Assessing Encryption Standards for Financial Institutions
Critics of the Heartland Payment Systems data breach have called out for tougher encryption standards for financial institutions and their third-party service providers. Applications for encryption are all around us from encrypting email traffic to board communications, remote access and mobile & Internet banking.
Register for this webinar to learn the encryption basics and to understand recent advances, including:
- Which data every financial institution should consider encrypting;
- Technological and business process challenges of encrypting data;
- Things you should ask ALL of your vendors about encryption technologies used in their products or services;
- Regulatory mandates regarding data encryption.
Encryption is the process of obscuring information to make it unreadable without special knowledge.
In the mid-1970s, strong encryption -- the process of turning computer data into code that can be read only by someone with a key to the information --emerged from the sole preserve of secretive government agencies into the public domain, and is now used in protecting widely-used systems, such as Internet e-commerce, mobile telephone networks and bank automatic teller machines.
In financial services, the adoption of distributed computing has radically increased the speed and amount of customer data being transmitted, stored, or shared with business partners.
As a result, in 2005 the Federal Financial Institutions Examination Council (FFIEC) set a 2006 deadline for U.S. banking institutions to implement two-factor authentication to secure their transactions - a move that encouraged many institutions to increase interest in encryption. Today, encryption is used by institutions for the transmission of information across networks, as well as for storage of information on computers.
The purpose of this webinar is to provide the practical information on the basics of encryption, answering fundamental questions such as:
- What should my institution encrypt - and where?
- What technological challenges will we face in encryption?
- Where is the best place to get started when encrypting critical information?
You might also be interested in …