Card Not Present Fraud , Fraud Management & Cybercrime , Governance & Risk Management

Insider Threat: Lesson from the Physical World

Also, How Organizations Fall Short on Offering Identity Protection Services
Insider Threat: Lesson from the Physical World

The latest edition of the ISMG Security Report leads off with an interview with the co-editor of a new book, Inside Threat, who uses examples from the physical world that can be applied to the virtual world.

In the Security Report, you'll hear (click on player beneath image to listen):

  • Scott Sagan, the book's co-editor, discuss how lessons can be applied to online insider threats from the assassination of Indian Prime Minister Indira Gandhi and the anthrax attacks that occurred shortly after the September 11 terrorists assaults;
  • ISMG Security and Technology Editor Jeremy Kirk report on the increase in certain types of fraud despite a years-long move to shore up the security around payment cards in the United States;
  • Lawrance Evans Jr., director of financial markets and community investments at the Government Accountability Office, explain the shortcomings of many organizations on how they decide what kind of identity protection services to offer customers and citizens; and
  • About leading information service providers saying they will not sell their customers private information without permission, despite Congress allowing them to do so.

The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Check out our March 28 and March 31 reports that respectively analyze British Home Secretary Amber Rudd's call for an encryption workaround and testimony presented at a Senate Select Committee on Intelligence hearing on Russia's attempt to influence the U.S. presidential election.

The next ISMG Security Report will be posted on Friday, April 7.

Theme music for the ISMG Security Report is by Ithaca Audio under the Creative Commons license.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.