The Federal Reserve Banks have 12 information security control deficiencies that must be improved, according to a new report from the U.S. Government Accountability Office (GAO).
On Monday, June 16, the GAO issued its annual audit report in connection with its requirement to audit the financial statements of the...
The Federal Deposit Insurance Corporation (FDIC) has made progress with its internal security controls, but still needs to make significant improvements to its security management practices.
This is the key finding of a recent report issued by the Government Accountability Office (GAO) in an audit of the banking...
In case you missed it - because it wasn't a huge headline anywhere - here's a bit of news about First Pryority Bank, a 108-year-old community bank based in Pryor, OK.
Well, first a bit of background. First Pryority was founded in 1900 by W.A. Graham,
Interview with Brian Huntley, VP & ISO, Camden National Bank
Just over two years ago, Brian Huntley arrived at Camden National Bank in Maine, charged with responding to regulatory guidance and transforming the bank's information security risk assessment program from one that was threat-based to one that is now...
The best offense is a good defense, especially when it comes to fighting criminal hackers.
Dr. Markus Jakobsson, principal scientist at Palo Alto Research Center and an adjunct associate professor at Indiana University, and Zulfikar Ramzan, a Senior Principal Researcher in the Advanced Threat Research Group at...
Bank of America is well known for its mobile banking services. Currently, the institution has 750,000 mobile banking customers receiving services on 400 different kinds of devices.
But did you realize that one of the ways BoA secures its electronic offerings is by providing its customers with abuse reporting...
Just because you aren't directly offshoring any of your core systems or processes doesn't mean your third-party service provider isn't.
It's a given that most organization's outsource critical functions - particularly technology - as a means to reduce IT expense. Yet, even if organizations outsource these functions...
Forensics has become a hot topic for a variety of internal factors, including the importance of the Internet to everyday business and, with it, the rise of electronic fraud.
Externally, financial institutions especially feel regulatory heat in the form of FFIEC GLBA Notification Rule, SEC/NASD Rule 3010 and even he...
During this discussion, attendees will learn:
What analytics are similar/different in Anti-Money Laundering and Fraud;
Trends for enterprise-wide case management and the combination of Anti-Money Laundering and Fraud prevention;
What are the integration areas and data requirements issues;
Latest developments...
Federal regulations require many organizations to conduct independent testing of their computing and networking environment at regular intervals. Many organizations comply with this requirement by conducting penetration testing and vulnerability analyses. These tests offer a snapshot of an organization's security...
Is your Microsoft environment compliant? In his new Quest white paper "Filling the Compliance Gap in Your Microsoft Environment," Windows Security expert Randy Franklin Smith examines the importance of compliance in today's business world.
Learn how you can ensure your data will be trusted in a court of law and...
Join Information Security Media Group's Richard Swart in a conversation with Nathan Johns, former Chief of Information Technology at the FDIC. Based on his years of experience with banks, technology and audits, Johns offers his thoughts on training (classroom, online and hands-on), as well as advice for people just...
The latest disclosure of a data breach involving financial information points up the need for a comprehensive response program, including complying with federal and state notification laws. Fidelity National Information Services revealed in July that a former employee of its Certegy check processing unit stole...
It's always sitting there like the 800-pound gorilla in the room - the upcoming IT Audit at the institution. No one asks if it's still there, because we all know it is. We've all gone through at least one IT audit, some successfully, others of us have been handed a list of recommendations from our auditors. One of the...
Understand why IT Audit is needed and what it will achieve
Gives attendees tools to use in preparing for IT Audit
Learn to identify, evaluate and improve IT Controls
Learn how to continuously collect and categorize information for year round availability
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.