Our consultants are available to speak on dozens of security and fraud related topics. Each program can be formatted to fit the overall theme of your conference or customized for your specific audience.
Please note that certain topics are specific to the expertise of a particular consultant. Should you be interested in multiple topics, this may require multiple speakers. Please contact us to receive a proposal for your needs.
The 15 Worst Security Mistakes! – There are hundreds of ways to make critical security mistakes within a financial institution—and there’s little time to deal with the aftermath created by those mistakes. This session identifies the 15 worst security mistakes that consultants find financial institutions making and how to correct them. The mistakes and remedies presented are drawn from Thompson Consulting Group’s extensive experience consulting and training financial institutions across the country.
Active Shooter: React and Respond – This program is designed to provide civilians with proven response strategies in the event they ever find themselves in an active shooter situation. The session provides insight into how people react in emergency situations and the effects of stress on decision making during emergencies. Using case studies, attendees will recognize the importance of situational awareness and pre-planning for all types of emergencies. The session will instill confidence and empower attendees so they will be able to quickly recognize a life-threatening event and respond appropriately.
Assessing Threats Targeting Financial Institutions and Their Employees – Your workplace is not immune to acts of violence by disgruntled employees, former employees, or customers. This session will cover warning signs or pre-incident indicators to help you identify the potential perpetrators of such acts. Preventive policies and procedures will be covered as well as lessons learned from past incidents. The instructor’s personal threat assessment experiences will reinforce the discussion. A class concluding audio tape will get your attention by emphasizing the importance of paying attention to warning signs.
ATM Skimming: Staying One Step Ahead – ATM skimming is becoming an epidemic problem for financial institutions. In the first half of 2015, reports of attacks on ATM’s located on institutions’ property were up 174%. The average loss from each attack is $50,000. Worse yet, if the bad guys are successful, they’ll be back. For the Security Officer, this can be a gut-wrenching game of cat and mouse. As soon as a preventative measure is developed, the skimmers go to work on circumventing it. Join us for an interesting session that will provide valuable insight into the tactics, techniques, and tools that skimmers are currently using. We’ll then tackle the dilemma of trying to stay one step ahead.
The Beginning Investigator – This program is designed specifically for individuals who have little or no previous training in financial institution investigations. If you have been the security officer for less than three years or are newly assigned to the duties of the security area, this is the program for you. In this session, we will outline the basic steps for external investigations and discuss who should be assigned that duty. Attendees learn the importance of active listening, remaining objective, documentation, evidence collection, and how to identify the resources you need to assist with the investigation.
Bitcoin: Digital Dollars or Counterfeit Currency – It’s like money, it’s highly controversial, it’s not backed by a country, it’s anonymous, and it’s becoming popular across the planet. In this session, the history, uses and dangers of Bitcoin are discussed. The session also explains how the Dark Web utilizes Bitcoin for the purchase of anything like cars, homes, drugs, and other illegal items. This session is an eye opener for any institution interested in this form of digital currency.
Board Reporting: The Security Perspective – Regulations specify that the Security Officer must report to the board annually and that the implementation, administration, and effectiveness of the security program be addressed. What exactly the Security Officer should report to the board is not clearly identified in the regulations. This interactive session will review best practices relating to training, inspections, and foreseeable events that should be reported to your board.
Call Center Security: Dialing for Dollars – Criminals view “Call Centers” as the weakest link in the security armor of financial institutions! It is easy for the social engineer because they don’t have to enter your bank—they can email, chat, or call you on the phone. No one will have their picture, so the worst that can happen to them is for you to hang up. If your institution prides itself on customer service, not knowing the techniques that organized crime employs, you will take losses. We will show you how call center attacks are designed and review actual case histories that educate everyone to the intricacies of this evolving wave of call center attacks.
Check Fraud – Counterfeit checks, altered checks, washed checks – they all mean one thing – losses for the financial institution that accepts them. In this fast moving session, you will learn how the criminals do it and the methods they will use to attack your institution. Only by knowing how a criminal will produce the check, alter the check, or forge the check will your front line staff know how to detect the fraud in action. Not only will we examine check fraud, we will review false identification, as the criminal must possess both a fraudulent check and identification to be successful.
Computer Security and Social Engineering for the Non-Techie – This program reviews techniques to protect your institution from the dangers of downloading unknown files, information security, and deceptive answers. Social Engineering is the method used by penetration companies and criminals to compromise the financial institution. This program will discuss the modus operandi used to attack account holders, the institution, or call center into providing sensitive information. We will review problems with locating your terminals or PCs where a non- staff member can gain access without anyone knowing. Even a small institution is not safe from these techniques. We will instruct staff on how not to fall victim to a social engineering attack, what a deceptive answer really sounds like, and how to handle these attacks on your front line or call center.
Conducting a Physical Security Review and Risk Assessment – This information packed program will provide you with a recipe on how to conduct your annual security review. No longer can you just use a checklist to determine if your financial institution is safe. We will instruct you on how to think like a criminal to protect your assets, information, and people. Today, the criminal world attacks your institution via computer, customers, and social engineering ploys. Your annual review should find or correct problems with physical security, robbery procedures, and staff training.
The Culture of Ethics – Decisions that involve ethics that seem obvious to one person may be confusing to another, especially when observed behavior of others doesn’t match what is written in the formal Code. How do you ensure that your Code of Ethics means the same thing to everyone in your financial institution both in definition and in importance? Do we all really agree on what is “right” and what is “wrong”? How do you train people in the skill of ethics? This session will show you how it becomes a matter of organizational culture and will provide you with practical training techniques you can use to help ensure that your institution consistently behaves in accordance with ethical standards.
Educating Our Accountholders – Lotteries, Nigerian letters, E-bay scams, you name it – a counterfeit check has most likely been cashed in your financial institution. This dynamic session reviews the losses taken and steps that you can implement to reduce your exposures. The general public still hasn’t recognized the risks from “Certified Checks” that are counterfeit or even how they become targets. Educating your staff and, more importantly, your account-holders will reduce your losses. This program will review what other financial institutions are doing and action steps you can take.
Elder Fraud: The Baby Boomers’ Nightmare – As the baby boomer generation ages, “Elder Fraud” is likely to be the biggest growing segment for crime in our country! Criminals know who they want to target and have found ways to get close to their victims. They know exactly how to manipulate their target and don’t care what happens to them after the scam. After gaining control of your accountholder, the weakest link at your institution becomes the target. In this session, you will learn how your loan function can be a rewarding experience for these criminals. Many of those who become victims will not admit it or be unwilling to prosecute the criminals—they don’t want anyone to know they were deceived. We will review how the attacks work, as well as how to get the victims help!
The Four L’s of Physical Security – Is that beautiful, flowering tree blocking sight lines to your entry? How long has that lightbulb been burnt out? This session will review inexpensive and effective changes you can implement immediately to make sure your facility is safe and secure. The session will review exterior security concerns such as landscaping, lighting, location, and locks. We will also review building design flaws and how to correct them and discuss why a night inspection program is essential.
Fraud Schemes – The faces of fraud are changing rapidly and old confidence games have been reinvented to take advantage of unsuspecting accountholders. In this session, we’ll review consistent and upcoming confidence games as well as what we can do to stop people from becoming victims. This program teaches your staff the tools, tricks, and websites used by criminals to defeat common sense. Participants will learn how to identify potential problems by understanding questions people ask them when conducting normal business transactions. We will provide information that you can use in your training sessions with staff.
Hacker Hijinks: Human Ways to Steal Your Data – This session explains the numerous ways a financial institution network can be compromised. The presentation explains social engineering techniques and how white-collar criminals leverage the use of common people, processes, and technologies to infiltrate the internal workings of your network. Real world experiences are shared by the speaker on how his company uses these techniques to breach the networks of numerous financial institutions (when hired to do so!).
Handling Violent Robberies: The Unspoken Nightmare for a Security Officer! – A violent bank robbery has left someone hurt or killed. Law enforcement and medical personnel have taken control of your banking office. Management wants to know what you are doing to contain the situation. What does the Security Officer say to the press, family, or the public? This session will familiarize you with the steps you should take after such an incident occurs. This illuminating program will provide you with valuable information on how to handle this most difficult situation.
Hashtags to Security Holds: Using Social Networking to Compromise a Your Institution – Social networking plays an increasingly important role in business, as well as in our personal lives. The activity of wall posts, tweets, and videos by and among employees may reveal important company information, or even security flaws that allow hackers to defeat the controls of ANY BUSINESS. This presentation explains how social networking, media, and blog activity can be used to compromise the security controls of your institution and the tools and techniques that are used to mine data, and then how the data is leveraged against the individuals as well as an institution. Within an hour of this presentation, you will learn how to steal an identity, defeat the perimeter controls of a network, and then ultimately gain physical access to the facility.
Identity Theft: Social Engineering – This fast moving program on preventing losses will focus on the information identity thieves obtain before they call your financial institution and the information they want to get from you. You will learn how criminals target your institution and, specifically, you, when trying to obtain information or financial rewards. Understand how to question a person so that you can determine if they are your customer or a thief. Don’t let the criminals socially engineer you into giving them financial information or access to another person’s account.
Incentives Gone Wrong! – We do everything we can to prevent internal embezzlements. You wouldn’t expect that to include having to teach your staff right from wrong. However factors such as unrealistic sales goals, a recessive economy, or compensation relying too much on incentives can produce the motivation for fraud. This session will show what can cause these problems to develop and how to avoid them from happening to you.
Internal Fraud: Crime Scene Investigations – The embezzlement has happened and management wants the person immediately. Avoid embarrassing mistakes by knowing how to handle the situation. Many employees do not realize that they now have an official crime scene. Everything the staff member has access to becomes important from their cell phone to the trash. Take control of your investigation by understanding this is not business as usual for the Security Officer. This session will familiarize you with how to secure the crime scene and assemble the proper documentation you will need in court. All aspects of internal embezzlement cases will be open for discussion in this hard-driving program.
Internal Fraud: The Warning Signs – How prepared is your institution for internal theft and fraud? Embezzlements were the one of the most reported SAR events filed by financial institutions from 1996 to 2013. This riveting session identifies the behavioral changes that can identify internal frauds in the making! We review the warning signs that every staff member should look for or be able to identify to help stop an internal embezzlement. Discover where the thief will spend the stolen funds and how they keep their stealing from being found. Know whether you should do the investigation or hire a Certified Fraud Investigator. This insightful program provides you the tools needed to understand the workings of an internal fraud.
Internet Intelligence Techniques and Terrorism – The internet and social media have become a powerful tool in marketing, representing your brand, and digitally enabling your business. Unfortunately, too much information can lead to defeating security controls and the breach of your operation. This session explains how intelligence mined from the internet combined with social engineering techniques were used to breach a highly secured operation that could have impacted the infrastructure of the U.S. The goal of this session helps the attendee think about what information should be made publicly available and what should be protected.
Investigating Internal Fraud for the Beginner – We have designed this program specifically for the individual who has little or no previous training in financial institution investigations. If you are new to this function, have worked in the area for less than three years, or are newly assigned to the duties in the security area, this is the program for you. Financial institutions accept unknown liabilities when they start investigating internal frauds without the proper education. This program develops the framework of how to conduct an internal fraud examination. We will review what causes people to decide to steal from their employer as well as how they will attempt to hide the fraud.
Investigation: The Clock is Ticking – You’ve just been notified of a potentially large loss for your financial institution. An employee may be involved. The details are vague, but the pressure is on for a quick resolution. Documents need to be gathered, accounts need to be reviewed, and interviews may have to be conducted. Who does what? How do the various business units interact? How long will this take? Join us for a discussion on case management and conducting a thorough investigation. We’ll examine the investigation process and how various business units will need to come together. The interview process will be analyzed and the importance and documentation of evidence will be reviewed.
Observation vs. Perception: Improving Your Ability to Pick Up on Suspicious Activity – This is an awareness session to improve your observation skills. What you see is not always what your brain tells you, you see. You will get a better understanding of ways to improve your crime prevention efforts by absorbing and interpreting what’s going on around you and of why differences in opinions and descriptions can occur from several observers after all have seen the same incident.
Passwords: Hacked and Cracked – Passwords are the main form of protection for many applications inside your financial institution. Even with multiple levels of protection the password is still an integral key to gaining control of your computer system. This eye-opening program shows the steps a hacker, social engineer, or anyone else can use to obtain your passwords. You will learn about websites that can be used to develop the information necessary to crack your password. We will show you places people have used to hide their passwords that are commonly known by criminals. After showing you how easily passwords can be compromised, we offer ways to toughen your own passwords.
The Psychology of Robbery: Inside the Robber’s Head – This program will take a look inside the head of a bank robber. Learn what their motivating factors are and why they do what they do. When a potential robber walks through the front door, the actions or inaction of the financial institution’s staff can have a definite impact on what happens next. Learn what the courage desk is and how it’s used in the robber’s decision making process. We’ll review factors that make your institution a favorable target and discuss tactics that can aid in reducing that likelihood.
Preparation, Risk, and Critical Robbery: Preparation is Protection – It can’t happen here, it won’t happen here, it just happened here! Robbery preparation is more than annual security training. While staff is trained on what to do, you also need to know how to prepare in advance. Criminals select your financial institution as a target for a variety of reasons. While most people feel that location is the issue that is seldom the case. In this eye-opening program you will learn what makes your office a target, the warning signs you’re being cased for robbery, and what you need to do immediately after a robbery event. Many institutions still follow outdated procedures, opening themselves up for lawsuits from staff and the public. This program will discuss advance preparation, the actual robbery event, and what the financial institution needs to support staff after the robbery.
Preparing Your Case For Law Enforcement – Getting your case accepted by law enforcement can be the biggest stumbling block for risk management professionals. This session will review what the victim institution should prepare prior to notifying law enforcement to accept the case for prosecution. Best practices to prevent common mistakes are presented as well as what you can expect during the investigative and prosecution stages of your case.
Regulation H, CPTED, and the Internal Auditor – The internal auditor is responsible for reviewing security and risk management programs, although many have a limited background on Regulation H and physical risk reviews. This program focuses on the requirements of Regulation H, proper employee training, and crime prevention through environmental design. You will learn, through the use of photographs, about easily correctable items that are overlooked by many financial institutions. Attendees will gain an understanding of what steps could reduce legal liability for the financial institution.
Robbery Awareness: Back Office Responsibilities – The person most likely to stumble upon a robbery in progress will be a back office staff member. This program is designed specifically for back office personnel who have little interest in teller training for a robbery situation. Attendees will learn situations to avoid, how to handle a robbery they accidentally observe, and gain new understanding on how to view the physical surroundings they work in daily.
Robbery Awareness and Procedures – Why do people rob financial institutions? Because that’s where the money is. Your financial institution can unknowingly be making itself an easier target for robbers! In this session, we review the steps and procedures financial institutions should enact to help protect staff and the public. Learn how robbers case your institution, the specific steps you can take to reduce your chances of robbery, and actions not to take that may exacerbate the situation. This program cover all the necessary steps your staff needs to sustain a safe workplace in your financial institution. Protect your people, prevent vulnerability, and reassure your customers that their money is safe.
Robbery Training for Front Line Staff – This session focuses on robbery training specific to front line staff. Learn how robbers case the branch before a robbery and what they are trying to observe. Discover how to handle a robbery situation and what will happen after the robber leaves.
Robbery Awareness: Back Office Responsibilities – The person most likely to stumble upon a robbery in progress will be a back office staff member. This program is designed specifically for back office personnel who have little interest in teller training for a robbery situation. Attendees will learn situations to avoid and how to handle a robbery they accidentally observe. They will gain new understanding on how to view the physical surroundings they work in daily which can make them a target.
Securing the Future – Security technology is rapidly changing. New advances in surveillance, access control and branch design can be exciting, innovative, and efficient. New technology is also of great benefit to the bank security officer’s efforts and the overall security of the branch environment. With new technology comes new concerns and a need for policy and procedures to address its use. Join us for a look into recent advances and their application in the world of bank security.
Security Blunders: Show and Tell – Are your institution’s facilities safe and secure? Don’t put your account-holders, employees, and financial assets at risk! Assessing the risks involved with the operation of a financial institution is a major concern of every CEO, COO, and Security Officer. In this session, we use actual examples showing situations that make financial institutions targets for criminal attacks. We will offer a look at your financial institution’s facilities as a visitor would see them, both during operating hours and after hours. You may be surprised at what you see!
Security Regulations – The Bank Protection Act, Regulation H, and the standards of the industry determine the responsibilities of the Security Officer, management, and the Board of Directors. In this session, we review the requirements of a written security program, the financial institution, and security officer in protecting staff and the public.
Tech Fraud: A Virtual Minefield – Skimming, shimming, phishing, vishing, smishing, malware, and ransomware – the names sound ominous, the tactics are nefarious, and the losses can be staggering. Your financial institution and your accountholders have to navigate this electronic minefield. A misstep can result in significant losses or theft of information and reputational damage. Your network may be secure, however, social engineering and the human factor can render your system useless in a matter of minutes. During this program, we will help you traverse the virtual battleground by bringing you up to date on the latest social engineering tactics being used and discuss steps to prevent your financial institution from becoming a victim.
The Three P’s of Financial Crime – Financial crime involves three big words: Profile, Prevention, and Prosecution. Knowing the profiles of financial crimes helps security personnel identify them before they cause serious issues. By understanding the crime profiles, security staff can develop prevention strategies that may stop the crime at any point. By understanding prosecution issues, security personnel can assist legal counsel in developing both civil and criminal strategies that make for a successful resolution. No longer can a banker just call a law enforcement agency and expect that a case will be prosecuted. When it comes to financial crimes, agencies often require that the bank investigate the event thoroughly before the agency will become involved. We will show you how to prepare and present your case to obtain prosecution from the proper level of law enforcement.
When Social Media Attacks – Social media websites have changed the world. For all the good social media can be as an effective marketing tool for attracting an ever-younger (and an ever-older) client base, it can also be used as a weapon against an institution. We will review how, unmonitored, social media can become a nightmare for public relations. This session will demonstrate how a social media attack can be constructed, and, if successful, cause the institution to lose market share and accounts and enough negative publicity that might lead to a failure. We will discuss embarrassing problems that other businesses and financial institutions have had to handle, and pro-active solutions that will keep your institution in the “like” category.
Workplace Violence: Is It Time To Duck? – Workplace violence covers a multitude of subjects from anonymous letters and harassing e-mails to extreme physical abuse. Chances are high that you have witnessed the signs without knowing what they mean. Do you know people in your workplace who abuse drugs or alcohol or are narcissistic in nature? If so, workplace violence is closer to you than you think. We will familiarize you with the profile of an abuser along with the foundation to protect your business.
You’re Doing What? The Future Is Now, So How Do You Survive? – This interactive session reviews problems financial institutions are facing with new technologies, operational changes, and working with law enforcement. We will familiarize you with teller pods, cash recyclers, cash dispensing devices, and automated interactive tellers. These new devices provide the security officer, management, and staff with new problems to resolve… among them how to design your lobby, operational changes, and security procedures that must be reviewed.
Zero to 200 in 60 Seconds: Preparing for Critical Situations – Every security officer and member of senior management has that one critical situation that they hope they never have to experience. However, the reality is that those situations do happen and they can happen to any institution, regardless of size. Are you prepared to handle it? Have you given any thought to what you will do and how you will do it? Join us for an interactive, thought-provoking discussion on how to prepare for those situations that you hope you never have to face. In other words, critical thinking for critical situations.
Looking for a customized program or a topic not listed here? Contact us to discuss your specific training needs.