Remove Management Remove Security Remove Training
article thumbnail

Generative AI in credit risk management: A game changer for loan review

Abrigo

Generative AI and the new loan review process The evolution of banking and risk management over the past few decades has been nothing short of remarkable. Generative AI in credit risk management is the latest step forward , offering a transformative approach to loan review. Data security is also a major concern.

article thumbnail

VIDEO: Sitecore Content Hub DAM Admin Training

Perficient

The combination of Digital Asset Management (DAM), Product Content Management (PCM), Content Marketing Platform (CMP) and Marketing Resource Management (MRM) tools certainly sounds like a great source of truth. ” That’s awesome, and so were the demos at Symposium, user groups, etc., but I wanted to dig deeper.

Video 322
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Look at DevOps in 2020: Sonatype’s Community Survey

Perficient

DevOps teams routinely deal with the most sensitive needs of an organization: security, governance, and compliance. Security: The integration of security controls into automated pipelines continues to be stronger in mature practices, although evolving DevOps practices continue to integrate security controls. The Findings.

Survey 506
article thumbnail

Embracing a User Guided Experience with OneStream Task Manager

Perficient

OneStream’s Financial Task Management (UTM) solution is a web-based platform that provides customers with a central location for managing period closing activities for their entire organization. Task Manager is made up of activities called “Tasks”. To learn more about Task Manager see this page on OneStream’s website: [link].

article thumbnail

Fraud typologies all financial institutions should know

Abrigo

Phishing scams Phishing scams involve fraudsters impersonating legitimate entitiessuch as banks, government agencies, well-known companies, or business contactsto trick individuals into providing sensitive information like login credentials, Social Security numbers, or financial details.

Fraud 221
article thumbnail

Cloud Takes Center Stage at 2023 Bank Automation Summit

Perficient

Security Traditionally, information was said to be most secure when separated and segmented. However, the cloud’s structure makes data segmentation more complex and potentially more vulnerable if the correct security measures are not followed. For many, this means starting their journey using microservices.

Data 492
article thumbnail

4 Secrets To Compromise Time & Build A Superior Team

Perficient

Time is a constant adversary in project and task management. Managers are often inundated with a performance quandary. The balance between completing these quick tasks or training someone else to perform them is a struggle all managers face. Training allows for these tasks to be delegated away in the future.

Training 371