Home Page Icon
Home Page
Table of Contents for
Table of Contents
Close
Table of Contents
by Brett King, John Best
Breaking Digital Gridlock, + Website
Cover
Title Page
Foreword
Preface
What Is Digital Gridlock?
Riskphobia
Acknowledgments
Introduction
Five Myths about Going Digital
John's Story
Note
PART I: Processes
CHAPTER 1: How to Improve Internal Processes
Regulatory Gridlock
Flawed Bank Processes
Continual Improvement
Project Management
When to Use Agile versus Waterfall
In-house Staff and Outside Vendors
Process Management
Team Organization: Centers of Excellence
Cultural Considerations
PART II: Technology
CHAPTER 2: Tech Evolution versus Tech Revolution
Evolutionary Technology
Evolution in Banking
True Revolution
The Financial Revolution
CHAPTER 3: The Cloud
The Financial Cloud
What Are You Afraid Of?
Types of Cloud Services
Major Players in the Cloud
Capital One in the Cloud
Strategies for Moving to the Cloud
Note
CHAPTER 4: Artificial Intelligence
Computers Will Be Trainable
Machine Learning: Familiar Names
Artificial Intelligence versus Intelligent Augmentation
The AI Threat
Notes
CHAPTER 5: Application Programming Interface (API)
Why Create an API?
Getting Started
The Second Step
The Third Step
CHAPTER 6: Blockchain and Cryptocurrency
Bitcoin: A Brief History
Decentralization
Security
How to Use a Distributed Ledger
PART III: Security
CHAPTER 7: Sovereign Identity
Trust Frameworks
Encryption and Data Security
Sovereign Identity in Practice
Weaknesses in the Current Identity System
An Opportunity for Financial Institutions
Note
CHAPTER 8: The Hacker Threat
The Artificial Intelligence Threat
Planning for the Worst
Operation Ababil
DDoS Attacks
Be Afraid When Things Are Down. Be Very Afraid When Things Are Going Well
Security as a Process of Innovation
The Equifax Breach
Scenario Planning
Notes
PART IV: People
CHAPTER 9: The Digital Change Is for Everyone
Human Resources
Facilities
Accounting: Software Depreciating
CHAPTER 10: Who Can Break Gridlock?
Common Symptoms of People Problems
Human Solutions
Data Is Money
PART V: Culture
CHAPTER 11: Culture and Innovation
Where Does Culture Start?
Culture Breakdowns
Culture and Talent
Steps to an Innovative Culture
Achievement versus Alignment
Notes
CHAPTER 12: Culture and Technology
A Tale of Two Cultures
Having It Your Way—BYOP
PART VI: Strategy
CHAPTER 13: The Long View
The Problem: Banking and Financial Competitors
Threats: The –tions
The Reality of Change
Changing Features or Services
How Solutions Can Fail
Note
CHAPTER 14: Digital Governance
Review Proposed Products and Integration
Data Governance
CHAPTER 15: Using Data Analytics
Look Ahead
Credit Card Usage
Usage Monitoring
Digital “Why” 101
Digital Marketing
CHAPTER 16: Big Data and the Zombie Apocalypse
Apocalyptic Risk
Staffing in an Apocalypse
Creating Value
Digital Insight and Intuition
Types of Analytics
Note
Conclusion
Cultural Issues
People Strategy
Process Changes
Technology
Security
About the Companion Website
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover
Next
Next Chapter
Title Page
Table of Contents
Cover
Title Page
Foreword
Preface
What Is Digital Gridlock?
Riskphobia
Acknowledgments
Introduction
Five Myths about Going Digital
John's Story
Note
PART I: Processes
CHAPTER 1: How to Improve Internal Processes
Regulatory Gridlock
Flawed Bank Processes
Continual Improvement
Project Management
When to Use Agile versus Waterfall
In-house Staff and Outside Vendors
Process Management
Team Organization: Centers of Excellence
Cultural Considerations
PART II: Technology
CHAPTER 2: Tech Evolution versus Tech Revolution
Evolutionary Technology
Evolution in Banking
True Revolution
The Financial Revolution
CHAPTER 3: The Cloud
The Financial Cloud
What Are You Afraid Of?
Types of Cloud Services
Major Players in the Cloud
Capital One in the Cloud
Strategies for Moving to the Cloud
Note
CHAPTER 4: Artificial Intelligence
Computers Will Be Trainable
Machine Learning: Familiar Names
Artificial Intelligence versus Intelligent Augmentation
The AI Threat
Notes
CHAPTER 5: Application Programming Interface (API)
Why Create an API?
Getting Started
The Second Step
The Third Step
CHAPTER 6: Blockchain and Cryptocurrency
Bitcoin: A Brief History
Decentralization
Security
How to Use a Distributed Ledger
PART III: Security
CHAPTER 7: Sovereign Identity
Trust Frameworks
Encryption and Data Security
Sovereign Identity in Practice
Weaknesses in the Current Identity System
An Opportunity for Financial Institutions
Note
CHAPTER 8: The Hacker Threat
The Artificial Intelligence Threat
Planning for the Worst
Operation Ababil
DDoS Attacks
Be Afraid When Things Are Down. Be
Very
Afraid When Things Are Going Well
Security as a Process of Innovation
The Equifax Breach
Scenario Planning
Notes
PART IV: People
CHAPTER 9: The Digital Change Is for Everyone
Human Resources
Facilities
Accounting: Software Depreciating
CHAPTER 10: Who Can Break Gridlock?
Common Symptoms of People Problems
Human Solutions
Data Is Money
PART V: Culture
CHAPTER 11: Culture and Innovation
Where Does Culture Start?
Culture Breakdowns
Culture and Talent
Steps to an Innovative Culture
Achievement versus Alignment
Notes
CHAPTER 12: Culture and Technology
A Tale of Two Cultures
Having It Your Way—BYOP
PART VI: Strategy
CHAPTER 13: The Long View
The Problem: Banking and Financial Competitors
Threats: The
–tions
The Reality of Change
Changing Features or Services
How Solutions Can Fail
Note
CHAPTER 14: Digital Governance
Review Proposed Products and Integration
Data Governance
CHAPTER 15: Using Data Analytics
Look Ahead
Credit Card Usage
Usage Monitoring
Digital “Why” 101
Digital Marketing
CHAPTER 16: Big Data and the Zombie Apocalypse
Apocalyptic Risk
Staffing in an Apocalypse
Creating Value
Digital Insight and Intuition
Types of Analytics
Note
Conclusion
Cultural Issues
People Strategy
Process Changes
Technology
Security
About the Companion Website
Index
End User License Agreement
List of Tables
Chapter 1
Table 1.1 Mobile loan application tasks and workgroups
Chapter 14
Table 14.1 Data-mapping key concepts
List of Illustrations
Chapter 1
Figure 1.1 The risk spectrum
Figure 1.2 Waterfall versus agile > Branch Issues
Figure 1.3 Kissflow tiles
Chapter 6
Figure 6.1 A financial transaction using blockchain
Chapter 8
Figure 8.1 Encryption ransomware message
Chapter 10
Figure 10.1 Sample executive organizational chart
Chapter 13
Figure 13.1 What type of organization are you?
Chapter 14
Figure 14.1 Data governance cycle
Figure 14.2 Basic data map: High-level overview
Guide
Cover
Table of Contents
Begin Reading
Pages
C1
iii
iv
xi
xii
xiii
xv
xvi
xvii
xviii
xix
xxi
xxii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
1
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
21
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
103
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
149
151
152
153
154
155
156
157
158
159
160
161
162
163
165
166
167
168
169
170
171
172
173
174
175
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
205
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
291
292
293
294
295
296
297
298
299
300
301
302
E1
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset