IT Examiner School, Seaside, CA

Respond

• R1 . Update response plans • R2 . Verify suspicious transactions

• R3. Reverse suspected fraudulent transactions • R4. Send a “Fraudulent File Alert” through FedLine • R5. Notify the receiving bank(s) • R6. Contingency planning • R7 . Contact law enforcement and regulatory agencies • R8. Customer relations procedures and recovery efforts

Best Practices - Appendices

• Appendix A: Resources for Corp Customers

• Appendix B: Deceptive Contact Techniques

• Appendix C: Incident Response Plans

• Appendix D: InfoSec Laws Affecting Businesses

• Appendix E: Sample Fraudulent File Alert Request

Made with FlippingBook - Online catalogs