It's a hot one this year. Cool down with a recap of the top Strategically Speaking posts of the summer.
6 Questions to Consider When Performing a Data Conversion - by Jason Mayhall, posted July 12
"Much like buying a house, your choice of an Enterprise Content Management System and conversion of legacy data is a huge decision that could lead to your dream home or a money pit. Let’s use a house hunting analogy to help illustrate the things you must consider when performing a data conversion into a new ECM solution."
Is This the Age of De Novos? - by Shelba Murphy, posted June 30
"Between 2010 and end of 2015, only two new banks opened their doors in the US. Since that time, however, an increase in de novo activity has appeared; with two new openings and seven pending approvals.
There are no doubt several reasons for this shift. One reason could be that the failure rate of banks during the recession is fading into history, and the economy is gradually getting back on its feet. Also, the FDIC has lifted some of the regulatory burden on these institutions. For example, in 2009, a regulation (FIL-50-2009) was created that mandated heighted examination procedures to continue for seven years after a bank’s approval. In 2016, this rule was rescinded and the period has been reduced to three years."
To Pay Or Not to Pay… And Then What? - by Tammy Bangs, posted May 31
"Identifying the steps that are necessary to recover and resume your business operations once a breach occurs is absolutely critical for your FI. Having rehearsed those steps, answered the myriad of questions, and identified multitudes of “what ifs” is a huge part of what could equate to your successful recovery from such an incident. If you fail to plan, you plan to fail. This is never as true as in the incident of recovery from some kind of catastrophe – cyber or otherwise. As the rate of malware infections rise exponentially, and the rate of ransomware reaches an all-time high, we understand the duty you have to protect your customers’ information and to resume your operations as swiftly and efficiently as possible after the event."
M Is for Machine Learning - Not Magic - by Patty Moore, posted July 5
"Several of my colleagues and I recently had an opportunity to visit the Microsoft campus in Redmond, WA to meet with their data scientists and SQL Server 2016/ SQL Server R Services experts. Our objective was to collaborate on the machine learning models we are developing for our Advanced Reporting for Credit Unions™(ARCU) business intelligence solution.
While machine learning algorithms have been around for quite some time, our team is looking to productize and operationalize predictive models for 240+ Jack Henry/Symitar customers. Predictive analytics is an area of data science that is getting more and more attention..."
Card-Not-Present Fraud: How to Save Consumers from Themselves - by Hayley Turpen, posted June 21
"Consumers are less concerned with the cost of fraud due to the fact they are rarely, if ever, held responsible for the actual fraud loss and therefore suffer little to no financial repercussions. However, they are greatly inconvenienced if the fraud occurs on their debit cards, and the funds in their underlying DDA account are used. On the other hand, the costs incurred due to fraud weigh heavily on the shoulders of financial institutions. As with all fraud prevention measures there is a delicate balance between the added security measures and customer experience and card fraud is no exception."