It's About Protecting the Network Endpoints
Last week's announcement of yet another unencrypted laptop being stolen - this time it is retailer The Gap's recruiting vendor and its gaping lack of security (the vendor laptop was stolen with personal information of 800,000 applicants Gap Press Release ) opens another...
Detailed user-level auditing for your UNIX and Linux environment is essential to achieving business-critical goals like regulatory compliance (e.g., GLBA, SOX, PCI, etc.), protection against insider attacks, and the ability to troubleshoot and diagnose system availability issues.
Centrify's auditing, access control...
The idea of having as many eyes and ears on the street is any police officer’s dream come true. The same idea applies to information security officers at financial institutions. What would you think if you could add to your headcount exponentially? Unless your senior management is on a spending spree that...
Today, financial services IT organizations need to secure more than just the people, systems and infrastructure that sit inside their buildings. IT organizations must secure a variety of mobile user groups like executives, brokers, agents, consultants, and contractors. Additionally, with the growth of online account...
This webcast will describe ways banks can mature and simplify user provisioning and Identity Life-Cycle Management:
Integrated compliance support and the larger governance picture
Integrated identity administration and user provisioning across platforms, applications and user-groups
Delegated administration...
While governments and industry watchdog groups are mandating security measures over privacy, healthcare and financial data, enterprises have their own business priorities and concerns that are equally vital to their ongoing success.
Companies are complex entities that create, modify, store, and move vast amounts of...
The recent announcement by Fidelity National Information Services, a financial processing company, that one of its employees at a subsidiary stole 2.3 million consumer records containing credit card, bank account and other personal information is yet another drop in the bucket of data leakage.
Why is insider fraud on the rise now? What are the trends?
What is the strategy of how to deal with it? Controls, analytics, etc.
What is the "day in the life" of a case/attack? What process does it typically go through?
How can one systemize the investigations? Technology, policy,
responsibility,...
As an information security professional at your institution, would you know what signs and indicators to monitor for an insider attack? Dr. Eric Cole, a noted information security expert who has studied insider threats and investigated them at financial institutions describes the problems aren’t only in...
While most financial institutions guard against the external threat of hackers, malware, and network intrusions, there is an insidious insider threat that lies hidden inside the walls of financial institutions. According to Dr. Eric Cole, a noted information security expert who has studied insider threats and...
The growing awareness of the insider threat, and the recognition that security
breaches by internal, trusted users are at least as risky as malicious outsiders, is pushing organizations to take action. Fueled by regulatory requirements, the market for various security solutions that can help detect and mitigate risks...
Manual processes leave financial institutions open to insider threats, said a study showing that nearly 60 percent of U.S. businesses and government agencies report they don't have the information or the technology to deal with insider threats to their network. This is according to a new study done by the Ponemon...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.