Home
Categories
EXPLORE
Society & Culture
History
Music
True Crime
Business
Education
Comedy
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
TN
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/ed/35/b1/ed35b114-ca95-2f47-b0ee-089df4aff979/mza_7742956899720724706.png/600x600bb.jpg
PaymentsJournal
PaymentsJournal
10 episodes
3 days ago
Focused Content, Expert Insights and Timely News
Show more...
Business News
RSS
All content for PaymentsJournal is the property of PaymentsJournal and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Focused Content, Expert Insights and Timely News
Show more...
Business News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/ed/35/b1/ed35b114-ca95-2f47-b0ee-089df4aff979/mza_7742956899720724706.png/600x600bb.jpg
Share and Share Alike: The Promise of Cyber Fusion
PaymentsJournal
20 minutes 43 seconds
4 days ago
Share and Share Alike: The Promise of Cyber Fusion

One of the most effective tools in the fight against cybercrime is information sharing—particularly through anonymized consortium data signals—a practice increasingly referred to as cyber fusion. Despite its promise, many institutions remain wary of collaborating in this way, often even within their own organizations.



Greater cooperation—through shared data and interoperable fraud, anti-money laundering, and cyber tools—not only enhances the ability to detect and prevent financial crime, but also delivers measurable benefits to the bottom line.



In a PaymentsJournal Podcast, Teresa Walsh, an intelligence professional with over 20 years experience in both the government and financial services sector, and Tracy Goldberg, Director of Cybersecurity at Javelin Strategy & Research, spoke about the advantages of adopting cyber fusion and the key barriers that keep financial institutions from pursuing it more widely.





Breaking Down the Silos



The financial industry is notorious for operating in silos, with people focused myopically on their own teams’ responsibilities—often without considering how one function impacts another. As organizations network and build stronger internal connections, it becomes clear that no single group holds the complete picture. Combating cybercriminals effectively requires consolidating information and fostering collaboration across functions.



Companies approach cyber fusion in different ways. In some cases, it involves integration within the information security department—bringing together not only the cyber threat intelligence team but also incident responders, forensic teams, AML teams, and Financial Intelligence Units. Each of these groups plays a role in the broader effort.



“First you have to understand what exactly you're fusing,” said Walsh. “I see an increasingly prominent blurring of lines between what we would define as cybercrime versus nation-state or cyber espionage attacks. We need to get outside the box a little bit and realize that whether it's a scam that's impacted a consumer or a phishing attack that has compromised an employee, all of this ties together. The sooner we can connect those dots and share information across these different industries, the better off we're going to be long-term.”



Starting Within the Organization



Cyber fusion can start within the organization by cross-sharing information and tools across departments such as AML, communications, and HR. From there, the effort can expand to include cross-industry collaboration and broader information sharing. Cyber fusion should remain fluid. There’s no way to predict what the landscape will look like in five years, so it’s essential to develop a strategy that allows for adaptability and agility.



Intelligence needs to be integrated into the process, supporting decision-makers at all levels. It shouldn’t be produced for its own sake—it must serve a clear purpose.



“You're trying to deliver intelligence to help people looking at expanding out into a new country or deciding whether or not the technology stack that they currently have is good enough, and you're helping them make those decisions,” said Walsh. “They need objective intelligence that's not just about the technical ones and zeros. Most risk equations are going to talk about the threat that's out there.”



“There's a certain threat actor, there's a certain tool that they're using, and it could present a risk to your company,
PaymentsJournal
Focused Content, Expert Insights and Timely News