TOM FIELD: So Greg, what is the value to an enterprise from automating user life cycle management as you have done?
GREG KYRYTSCHENKO: What used to take us approximately 10 days to complete from a provisioning user life cycle now takes about five to 10 minutes. So, the time to deliver has definitely been...
FIELD: I wanted to talk to you from the consumer's perspective. What are you seeing as the biggest areas of concern right now regarding identity theft?
BRODER: Well, I think consumers are always concerned about their privacy and running the risk that someone else will get hold of their information and will...
Greg Kyrytschenko, Information Security Manager, People's United Bank, CT., discusses identity and access management, including:
• How he tackled his own institution’s identity management project
• The value of automating user lifecycle management
• The ROI of identity and access...
Information Security Media Group recently attended the BAI Retail Delivery Conference 2007 in Las Vegas. Our correspondents covered the expo floor from a vendor point of view, and we spoke with a number of vendors who had products or services specific to information security. In general, the vendors that had some sort...
Betsy Broder offers practical advice for financial institutions on best practices to protect their customer information, and explains the federal government's efforts to address ID theft. She also addresses possible legislation that could affect a financial institution's data security and identity theft prevention...
Featuring Elan Winkler, Director of Messaging Product Marketing, Secure Computing
Listen to this interview for insights on how to create a "culture of compliance", building the right systems, processes and skills to solidify your regulatory compliance program today - and for the future.
Among the topics...
Deloitte & Touche Report Says ID Management, Regulatory Compliance are Top Concerns Information security has risen to the “C-level†or board level and is seen as a critical issue at many financial institutions worldwide, according to a new global survey by Deloitte & Touche LLP. The currencies, cultures...
Analysts at Gartner and IDC identify “super user†access as the root of three of the top eight common sources of compliance risks. But what can you do about it? Listen to this podcast addressing the following questions:What is the super user?What security risks do super user accounts create?What steps can...
Analysts at Gartner and IDC identify “super user†access as the root of three of the top eight common sources of compliance risks. But what can you do about it?
Listen to this podcast addressing the following questions:
What is the super user?
What security risks do super user accounts create?...
As organizations continue to adopt hybrid and remote work models, employees are no longer working behind office firewalls. Access to highly sensitive data can now come from anywhere, on any device and on any network, even those not managed by the enterprise.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.