Skimming, tsunamis, chameleons - debit fraud schemes are on the rise. Join us for a free webinar where we'll talk about the latest in debit card fraud, and share our experiences in how to detect it.
This webinar will deliver:
Overview of Debit Fraud;
Current & Forecasted Trends;
Typologies & Sample...
The federal government mandates that agencies secure their computer desktops, but how can you ensure your lockdown policies are both effective and flexible?
Register for this session to learn:
Best Practice tips to ensure your desktop security policies meet Federal mandates;
How to increase user performance on...
"The cloud is not such a special technology necessarily that it is exempt from a security perspective, but is just another implementation of IT, and is a natural evolution of where we come from," Federal CIO Vivek Kundra says.
Implementing security controls and implementing the proper security controls aren't always the same thing, the Government Accountability Office points out in an audit of the Federal Housing Finance Agency.
Richard Chambers, President of the Institute of Internal Auditors (IIA) has three words of advice for organizations, executives and auditors looking to improve the role of internal audit: "Follow the risk."
Richard Chambers, President of the Institute of Internal Auditors (IIA) has three words of advice for organizations, executives and auditors looking to improve the role of internal audit: "Follow the risk."
In an exclusive interview, Chambers discusses:
Impact of the economic recession on internal audit;
How...
In terms of information security, what is the state of auditing as we end 2009 - and what are the trends foreseen for 2010?
Warren Stippich Jr., Practice Leader of the Chicago Business Advisory Services Group of Grant Thornton LLP, discusses:
Audit trends;
Where organizations are most vulnerable;
How audit...
Government agencies at all levels (federal, state and local) face unprecedented IT security threats from an increasingly organized and well-funded community of cybercriminals. Add stringent regulatory requirements to this and government agencies are faced with a daunting task of managing risk and adhering to...
In terms of information security, what is the state of auditing as we end 2009 - and what are the trends foreseen for 2010?
Warren Stippich Jr., Practice Leader of the Chicago Business Advisory Services Group of Grant Thornton LLP, discusses:
Audit trends;
Where organizations are most vulnerable;
How audit...
Organizations and security controls have changed, so senior management and regulators now demanding more of internal auditors.
Beyond financial and control issues, internal auditors now are being asked to assess the effectiveness of an organization's enterprise risk management program, says Warren W. Stippich, Jr....
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
DHS says the department is taking multiple paths to assure the protection of critical IT systems run by industry, such as those used by banks, energy companies and utilities.
Increased demand during a severe pandemic could exceed the capacities of Internet providers' access networks for residential users and interfere with teleworkers in the securities market and other sectors, the Government Accountability Office says.
Federal rules now require institutions to manage their data so it can be produced quickly and completely if demanded by district court cases.
In this session Deputy CISO David Matthews will use his first-hand experience to provide your organization up to date information and documents on:
Compliance with Federal...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.