We no longer support this browser. Using a supported browser will provide a better experience.

Please update your browser.

Close browser message

Treasury and Payments

Improve your working capital, reduce fraud and minimize the impact of unexpected disruptions with our treasury solutions—from digital portals to integrated payables and receivables—all designed to make your operations smoother and more efficient.

Learn more about our treasury solutions:

Credit and Financing

Prepare for future growth with customized loan services, succession planning and capital for business equipment or technology.

Learn more about our credit and financing solutions:

Commercial Real Estate

Get the strategic support to be successful throughout market and real estate cycles with insights, hands-on service, comprehensive financial solutions and unrivaled certainty of execution.

Learn more about our commercial real estate solutions:

International Banking

Global opportunities mean global challenges. But real success means understanding the local markets you serve—which is why we bring the business solutions, insights and market perspective you need. 

Learn more about our international banking solutions:

Cybersecurity and Fraud Protection

Five Tips from Women Leaders in Cybersecurity

Cybersecurity best practices to help keep you protected.


This article was originally published in Commercial Banking’s magazine, Cybersecurity: Making Security Personal. In that issue, we introduced you to Meagan Ringel, JPMorgan Chase’s Head of Operational Excellence for Cybersecurity Operations, who talked about the talent gap in cybersecurity and the importance of increased diversity within the profession.

The firm is proud of the women making a difference in our cybersecurity operations. We’re highlighting a few leaders here, sharing their best practices to help clients avoid fraud attempts.

Jessica Colvin

JESSICA COLVIN

Global Head of Vulnerability Management & Assessments

Colvin is responsible for the discovery, response, remediation and governance of technology vulnerabilities.

CYBER BACKGROUND: Joined firm in 2004 and has held roles across Global Technology team, including four years in Asia

ADVICE: Whenever possible, set your personal computer and devices to auto-update so they always have the latest security.

FARRAH PATTERSON

Product Manager for Data Loss Prevention

Patterson drives firmwide engagement and strategy supporting data loss prevention.

CYBER BACKGROUND: GIAC Strategic Planning, Policy, and Leadership (GSTRT) certification

ADVICE: Share less and be wary of what you post on social media. Criminals can gather information from your profile that could help them gain access to more sensitive and valuable data.

Farrah Patterson
Rachael Schulder

RACHAEL SCHULDER

Service Delivery Lead for the Global Technology Cyber Operations Product

Schulder partners with business teams to deliver critical cyber operations capabilities and services for priority initiatives to protect the firm against attack.

CYBER BACKGROUND: Master’s degree in International Security Policy, inclusive of cybersecurity; Security+ certification; AWS and Google Cloud Platform Trainings

ADVICE: Mobile apps can collect personal data or tap into location tracking, cameras or microphones without users even knowing. When downloading apps, ensure permissions are restricted to only those capabilities required to operate them.

MICHELLE SHAW

Operations Lead for Oversight and Controls

Shaw manages daily operations including logistics, governance, training and client engagement.

CYBER BACKGROUND: Joined firm in 1999 as a fraud analyst, and self-taught over years since. “I took advantage of every resource available to me, mentorships, and was fortunate enough to have strong leadership.”

ADVICE: Create separate email accounts for sensitive and non-sensitive websites, e.g., banking, online shopping, etc. Never click on a link or file in an email until you validate the source, and never enter personal information in an email or text message.

Michelle Shaw
Tricia Reilly

TRICIA REILLY

Cyber Intelligence Product Manager

Reilly studies cyber threats and implements the firm's capabilities to detect and prevent attacks.

CYBER BACKGROUND: Master’s degree in telecommunications; AWS and Google Cloud Platform Trainings; Project Management Professional (PMP) certificate

ADVICE: Always be wary of emails from unknown sources. Take the time to read to ensure that it is from a trusted source. And don’t use public Wi-Fi, ever.

Technology and Disruptive Commerce Healthcare Midsized Businesses Government Cybersecurity and Fraud Protection

Get in Touch and Stay Informed

icon
Loading...