To quote from his own biography, Eugene H. Spafford is one of the most senior and recognized leaders in the field of computing. He has an on-going record of accomplishment as a senior advisor and consultant on issues of security and intelligence, education, cybercrime and computing policy to a number of major...
Interview with Brent Rickles, SVP, First National Bank of Bosque County, on Securing Financial Data and Systems Through Application Whitelisting
"Whitelisting" is a new twist on information security. Instead of trying to find a software solution that keeps all of the potential bad guys out of your systems,...
Interview with Cyber Crime Expert Eric Fiterman
In the wake of the arrests of 11 hackers tied to the TJX data breach, security experts everywhere are warning of bigger, bolder threats to come.
So, what should banking institutions have learned from TJX-style breaches, and what can they do now to protect their...
Interview with William Henley, Director at the Office of Thrift Supervision
The downturn in the U.S. economy has financial institutions challenged to "do more with less." While the focus continues to be on the mortgage crisis, William Henley, Director, IT Risk Management for the Office of Thrift Supervision,...
Interview with Tom Field, Editorial Director at Information Security Media Group
As Nov. 1 looms, Identity Theft Red Flags Rule compliance is an absolute must for financial institutions. Information Security Media Group recently surveyed 300 banking and credit union leaders to gauge their progress toward...
Interview with Nathan Johns of Crowe Chizek and Company
Gramm-Leach-Bliley - it's at the heart of every financial institution's security program. In this exclusive interview, Nathan Johns, formerly of the FDIC, discusses current GLBA compliance trends, including:
Where institutions are most challenged to meet...
Excerpt of a Q&A with William Henley of OTS and Jeff Kopchik of FDIC
In conjunction with the recent Identity Theft Red Flags Rule Roundtable webinar, we conducted an interview session with William Henley of OTS and Jeff Kopchik of FDIC. Topics ranged from:
What should institutions expect on Nov. 1?
What have...
How to Put the "Business" back into Business Continuity Planning
Planning for disaster - whether a simple service disruption or a pandemic event - is paramount to any financial institution. But where does the responsibility fall?
Roger Batsel, SVP, Managing Director of Information Systems at Republic Bank,...
Interview with Evelyn Royer of Purdue Employees FCU
Everyone knows the date: Nov. 1 - that's when U.S. financial institutions must be in compliance with the Identity Theft Red Flags Rule.
With institutions now racing to meet or beat the deadline, Information Security Media Group is launching a new webinar, ID...
Interview with Investigator Kevin Sullivan
At the heart of the Bank Secrecy Act (BSA) and the core of any good Anti-Money Laundering (AML) program is the Suspicious Activity Report (SAR), which all financial institutions - banks, credit unions, brokers, casinos, insurance companies, etc. - must file when...
Interview with John Pironti of ISACA's Education Board
Security leaders are quickly evolving in their roles to focus more on the business of banking, less on the technology of information security.
This is the main message delivered by the results of ISACA's recent Information Security Career Progression...
Interview with Nalneesh Gaur, Chief Information Security Architect, Diamond Management & Technology Consultants
Mergers and acquisitions are a way of life for financial institutions, and so many pertinent business issues bubble up whenever an M&A is discussed.
But when does information security enter the...
Information Security Media Group recently attended the Gartner IT Security Summit 2008 in Washington, D.C. where the theme of the conference was information security 5-10 years from now. We interviewed vendors on the floor of the expo hall and heard about solutions focusing on topics ranging from application security...
Interview with David Jevans, Director, Anti-Phishing Working Group
Phishing, vishing, whaling - there are a growing number of electronic social engineering threats to unsuspecting consumers and their identities. Financial institutions and their customers increasingly are targets of these attacks. But they're also...
Philip Alexander, Information Security Officer at a Major US Financial Institution
Data leakage - it's one of subtle insider threats to information security at financial institutions. It's tough for leaders to know exactly where their critical data resides - never mind how it's being treated when it leaves the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.