In stepping up the fight against cyber crime, Michael Chertoff, Secretary of the US Department of Homeland Security (DHS), has a simple request: Send some of your best & brightest employees to help the government's efforts.
"We want your ideas, insights and I daresay your employees," Chertoff told the crowd in a...
As companies grow, the increase in employees can pose a serious concern, as security personnel are employed to help ensure the safety of employees. There are numerous measures that can be taken to improve physical security, and their cost-effectiveness should be considered before installation. Some methods of...
It was the scandal that rocked the banking world. French Bank Societe Generale recently revealed details of a disaster created by a rogue insider who cost the institution $7.2 billion in fraudulent trades. It was the biggest such scandal in history.
We recently spoke with Linda Najim and Jason Gaswirth of Diamond...
The insider threat is at the forefront of financial institution concerns these days, and a huge part of mitigating that threat is improving identity and access management. Read this interview for insights from Subhash Tantry, CEO of Fox Technologies, on:
Five principles of an effective access control management...
The insider threat is at the forefront of financial institution concerns these days, and a huge part of mitigating that threat is improving identity and access management. Listen to this interview to hear Subhash Tantry, CEO of Fox Technologies, on:
Five principles of an effective access control management...
More than 220 million private records have been breached in the last three years. With the average cost of a data-leak incident reaching $6.3 million in 2007, organizations of all sizes must act to protect sensitive data.
One industry that is keenly aware of the importance of safeguarding personal information is...
For more than a decade, government and industry bodies around the world have issued a growing number of regulations designed -- in whole or in part -- to ensure the security, integrity and confidentiality of personal and corporate data . Combined, these individual regulatory guidelines outline what constitutes best...
Financial organizations must effectively manage a broad array of potentially damaging events caused or made possible by inadequate governance of user access to an enterprise's information assets. Such events range from policy and compliance violations of various regulations and measures, such as Sarbanes-Oxley Act...
One of the biggest challenges in managing financial service organizations is the complexity of controlling user access to information resources. Some of these organizations have attempted to implement roles-based systems to address these challenges, but real-world experience have shown that unless roles fit into a...
Debit card fraud is one of the most prevalent security threats against banking institutions and customers alike. In this interview, Daniel McIntyre, information security and business recovery analyst with Superior Bank of Birmingham, AL., shares his insight on:
The magnitude of the debit card threat;
Strategies...
Background checks are increasingly conducted by financial institutions for all levels of employees. What are some of the tips to use and traps to avoid when screening job candidates? Editorial Director Tom Field recently spoke with Les Rosen, President and CEO of Employment Screening Resources, a specialist in...
In the wake of record-setting bank fraud at Societe Generale, the risk of the Insider Threat is again on the front burner at financial institutions. In this exclusive interview with Editorial Director Tom Field, Jerry Murphy of the Robert Frances Group offers insight on:
The most common forms of Insider Threat at...
Interview With Jerry Murphy, SVP, the Robert Frances Group
In the wake of record-setting bank fraud at Societe Generale, the risk of the Insider Threat is again on the front burner at financial institutions. In this exclusive interview, Jerry Murphy of the Robert Frances Group offers insight on:
The most common...
TOM FIELD: So Greg, what is the value to an enterprise from automating user life cycle management as you have done?
GREG KYRYTSCHENKO: What used to take us approximately 10 days to complete from a provisioning user life cycle now takes about five to 10 minutes. So, the time to deliver has definitely been...
FIELD: I wanted to talk to you from the consumer's perspective. What are you seeing as the biggest areas of concern right now regarding identity theft?
BRODER: Well, I think consumers are always concerned about their privacy and running the risk that someone else will get hold of their information and will...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.