IT Examiner School, Seaside, CA
Respond
• R1 . Update response plans • R2 . Verify suspicious transactions
• R3. Reverse suspected fraudulent transactions • R4. Send a “Fraudulent File Alert” through FedLine • R5. Notify the receiving bank(s) • R6. Contingency planning • R7 . Contact law enforcement and regulatory agencies • R8. Customer relations procedures and recovery efforts
Best Practices - Appendices
• Appendix A: Resources for Corp Customers
• Appendix B: Deceptive Contact Techniques
• Appendix C: Incident Response Plans
• Appendix D: InfoSec Laws Affecting Businesses
• Appendix E: Sample Fraudulent File Alert Request
Made with FlippingBook - Online catalogs