Interview with Jennifer Bayuk, Former CISO at Bear Stearns & Co.
Governance is a term increasingly used in financial institutions, as banking/security leaders try to introduce new processes and disciplines to their organizations.
In this exclusive interview, Jennifer Bayuk, an information security specialist...
Information Security Media Group recently attended the Gartner IT Security Summit 2008 in Washington, D.C. where the theme of the conference was information security 5-10 years from now. We interviewed vendors on the floor of the expo hall and heard about solutions focusing on topics ranging from application security...
Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives
The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all.
So, the Information...
Featuring Elan Winkler, Director of Messaging Product Marketing, Secure Computing
Listen to this interview for insights on how to create a "culture of compliance", building the right systems, processes and skills to solidify your regulatory compliance program today - and for the future.
Among the topics...
But More Work Necessary to Secure Customer Data, Confidence If the TJX data breach had not occurred, the increased push by retailers to comply with Payment Card Industry Data Security Standard (PCI-DSS) also may not have happened. This much-publicized incident seems to be the one that has most spurred merchants and...
Two members of the PCI Standards Council who are database security experts say the way to prevent a TJX-type breach from happening at your institution is simple -- be compliant with the Payment Card Industry Data Security Standard.
FinCEN and OCC Assess Civil Penalties Against Union Bank in Deferred Prosecution Agreement Union Bank of California, N.A., a wholly-owned subsidiary of UnionBanCal Corporation, based in San Francisco, earlier this month entered into a deferred prosecution agreement regarding charges of failing to maintain an effective...
CA Bill Would Make Bad Security Costly To Retailers Move over data breach notification laws: There’s a tough new bill in town, under which banks and credit unions could get money back from breached retailers that didn’t do right in protecting credit or debit card information. This new data breach...
Detailed user-level auditing for your UNIX and Linux environment is essential to achieving business-critical goals like regulatory compliance (e.g., GLBA, SOX, PCI, etc.), protection against insider attacks, and the ability to troubleshoot and diagnose system availability issues.
Centrify's auditing, access control...
Analysts at Gartner and IDC identify “super user†access as the root of three of the top eight common sources of compliance risks. But what can you do about it? Listen to this podcast addressing the following questions:What is the super user?What security risks do super user accounts create?What steps can...
Analysts at Gartner and IDC identify “super user†access as the root of three of the top eight common sources of compliance risks. But what can you do about it?
Listen to this podcast addressing the following questions:
What is the super user?
What security risks do super user accounts create?...
The recent revisions to the Bank Secrecy/Anti-Money Laundering Exam Manual are being seen as a move in the right direction by those close to the subject. According to Sepideh Behram, Senior Compliance Counsel at the American Bankers Association, the revisions made to the 2007 version reflect “certain points of...
The management of electronic data used to be a “nice thing to do.†Nowadays, the proper archiving, retention and monitoring, filtering and encryption of electronic data isn’t an option but imperative for financial institutions in order to meet compliance with regulations and federal law, including...
Research reveals that despite the importance internal auditors and corporate compliance professionals put on making sure the right controls are in place for access to systems and data, 70 percent of respondents in a recent survey of auditors said it is critical to IT compliance, the majority said there are...
Every time I see the movie “Rebel Without a Cause†I think what James Dean’s character would end up like when he went into the workforce. And I wonder how long he would last at most financial institutions.
Do you, as a information security professional feel like you’re surrounded by rebels...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.