Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Omri Kletter – COVID-19, cybersecurity, crime, and fraud management

By Maria Henriquez
5 mins with Omri Kletter
November 17, 2020

How is the current COVID-19 pandemic affecting fraud levels, and what can firms do to protect their employees and customers? Below, we talk to Omri Kletter, VP, Cyber Crime and Fraud Management at Bottomline, about best practices for managing risk and cyber threats in the payments process more broadly. 

 

Security magazine: What is your title and background?

Kletter: I am VP, Cyber Crime and Fraud Management at Bottomline, after a decade with NICE. I started my journey in crime fighting in the global counter-terrorism unit of the Israeli NSA. Fighting bad guys there included consuming large amounts of data and communications, while pivoting constantly through ongoing change. Key learnings across that experience shape my feelings on fraud and financial crime and data consumability. At Bottomline, our mission is to help corporations and banks pay and get paid, making complexity simple, smart and secure. Because our group looks across all of the different junctions of payments flow, we see the interconnectedness of fraud and financial crime.  For example, we aim to break down thinking and organization that sees fraud as a P&L and anti-money laundering (AML) as a regulatory-driven agenda. We encourage looking at the convergence that exists there. 

 

Security magazine: How is the current pandemic affecting fraud levels?

Kletter: It’s quite critical to identify all of the avenues of fraud — each of which has accelerated in the age of pandemic. There’s first-party fraud — those situations where the “customer” is the fraudster. For example, an individual or entity filing fraudulent loan applications through the PPP program. There’s third-party fraud — where the customer is the victim. One bank customer of ours had a hospital client duped in to changing how one “doctor” was paid, directing funds to a prepaid card versus payroll deposit, via seemingly legitimate email. Finally, there’s internal-fraud — where an employee becomes partner in bad-acting. 

The pandemic has seen three main forces converge to create a perfect storm. First, circumstances created by lock-downs and the like have increased the operational pressures brought on to both corporates and banks — the forced shift to remote working while attempting to maintain cost savings and efficiencies. Second, a dynamic and shifting regulatory environment. New account sanctions and regulatory changes that are more stringent and with expansive parameters. Third, technology advancements which provide businesses full visibility to leverage data, sophisticated analytics and investigation tactics.

Therein, lies the challenge. These same forces are being exploited and used by bad actors for their own advantage. And that’s across the ecosystem of fraud and financial crime.  So, whether it’s business email compromise (BEC) — one of the fastest growing trends in fraud threat worldwide, insider fraud, invoice fraud, authorized push payment or money-laundering, bad actors are on the move. Fraud attacks are moving higher and as they become more profitable for criminals, they’ll continue on an upward path.

 

Security magazine: What can firms do to protect their employees and customers?

Kletter: As with mitigating any other type of fraud, training, controls and robust policies and procedures need to be coupled with sophisticated technology to be able to enforce controls to prevent and deter fraud. This is especially true with Insider Fraud where the enforcement and discipline resulting from policy violations acts as an effective deterrent against would be and acting malicious actors.

Organizations are at a higher risk for fraud given the extraordinary socio-economic conditions of the times. And that’s internal and external fraud. And, while education and training help with both managing internal and external risk, we must use the power of technology in the fight. For example, as we use more machine learning and AI to fight external crime, we must think of how these technologies apply to internal threats.  Why is that person, in that role, requesting this? Or, is that the regular process that is followed by the department, on that day, at that time? 

 

Security magazine: What are some best practices for managing risk and cyber threats in the payments process?

Kletter: Best practice is driven through a much more balanced approach to covering the whole fraud and financial crime landscape. I think of it in terms of stop, act, reflect. First, consider those forms of fraud we discussed — first-party, third-party and insider. Consider all of the junction points of transaction across each of those for a more whole picture of crime across the lifecycle. Communicate across forms and junctions and continually pivot based on intelligence.

One powerful best practice is to build and foster a fraud and financial crimes hub within your organization. Bringing together all of the disciplines that lead initiatives and operations across the landscape of compliance, fraud and global risk management needs is critical in a cloud-led, data-rich world. We’re seeing new paradigms in data and analytics, their application and value in the fight on fraud and financial crime. It increasingly will be best practice to be more communal in our approaches to managing risk and threats, just as the bad actors do in perpetrating them. Financial institution, corporate, regulator and vendor, communicating, sharing and thinking together to create better practices and solutions in an exchange.   

 

Security magazine: How can finance teams that are facing potential internal and external fraud attempts prepare and adapt from both a US and global perspective?

Kletter: First, for the purposes of cash flow management and optimization, demand for faster, more frictionless commerce and payment remains unchanged. Just as payments have become faster and more seamless, so to have the efforts of financial criminals. They no longer look simply at a payment’s point-of-exit. They’re taking a multi-pronged approach to attack to create as much gain for themselves as possible. That means that organizations and finance teams must protect the lifecycle of the transaction, not just the portal or the potential weakest link. It requires teams to monitor every payment before it leaves, surrounded by tight implementation of controls.

As more data and more flow present more challenge, many organizations have simply thrown more people in to the flow. This isn’t scalable. It’ll be more about how we look across the expanse to speed up things like investigation, which I’ll talk more about. I also think we need to encourage that communal thinking, especially globally, so that corporates, financial institutions, regulators and vendors are working in the collective interest of protection.

 

Security magazine: What are your expectations around payments fraud for the rest of the year, including new threats and technologies to combat them?

Kletter: It’s very hard to forecast by the nature of the challenge.  A few things remain critical in the fight across the landscape. While it’s begun in earnest, I expect to see continued developments over the next year. First, there’s data.  We must continue together making data more accessible. The focus there is on consumability — making the data more consumable. This includes the structure of data and the opportunity of data scientists to do more with it, faster. Second on the technology front, we’ll continue to see more use of machine learning — and increasingly combined with artificial intelligence. These technologies, which were once considered “experimental”, will become more accessible across the financial industry, even for smaller financial institutions and corporates. The third expectation I have is that we’ll see some truly disruptive change on the investigations front. How we investigate, the speed with which we investigate will see transformational change. We’ll be working to reduce 8-minute investigations to 3-minute investigations, optimizing costs and accelerating efficiencies as teams look across the entire payment lifecycle.

KEYWORDS: crime prevention cyber security financial services fraud prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Soroko

    5 minutes with Jason Soroko - The importance of zero trust during COVID-19

    See More
  • 5 mins with Patrick

    5 minutes with Kory Patrick - How COVID-19 challenged security practices

    See More
  • 5 minutes with Waskelis

    5 minutes with Todd Waskelis - Cybersecurity consulting during the pandemic

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!