Technology
Goodbye excel spreadsheets, hello performance management tools

By Harald Matzke, Executive
Adviser at Serviceware Performance
Whether it’s the implementation of new software or the use of innovative technologies such as RPA, the opportunities and challenges that arise in the context of digitalisation are manifold. Many companies face challenges due to the complexity of converting systems and processes: high costs as well as investment effort and the lack of time and resources. The project landscape for many companies is becoming increasingly confusing, which repeatedly leads to errors in project management. For example, project resources are planned twice, schedules and deadlines are not met, the budget is not adhered to or, in the worst-case scenario, the project fails completely. Unsuccessful IT projects are not uncommon, especially with large-scale projects, such as initiatives for digital transformation. Despite this, research from Citrix has revealed that three in four IT leaders (77%) see opportunities for success in past digital transformation failures.
IT projects fail – but why?
There are many reasons why IT projects fail. Errors occur both before and during the project phase. Often it is due to the scope of work, which was inadequately defined in advance. Companies also repeatedly underestimate the scope and impact that IT projects have on the entire business. Quite often, they plan too little time, so that even at the beginning, important targets can only be met with difficulty.
So how should companies proceed? First of all, they should ask themselves two questions:
- Are we running the right projects?
- Is our project implementation result-oriented?
The intersection of these two core issues is the project portfolio, which maps the projects already underway and those awaiting a decision. A good portfolio management should actively add and remove projects in order to achieve the intended transformation goal. Portfolio management is an important basis for comparing resource supply and demand and making it transparent for all stakeholders. In project scoring, defined criteria can be used to make a comparison of different project alternatives as objective as possible. Especially when so-called hard and soft facts have to be taken into account, project scoring provides valuable support for the most diverse investment scenarios.
The goal at the beginning of planning is to find a project or product portfolio that is as balanced as possible in terms of opportunities and risks whilst also promising long-term success. Project costs must also be calculated here. In addition to classic cost types such as personnel, travel or material costs, these also include those that have a special significance in the project context, for example external consulting services. Project cost management includes both planning and actual plan comparison as well as regular revision during the project in order to have a clear picture of the costs incurred at all times. Adjustments only work if there is continuous and complete project reporting. Here, the achievement of project goals is to ensure that the business is attaining a desired outcome.
The importance of keeping an optimal overview of projects
To get a clear overview of the status and development of projects, companies often use a number of different tools and applications such as Excel or PowerPoint. In principle, both are solid tools for calculating projects and creating reports. However, they quickly reach their limits as soon as the requirements increase. Modern tools are therefore essential, especially when managing complex IT project portfolio. If a tool from the performance management area is chosen, non-financial indicators can also be taken into account and serve as a basis for business decisions. Parameters such as “service level performance” not only indicate the pure cost aspects of a new project, but also take into account the scope and quality of the service provided.
But what should performance tools do in order to make the described planning steps more efficient? First of all, the most important requirement is integration into existing systems, making sure that it meets the needs and requirements of the company and the respective projects. Often, individual systems (product data management, enterprise resource planning or operational project management) already exist in the company and the data only needs to be merged and prepared.
The chosen solution should also provide a transparent view of the entire project portfolio in relation to the resource and capacity situation. Information should be stored “multidimensionally” (project view, organizational view, time, data types in forecast versions) and analyzed using standard reports and ad hoc evaluations. The forecast view also helps to simulate potential future portfolios and predict their impact on the future cost situation and resource utilization.
Furthermore, the tool should offer the possibility to develop business cases that can serve as a basis for comparison for later versions of the project. By filing them in a central database, the assumptions in the business case can be continuously refined over time and supplemented with facts and key figures such as net present value, payback period or internal rate of return (IRR) can be calculated. Organizations should also be careful not to use business cases only as an initial means of defining the project scope and evaluating the economic viability, but to keep an eye on them on an ongoing basis. Unfortunately, experience shows that few organizations open up the initial business case at the milestones and, in particular, review the initial assumptions and objectives after the project has been completed. In some cases, this would be important in order to see that projects are no longer goal-oriented and would possibly contribute more to success if they were stopped, thus freeing up the resources used for other projects and tasks.
Two sides of the same coin: project and people
With performance management tools, a close link to business strategy and operational planning and budgeting can be achieved, which brings more transparency to react in time to rapidly changing developments. Besides all the technical possibilities that can be used to implement IT projects, however, the human factor must not be forgotten. Changes and transformation are usually unpopular because they often trigger concerns about being replaceable or having to give up privileges and routines. Involving the affected groups of people and open communication regarding the introduction of new software that will impact the company and the work is crucial. Managers should always deal honestly and openly with employees’ concerns and wishes and communicate changes in the course of the project promptly. Then nothing will stand in the way of project portfolio success!
You may like
Business
Cultivating an Intuitive and Effective Security Culture

John Trest, Chief Learning Officer, VIPRE Security Group, explains how businesses can cultivate a security culture by overcoming security training barriers.
Research shows that human behavior remains the leading driver of data breaches — whether through stolen credentials, phishing attacks, misuse, or simple, inadvertent mistakes by well-meaning individuals. Under pressure, employees become susceptible to manipulation, and when confronted with the complexity of day-to-day work, human vulnerability becomes evident, which the bad actors actively look out for and take advantage of.
Cybersecurity culture
According to behavioural science, employees’ behaviour in the workplace is greatly influenced by the organisation’s existing culture. Whether it’s the successful implementation of technical controls, the likelihood of individuals reporting security incidents, or instances of accidental or malicious insider activity – they are all intricately linked to the cybersecurity culture.
Cybersecurity awareness is the first step to strengthening the human firewall
Good cybersecurity awareness training helps to embed a cybersecurity-conscious culture and security-first attitude in the workplace. Employees and organisations can establish stronger protective measures by enhancing cybersecurity consciousness. Rather than being seen as the “weakest link”, the human should be regarded as the critical defensive barrier for organisations.
With organisations facing increasing risks from social engineering attacks that manipulate behaviour and exploit human error, cybersecurity awareness and training equip employees with the ability to protect digital data from unauthorised access, and respond effectively to threats, countering intentional and unintentional security compromises.
Barriers to effective cybersecurity awareness training
Some key barriers typically impede the successful delivery of cybersecurity awareness training programs, jeopardising organisations’ security posture.
Poor employee engagement –When employees see training as boring or disconnected from their work, engagement suffers. Many security awareness programs compound this issue through complexity, excessive length, lack of relevant scenarios and imagery, and poor accessibility, creating barriers to participation and knowledge retention.
Lack of knowledge retention –Studies demonstrate that significant portions of newly learned information fade from memory rapidly, particularly when cybersecurity training occurs only annually. Such large breaks in training frequency create dangerous knowledge gaps that expose organisations to various security vulnerabilities.
Poor motivation –Cybersecurity training must inform and inspire employees to become active security defenders. Explaining the “why” effectively helps drive behavioural change through extrinsic motivation. However, addressing the “why me” question is crucial for developing more compelling intrinsic motivation. This personal context helps employees understand not just cybersecurity’s general importance, but its specific relevance to their workplace roles, themselves, and their loved ones. Intrinsic motivation is essential for lasting behavioural change and cultivating a truly security-conscious organisational culture. When employees personally connect with security practices, they transform from passive rule-followers to engaged protectors of company assets.
Content obsolescence –The dynamic evolution of security threats challenges cybersecurity awareness efforts, as today’s effective training may prove inadequate against tomorrow’s threats. When content becomes outdated, employees remain vulnerable to new attack techniques. Organisations must embrace continuous learning by implementing dynamic training programs that integrate seamlessly into employee workflows, incorporating emerging threats. By maintaining current, relevant training materials, organisations can ensure employees remain prepared to recognise and respond to evolving cybersecurity threats, ultimately preserving a robust security posture.
Undue focus on regulatory compliance –While regulatory compliance matters, it shouldn’t be the primary metric for cybersecurity awareness and training. Instead, programs should be evaluated by quantifiable improvements: reduced phishing clicks, increased reporting rates, fewer intrusions and breaches, decreased damage, and lower overall cyber risk.
Overcoming security awareness and training barriers
Adopting a more positive approach to security awareness, and viewing employees as positive assets that contribute to a cybersafe workplace, must be the goal. It helps to foster a positive culture in which employees feel more confident about their own actions when handling potential threats.
The cornerstone of engaging security training is twofold: convenience and relevance. When employees can easily access content that directly applies to their roles, they’re naturally more inclined to participate fully and retain critical information. This approach transforms security awareness from an obligatory task into a valuable, integrated part of the workday.
Some thoughts to help overcome the security awareness and training barriers:
Regular reinforcement and knowledge retention focus –To address retention challenges, implement training solutions featuring current, applicable, and engaging content. Incorporate evidence-based learning techniques including interactive elements, straightforward messaging, and real-life scenarios, to enhance retention of information and best practices.
Critical to long-term knowledge retention is the adoption of microlearning approaches. These methodologies divide security education into brief, compelling modules delivered frequently throughout the year. This short-form content helps keep the focus and maintains the attention of employees. By reinforcing key concepts shortly after initial exposure, microlearning creates multiple touchpoints that combat natural memory decay. In doing so, organisations transform cybersecurity awareness from an annual chore into an ongoing, sustainable practice that strengthens organisational security posture.
Gamification –Gamification can be a very useful tool in motivating learners to pay attention to and engage with a learning experience. Given the nature of how the human brain is stimulated by rewards in games, the knowledge obtained from this type of learning experience is retained for longer periods of time.
Though even simple gamification, such as points or leaderboards can have a positive impact on learners, the best way to leverage gamification elements into a learning experience is for them to be interwoven and inherent to the content. For instance, in a gamified cybersecurity scenario, players could assume the role of a White Hat hacker tasked with crafting convincing scam emails to fool unsuspecting staff. Players learn how cybercriminals operate and how to protect themselves by spending time in a hacker’s shoes. And the narrative built around the mechanics of the game makes the interactivities more relevant and compelling.
Role-specific training –Far too often, a broad-brush approach to cybersecurity training is used, making it less relevant for some staff. Targeted training designed for different workplace roles is more effective. For example, a company’s risk and compliance team needs cyber training that takes into account the demands of regulatory bodies, finance teams need to know about business email compromise, security teams must be trained on advances in threat detection, end users must understand how to spot a phishing email or deepfake, and so forth. Training that is tailored specially for business leaders is equally important.
Quality training –The quality of the training experience can make all the difference. Security awareness training is an expertise and a skill with adult learning trends, technology, and best practices. Specialist security trainers and instructional designers know how to get employees to engage with the program, based on an appreciation of employees’ intrinsic and extrinsic motivations, alongside their role-specific requirements.
Cybersecurity culture refers to the collective mindset and behaviours of an organisation’s employees toward protecting information assets. It involves integrating security practices into daily activities, fostering awareness and vigilance, and encouraging proactive reporting of incidents. It also reflects the unspoken beliefs towards security in the organisation. A strong cybersecurity culture is important to help reduce risks by making security a shared responsibility.
Business
Empowering banks to protect consumers: The impact of the APP Fraud mandate

Source: Finance Derivative
Thara Brooks, Market Specialist, Fraud, Financial Crime & Compliance at FIS
On the 7th October last year, the APP (Authorised Push Payment) fraud reimbursement mandate came into effect in the UK. The mandate aims to protect consumers, but it has already come under immense scrutiny, receiving both support and criticism from all market sectors. But what does it mean for banks and their customers?
Fraud has become a growing concern for the UK banking system and its consumers. According to the ICAEW, the total value of UK fraud stood at £2.3bn in 2023, a 104% increase since 2022, with estimates that the evolution of AI will lead to even bigger challenges. As the IMF points out, greater digitalisation brings greater vulnerabilities, at a time when half of UK consumers are already “obsessed” with checking their banking apps and balances.
These concerns have contributed to the implementation of the PSR’s (Payment Systems Regulator) APP fraud mandate, which was implemented to reimburse the victims of APP fraud. APP fraud occurs when somebody is tricked into authorising a payment from their own bank account. Unlike more traditional fraud, such as payments made from a stolen bank card, APP fraud previously fell outside the scope of conventional fraud protection, as the transaction is technically “authorised” by the victim.
The £85,000 Debate: A controversial adjustment
The regulatory framework for the APP fraud mandate was initially introduced in May 2022. The maximum level of mandatory reimbursement was originally set at £415,000 per claim. The PSR significantly reduced the maximum reimbursement value to £85,000 when the mandate came into effect, however, causing widespread controversy.
According to the PSR, the updated cap will see over 99% of claims (by volume) being covered, with an October review highlighting just 18 instances of people being scammed for more than £415,000, and 411 instances of more than £85,000, from a total of over 250,000 cases throughout 2023. “Almost all high value scams are made up of multiple smaller transactions,” the PSR explains, “reducing the effectiveness of transaction limits as a tool to manage exposure.”
The reduced cap makes a big difference on multiple levels. For financial institutions and payment service providers (PSPs), the lower limit means they’re less exposed to high-value claims. The reduced exposure to unlimited high-value claims has the potential to lower compliance and operational costs, while the £85,000 cap aligns with the Financial Services Compensation Scheme (FSCS) threshold, creating broader consistency across financial redress schemes.
There are naturally downsides to the lower limit, with critics highlighting significant financial shortfalls for victims of high-value fraud. The lower cap may reduce public confidence in the financial system’s ability to protect against fraud, particularly for those handling large sums of money, while small businesses, many of which often deal with large transaction amounts, may find the cap insufficient to cover losses.
The impact on PSPs and their customers
With PSPs responsible for APP fraud reimbursement, institutions need to take the next step when it comes to fraud detection and prevention to minimise exposure to claims within the £85,000 cap. Customers of all types are likely to benefit from more robust security as a result.
The Financial Conduct Authority’s (FCA’s) recommendations include strengthening controls during onboarding, improving transaction monitoring to detect suspicious activity, and optimising reporting mechanisms to enable swift action. Such controls are largely in line with the PSR’s own recommendations, with the institution setting out a number of steps in its final policy statement in December 2023 to mitigate APP scam risks.
These include setting appropriate transaction limits, improving ‘know your customer’ controls, strengthening transaction-monitoring systems and stopping or freezing payments that PSPs consider to be suspicious for further investigation.
All these measures will invariably improve consumer experience, increasing customers’ confidence to transact online safely, as well as giving them peace of mind with quicker reimbursement in case things go awry.
Going beyond the APP fraud mandate
If the PSR’s mandate can steer financial institutions towards implementing more robust security practices, it can only be a good thing. It’s not the only tool that’s shaping the financial security landscape, however.
In October 2024, the UK government introduced new legislation granting banks enhanced powers to combat fraud. An optional £100 excess on fraud claims has been introduced to encourage customer caution and combat moral hazards, while the Treasury has strengthened prevention measures by handing out new powers to high street banks to delay and investigate payments suspected of being fraudulent by 3 days. The extended processing time for suspicious payments may lead to delays in legitimate transactions, making transparent communication and robust safeguards essential to maintain consumer trust.
Further collaborative efforts, such as Meta’s partnership with UK banks through the Fraud Intelligence Reciprocal Exchange (FIRE) program, can also aid the fight against fraud. Thanks to direct intelligence sharing between financial institutions and the world’s biggest social media platform, FIRE enhances the detection and removal of fraudulent accounts across platforms such as Facebook and Instagram, not only disrupting scam operations, but also fostering a safer digital environment for users. The early stages of the pilot have led to action against thousands of scammer-operated accounts, with approximately 20,000 accounts removed based on shared data.
Additionally, education and awareness are crucial measures to protect consumers against APP fraud. Several high street banks have upgraded their banking channels to share timely content about the signs of potential scams, with increased public awareness helping consumers identify and avoid fraudulent schemes.
Improvements in policing strategies are also significantly contributing to the mitigation of APP fraud. Specialized fraud units within police forces have enhanced the precision and efficiency of investigations. The City of London Police and the National Fraud Intelligence Bureau are upgrading the technology for Action Fraud, providing victims with a more accessible and customer-friendly service. Collaborative efforts among police, banks, and telecommunications firms, exemplified by the work of the Dedicated Card and Payment Crime Unit (DCPCU), have enabled the swift exchange of information, facilitating the prompt apprehension of scammers.
How AI is expected to change the landscape
The coming months will be critical in assessing these changes, as institutions, businesses and the UK government work together to shape security against fraud in the ever-changing world of finance.
While fraud is a terrifyingly big business, it’s only likely to increase with the evolution of AI, making it even more critical that such changes are effective. According to PwC, “There is a real risk that hard-fought improvements in fraud defences could be undone if the right measures are not put in place to defend against fraud in an AI-enabled world.”
Chatbots can be used as part of phishing scams, for example, and AI systems can already read text and reproduce sampled voices, making it possible to send messages from “relatives” whose voices have been spoofed in a similar manner to deepfakes.
Along with other innovations, tools and collaborations, however, the APP fraud mandate, UK legislation and FIRE can all contribute towards redressing such technological advances. Together, this can give financial institutions a much-needed boost in the fight against fraud, providing a more secure future for customers.
Business
AI and Data Interoperability are Crucial for Success in the Financial Industry

Source: Finance Derivative
Written by Yohan Lobo, Senior Industry Solutions Manager, Financial Services at M-Files.
Businesses within the financial services sector are among the industries leading the way in delivering AI initiatives to enhance services and improve decision-making however, rich data and strong infrastructure is the essential foundation for successful implementation.
Still plagued by inefficient manual processes and lack sufficient data resources, only 31% of organisations are on track with AI integration. Models that operate with AI are only as good as the data we feed into them so firms need an optimised system that can handle the high volumes of client and business data.
Financial institutions should address these gaps by investing in a robust data infrastructure that connects these siloed sources, creating a firm foundation on which they can build new AI initiatives.
The Pitfalls of Unorganised Data
Financial information can often be scattered across various locations in a range of formats, such as market insight presentations analysis, underwriting documents, or client emails. Without a predefined format, this disconnected data makes it challenging for AI systems to interpret information effectively and delivers inaccurate analytics that could take the business in the wrong direction.
Many institutions need help organising documents generated across disconnected systems and stored in duplicate data stacks which may produce conflicting versions of the truth. In a sector where client relationships are built on trust, responding to these data issues using obsolete tools, disrupted workflows, and any misstep in data consistency could lead to reputational damage, financial loss, or regulatory fines.
Organizing financial data like transaction records, customer data, and financial reports under centralised and labelled repositories, will make data collection and analysis for projects more accessible.
With these data management tools, firms can automate the process of organizing unstructured data that is easy to find, store and use. This can liberate their teams from the drudgery of manual processes while eliminating the potential for human error, resulting in richer data sources that is ready to fuel AI powered productivity.
Demystifying AI into a Workforce Ally
Workforce preparation and readiness may be an underestimated aspect of AI business readiness employees might be sceptical of AI accuracy and capability based on anecdotal stories following the failed usage of this new technology.
In 2023, a US attorney found himself embroiled in an AI disaster after using an AI chatbot to research precedents in a lawsuit against Colombian airline Avianca. In this case false names, numbers and internal citations were provided based on unverified online sources. The financial services sector is not immune from these types of incidents if generative AI tools are not used appropriately with a clear understanding of the source data. AI tools built on poorly managed inaccurate or incomplete company data can also provide outputs that suffer from similar “hallucinations”.
The rapidly evolving nature of AI tools means that means that both the value and risks are unclear to many users. Firms that do not properly articulate the value and limitations of AI may face inertia amongst workers. It is important to demystify the technology and show how it can improve work experience whilst setting out a framework for appropriate usage that aligns to client and regulatory expectations.
Training and upskilling workers can help explain the fundamentals of AI and teach hands-on skills in using these tools within their job functions, bridging any existing skills and knowledge gaps. This contextual understanding can showcase operational use of AI to assist with dull, repetitive tasks, thus opening up time for teams to focus on growth work that they enjoy and also adds value to firms’ progression.
Managing High Traffic and Data with Cloud
A recent report by Microsoft identified significant bottlenecks that can disrupt AI momentum; a key factor being low levels of compute capacity and adoption of background technologies such as cloud. Despite all its benefits, AI within data infrastructure does require substantial computing power and storage, making on-premise solutions cost-prohibitive. 31% of business have yet to adopt cloud and with the UK lagging other countries in digital technology infrastructure, businesses will need to become more familiar with this technology. Here, cloud computing emerges as a game-changer to grant businesses the flexibility needed to keep sensitive data secure while providing the computational power needed.
Leveraging cloud-based data management tools allows firms to store, process, and scale to accommodate increased traffic, which is particularly beneficial for handling data loads during high transaction periods. This ensures smooth user experiences and utilises decentralised networks for distributed low costs.
The successful deployment of such cloud-based services can help financial companies process enormous amounts of customer data and connect them with AI-processing capabilities without investing in expensive servers. With its ability to accommodate various infrastructure and AI capabilities, cloud solutions can easily handle changes in data to deliver unparalleled employee and customer experiences.
Future Success with Strong AI Foundations
A well-structured and forward-thinking approach to AI is essential, but the quality of AI outputs will only be as good as the data infrastructure that supports them. With the right foundation, even the most advanced AI systems will be able to deliver actionable insights. While it is a complex undertaking, a supported data infrastructure can yield significant rewards for improved decision-making and enhanced customer experiences.
A holistic approach encompassing AI technology, processes, and people can build an AI-ready data infrastructure, allowing financial institutes to remain competitive and adapt to evolving demand. This will secure their position in an increasingly competitive market and ensure sustained success as the financial industry continues its digital transformation.

Navigating the risks of return-to-office mandates

Cultivating an Intuitive and Effective Security Culture

Empowering banks to protect consumers: The impact of the APP Fraud mandate

Stealthy Malware: How Does it Work and How Should Enterprises Mitigate It?

Future-proofing the workforce for AI innovations with continuous learning
