Cyber Incident Response: The Payments Perspective - Threat Intelligence and Best Practices to Manage Threats


Instructor: Rayleen M Pirnie
Product ID: 704443

  • Duration: 90 Min
This training program will discuss how cyber-attacks affect payment processing. It will highlight to attendees how best to record appropriate sound business practices for managing operational risk due to a cyber-attack. Attendees will also learn to identify critical operational communications, from internal staff to customers and institutions to vendor support.
Last Recorded Date: Apr-2016


1 Person Unlimited viewing for 6 month info Recorded Link and Ref. material will be available in My CO Section
(For multiple locations contact Customer Care)

Downloadable file is for usage in one location only. info Downloadable link along with the materials will be emailed within 2 business days
(For multiple locations contact Customer Care)



Customer Care

Fax: +1-650-362-2367

Email: [email protected]

Read Frequently Asked Questions


Why Should You Attend:

Continuing operations and the flow of payments when disaster strikes is nothing new to financial institutions and businesses. However, how you continue processing while under a cyber-attack is very different than other types of disasters. The decisions you make, from processing to communicating with customers, can significantly affect your organization’s risk and loss potential.

It is critical that you have an already tested plan and are prepared in advance to deal with these devastating situations. Building off of the February 9th session Cyber Attacks, Incident Response Checklist, Testing & Resources - Beyond Disaster Recovery, attendees of this session will test their operational incident response plan knowledge and gain valuable insight into the unique payments environment.

Even in the face of a cyber-attack, payments must continue. How do you process payroll when you can’t connect to your bank’s platform to submit files? How do you pay vendors when your network is shut down? How do you reimburse employees for travel expenses timely when their information is at risk? Suggested resolutions to these questions and more are presented in this information-packed webinar.

This webinar will cover:

  • How cyber-attacks are often smoke-screens for more nefarious frauds.
  • How a cyber-attack can affect processing.
  • Unique incident response from a payments professional perspective.
  • Suggested additional authentication techniques to approve legitimate transfers.
  • Communicating with customers and staff.
  • Highlight resources for threat identification.

Learning Objectives:

  • Isolate how cyber-attacks affect payment processing.
  • Record appropriate sound business practices for managing operational risk due to a cyber-attack.
  • Identify critical operational communications, from internal staff to customers and institutions to vendor support.
  • Recognize threat intelligence resources.

Areas Covered in the Webinar:

  • Cyber-attack effects on payment processing.
  • Common methods criminals use to circumvent authentication techniques.
  • Sound business practices to manage threats.
  • Communications from an operational perspective.
  • Working with an institution during a cyber-attack (i.e. enhanced authentication).
  • Gauging a solution provider/vendors ability to support an organization during an attack.
  • Implementing advanced measures to secure and send payments.
  • Threat intelligence.

Who Will Benefit:

  • CPAs
  • Legal counsel
  • Accounting
  • Payment processors
  • Operations
  • Management
  • Vendor managers
  • Disaster recovery professionals
  • Information security personnel

Instructor Profile:

Rayleen M. Pirnie, AAP, is CEO and founder of RP Payments Risk Consulting Services, LLC. She is a recognized payments risk and fraud expert who works with financial institutions and businesses across the nation to help them understand today’s threats and develop appropriate risk mitigation strategies. She also speaks to consumer groups revealing real-world methods to reduce the chances of devastating frauds, and law enforcement on payment system processing and evidence collection in electronic payment channels. Ms. Pirnie’s areas of expertise include fraud investigations, payment system risk management, cybercrimes, and information security. She holds a Bachelor’s of Science in Criminal Justice Administration degree and is an Accredited ACH Professional (AAP).

Follow us :



Refund Policy

Our refund policy is governed by individual products and services refund policy mentioned against each of offerings. However in absence of specific refund policy of an offering below refund policy will be effective.
Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange. Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time. On-Demand Recording purchases will not be refunded as it is available for immediate streaming. However if you are not able to view the webinar or you have any concern about the content of the webinar please contact us at below email or by call mentioning your feedback for resolution of the matter. We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email [email protected] call +1-888-717-2436 (Toll Free).




6201 America Center Drive Suite 240, San Jose, CA 95002, USA

Follow Us

facebook twitter linkedin youtube


Copyright © 2023 MetricStream
Our Policies: Terms of use | Privacy

PAYMENT METHOD: 100% Secure Transaction

payment method