TOM FIELD: So Greg, what is the value to an enterprise from automating user life cycle management as you have done?
GREG KYRYTSCHENKO: What used to take us approximately 10 days to complete from a provisioning user life cycle now takes about five to 10 minutes. So, the time to deliver has definitely been...
Many banking institutions today do business with customers in multiple states, but few security leaders are aware of the nuances of data breach disclosure laws in these different states. Some of the differences are subtle; others significant. Phil Alexander, an information security officer for a major bank, has...
TOM FIELD: Matt, we are going to talk about computer forensics and e-discovery. I wanted to ask you, how did you first encounter this topic of forensics in your work?
MATTHEW SPEARE: Sure. You know, for us we are really first exposed to forensics in 1997, when an employee complaint forced us to conduct an...
If 2007 is any indication, then 2008 is going to be a wild year for financial institutions facing a slew of risk management issues.
Hanging like the sword of Damocles above all is the subprime mortgage crisis, which sees institutions looking for ways to avoid foreclosures and challenges surrounding underwriting....
iPods. iPhones. Thumb drives. Personal laptops. Wireless headsets. They’re among the toys your employees just got over the holidays, and they’re rapidly being deployed to conduct business within your institution.
But did you also realize that these same consumer-friendly tools represent one of your...
It was a banner year for information security incidents, which proved to be indiscriminate. No national boundary, employee group or trusted service provider is exempt. And no breach is worth its cost in damages, reparations and loss of reputation. From these incidents, we draw 10 lessons learned to guide financial...
You've seen the biggest stories and security incidents of 2007. Now here's a list of the most popular federal agency releases and regulations of the year.
FIELD: I wanted to talk to you from the consumer's perspective. What are you seeing as the biggest areas of concern right now regarding identity theft?
BRODER: Well, I think consumers are always concerned about their privacy and running the risk that someone else will get hold of their information and will...
Mari Frank was an Identity Theft victim before most people even knew what Identity Theft was.
Read her personal story to see how she discovered the crime against her, ways she fought back, advice for consumers, and how she's become a nationally-known leader in the battle against Identity Theft.
TJX Companies, Inc. (NYSE: TJX) has settled with all but one of the seven banks and associations that sued in a putative class action as a result of the intrusions into TJX’s computer system.
The TJX data breach. The Bank of India hack. The San Diego County wildfires. It's been a year full of memorable disasters - and some notable recoveries and regulations, too.
As we reflect on the biggest stories of 2007, it's clear that bad news was big. Some of our most popular stories were about Commerce Bank,...
Betsy Broder, Assistant Director in the Federal Trade Commission's Division of Privacy and Identity Protection, discusses Identity Theft from a consumer's perspective, including:
The biggest areas of concern for consumers re: ID Theft
The state of consumer awareness
Fundamental best-practices to fight ID...
Rebecca Herold, privacy expert
Many different types of privacy breaches continue to plague organizations and their third-party service providers. Hear Rebecca Herold discuss:
Data breach response plans – where are the holes?
Notification plans (or lack thereof)
How to involve and ensure the security...
Greg Kyrytschenko, Information Security Manager, People's United Bank, CT., discusses identity and access management, including:
• How he tackled his own institution’s identity management project
• The value of automating user lifecycle management
• The ROI of identity and access...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.