One of the pleasures of my job is that I get to talk to a lot of people. Bankers, regulators, analysts, security professionals. I enjoy the privilege of speaking to a broad range of thought-leaders and tapping into their insights into the challenges and opportunities of the world today.
And then, through the magic of...
"Noisy" threats like viruses, worms, and Trojans seem to get all the attention. But how aware is your CEO of the "quiet," insidious threats, like data loss and theft, which can have significant financial impact and may damage your company's brand? Often, investments in data protection are motivated solely by...
The National Credit Union Administration (NCUA) board has voted to begin repaying through a special assessment the $310 million it borrowed from the Treasury department for corporate credit union stabilization.
DHS says the department is taking multiple paths to assure the protection of critical IT systems run by industry, such as those used by banks, energy companies and utilities.
From ACH to ATM, payments to phishing, fraud schemes abound. And bank customers and businesses are the targets.
So what can banking institutions do to fight back?
Bob Neitz is the senior vice president in charge of the Fraud Corporate Risk Management Program at Wells Fargo. In an exclusive interview, Neitz...
Malware, Consumer Technology, Social Networks Head the List of Vulnerabilities
Know what scares security expert John Pescatore the most? The image of a remote employee sitting at a home office or public setting, plugging into an unsecured network, accessing critical business data via a personal laptop or...
Increased demand during a severe pandemic could exceed the capacities of Internet providers' access networks for residential users and interfere with teleworkers in the securities market and other sectors, the Government Accountability Office says.
Interview with Pete Fahrenthold of Continental Airlines, RIMS
Enterprise Risk Management (ERM) is a topic of interest throughout an organization - and increasingly at the board of director level.
But how does a security leader engage the board on ERM - and keep it engaged?
Pete Fahrenthold of Continental...
Federal rules now require institutions to manage their data so it can be produced quickly and completely if demanded by district court cases.
In this session Deputy CISO David Matthews will use his first-hand experience to provide your organization up to date information and documents on:
Compliance with Federal...
Organizations are leaping to embrace "cloud computing" - accessing virtualized resources via the Internet. But are they jumping too soon without weighing all the legal considerations regarding security and privacy? Register for this webinar to hear a government security leader's expert insights on:
e-Discovery and...
Seven banks and one credit union failed on Friday, Oct. 23, raising to 124 the number of 2009's failed institutions.
So far this year, 106 banks and 18 credit unions have been closed, acquired or placed into conservatorship.
Here is a rundown of the latest failures:
The House Financial Services Committee voted on Thursday to back the creation of the Consumer Financial Protection Agency (CFPA). The vote was 39 to 20 in support of the proposed agency, which would be able to wield new rules on many financial products including subprime mortgages and payday loans.
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
In August, Deborah Matz succeeded Michael Fryzel as chair of the board of the National Credit Union Administration (NCUA), the independent federal agency that charters and supervises federal credit unions.
Now, in an exclusive interview with Information Security Media Group, Matz says candidly:
2010's credit...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.