)
- usage
- Distributed network
- Documentation, importance
- Domain knowledge, accumulation (absence)
- Domain Name Server (DNS)
- Drake, Kirk
- Dress code
- Dropbox
- Drop-offs
- Duhigg, Charles
E
- Employees
- dress code
- evaluations, usage
- recruitment
- training
- Employees, unavailability
- Encryption
- data security, relationship
- ransomware message
- End User License Agreement (EULA)
- Equifax, breach
- Equipment, usage
- E-statements, delivery
- Ethereum
- European MasterCard and Visa (EMV), provision/acceptance
- Evaluations, usage
- Evolutionary technology
- Evolution, inevitability
- Executive organizational chart, sample
F
- Facilities, impact
- Failure
- examples
- results, determination
- Failure tolerability index (FTI)
- Feature paralysis
- Features, change
- FFIEC
- FICO, impact
- Fidor
- Financial cloud
- Financial competitors
- Financial institution (FI)
- blockchain value
- cloud transition
- opportunity
- roles
- Financial revolution
- Financial transaction, blockchain (usage)
- Finnovate
- Firewall problem
- Flexibility, example
- Full-time employee (FTE)
- approval
- cost
G
- Gauthier, Patrick
- General Data Protection Regulation (GDPR)
- Gerstner, Lou
- Google
- requests, processing
- reviews
- Google Compute Engine (GCE)
- Google Home
- Google Photos
- Google Play
- Google TensorFlow
- Google Wallet
- Go-to person, usage
- Gridlock
- breaking
H
- HackerOne
- Hackers
- access
- threat
- Hadoop
- Halligan, Brian
- Historical data
- HOA, payment
- HubSpot
- Human resources
- Hybrid cloud
- Hyperledger Project
I
- Identity
- platform
- system, weaknesses
- Incentives
- Incompetence, tolerance
- Incurred loss
- Information Systems Audit and Control Association (ISACA)
- Information Technology infrastructure, flexibility (capability)
- Information Technology infrastructure Library (ITIL)
- Infrastructure as a Service (IaaS)
- In-house resources, project completion
- In-house staff, usage
- Innocence of Muslims, The
- Innovation
- culture, relationship
- driving
- process
- Innovative culture
- collaboration
- communications
- rewards/evaluations
- steps
- Instant user feedback
- Intelligent augmentation, artificial intelligence (contrast)
- Interchange
- compression
- Internal information security systems, enforcement
- Internal processes, improvement
- Internet of Things (IoT)
- breach
- devices
- gadgets, usage
- Internet passport
- Internet Protocol (IP) addresses
- Internet, shutdown
- Intuit
- iTunes, reviews
K
- Kabbage
- King, Brett
- Kissflow tiles
- Kittlaus, Dag
- Knight, Sarah
- KOBO
- Kordeleski, Kirk
- Kraken
- Kroc, Ray
- KYC
L
- Learning opportunities
- Lending Club
- Lieberman, Joseph
- Location-based data
- Lockbox
- Logins, failure
- Loop
- Lyft
- Lynda.com
M
- Machine learning
- Marketing campaign (implementation), reddit (usage)
- Marketo
- Market segmentation data, device basis
- McDonald's, conception
- Mechanic effect
- Meet-ups
- Merchants, app usage
- Microsoft Azure
- Microsoft Azure Cloud
- Microsoft Cortana
- Microsoft Server
- Microsoft stock price, reduction
- Microsoft Workflow
- Minin, process
- Mint
- Mint Bills
- Mirror-image test system
- Mobile application, feature (absence)
- Mobile loan application tasks/workgroups
- Mobile members, demographics
- Mobilization
- Money, data (equivalence)
- Mortgage bubble
- Moser, Florian (interview)
- Movin
- Mt. Gox
- MuleSoft
- Multifactor authentication (MFA)
- problems
- Musk, Elon
N
- Nakamoto, Satoshi
- National change of address (NCOA), usage
- Natural language processor (NLP)
- Netflix
- transactions
- Network
- diversity
- penetration testing
- Network/server equipment, administration/management
- Nonbanks
- NSA backdoor
O
- Object character recognition (OCR) engines, usage
- OFAC
- process, usage
- Onboarding
- 1Password
- 1 percent rule
- OneDrive
- Online ACH debits, size
- Online services, usage
- Open areas, usage
- Open Identity Exchange (OIX)
- Operation Ababil
- Organizational chart, access
- Organizations
- agility
- cultural considerations/issues
- digital data, characteristics
- digital strategy, design/implementation
- strategic clarity, achievement
- type, determination
- Outside vendors, usage
- Overdraft fee
P
- Payment Card Industry (PCI)
- Payment Services Directive (PSD2)
- PayPal
- People
- consistency, absence
- cost/time overruns
- hiring, goal
- solutions
- strategy
- symptoms
- Permissioned networks
- Personal identification number (PIN)
- implementation
- receipt, absence
- Personally identifiable information (PII)
- Phishing
- Pink Panther effect
- Plan B
- Plan, build, operate paradigms
- Platform as a Service (PaaS)
- Platforms, commonalities
- PMO
- Point of sale (POS) device
- Prescriptive analytics
- Primary financial institution
- Process
- changes
- engineering
- implementation
- management
- Process Street
- Products
- product-based advice
- proposal/integration, review
- Projects
- completion
- distributions
- management
- managers, experience
- phasing ability
- ROI responsibility
- Proof of work
- Public business entity (PBE)
- Public Service Directive 2 (PSD2)
Q
- QA person
- QuickBooks
R
- Ransomware
- Record system
- Recruitment
- Reddit, usage
- Reed, Drummond (interview)
- Regulatory gridlock
- action
- Remote employees (human resource)
- management, problems
- team membership
- Research in Motion (RIM)
- Revolutionary technology
- Rewards
- Ripple
- Risk
- continuum
- identification/avoidance
- plan
- spectrum
- Rocket Mortgage (Intuit)
- ROKU
- Rollback plans
S
- Sales culture, defining
- Samsung Pay
- Sandbox
- Scenario planning
- Schedule approval
- Security
- battle
- importance
- innovation process
- issues
- review
- Service Organization Controls (SOC
- Services, change
- Services organization, API initiation
- Shamoon (virus)
- Shared distributed ledger
- SharePoint effect
- Silk Road
- Sinek, Simon
- Single-sale revenue growth
- Siri
- Smart contract
- Software
- build/buy, contrast
- depreciation
- Software A&G
- Software as a Service (SaaS)
- Solutions, failure process
- Sovereign digital identity
- Sovereign identity
- practice
- Sovrin
- SpaceX
- Sprints
- SSL certificate
- Staff cuts, cloud (impact)
- Stakeholders, availability
- Stand-up meeting
- Sticky product
- Stored value transactions
- Storytelling
- Strategy, defining
- Stress testing
- Subject matter experts (SMEs)
- SWIFT payment services
- System Development Life Cycle (SDLC) Program
T
- Talent, culture (relationship)
- Target, advertising flyer
- Task management tools
- Teammates, usage
- Team organization
- Technical employees, compensation
- Technology
- company, attributes
- culture, relationship
- evolution/revolution, contrast
- organization, API initiation
- team, refocus
- updating
- TellerMagic
- Temenos Community Forum
- Tesla
- Threats
- -Tions
- TJ Maxx, hackers (impact)
- Top-of-app status
- Top of wallet
- Training
- Trello
- Trust frameworks
- creation
- perspective
- Two-way validation
U
- Uber
- udemy.com
- Upwork.com
- USAA
- Usage monitoring
V
- Value, creation
- Vendors, final approval
- Venmo, usage
- Vimeo content
- Virtual private networks (VPNs)
- VIV.AI
- VMware (VMWARE)
- Voice technology, implementation
W
- Wallet app, usage
- Wardriving
- Waterfall (project management approach)
- branch issues
- usage, timing
- Web application
- Wells Fargo, problems
- White-hat hacking community, dependence
- WHOIS, performance
- Wi-Fi, usage
- Windley, Phil
- Wireless Equivalent Privacy (WEP)
- WIRE transfers
- Workflow platform
- Workspaces, usage
- Wunderlist
Y
- Yodlee
- YouTube content
Z
- Zero day
- Zombie apocalypse
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.