Swart: Let’s start talking about risk management, but rather talking about traditional issues of information and business impact analysis. I was wondering, is there some fundamental question or fundamental process that banking and finance executives should start with when they start thinking about risk...
What is the biggest lesson learned from the fast-moving wildfires that scorched a seven-county wide swath of Southern California in late October? “Have a plan.â€
When it comes to information security, there are as many ways to go wrong as to go right. That is why, before a financial institution attempts to implement and improve its security risk management process, it must examine its fundamental level of maturity. Is the organization ready for risk management?
It’s hard enough to secure the data you control. But how about when your employees are running around plugging in unapproved USB drives into computers and sending out unencrypted sensitive information in emails to customers, putting your institution at risk for a data breach?
Know What Assets You Have and Where They Are – This may sound very basic, but after one laptop turns out to be missing, the basics look like very good rules to follow
Interview with William Henley, Director of IT Risk Management, Office of Thrift Supervsion (OTS)
In this interview, Henley discusses the impact of the California wildfires and reports on the number of thrifts that activated their incident management and disaster recovery plans. Henley also discusses the critical...
John Pironti discusses the fundamental steps that a financial organization must take to design an effective risk management program. He emphasizes the danger of focusing on the technology, instead of on the data flows in an organization. In this interview, you will learn strategies to minimize your risk from data...
The estimated number of reported credit card numbers that were taken in the TJX breach has doubled from more than 45 million to nearly 100 million accounts being affected, according to VISA.
What Does Security Leadership Entail?
Information Security Media Group (ISMG) publishers of BankInfoSecurity.com and
CUInfosecurity.com, recently posed this and other questions to Debbie Wheeler, Chief
Information Security Officer for Fifth Third Bancorp. In her current role she is responsible
for...
"I wonder what it would be like to go home at 5 PM today?" says Bruce Coffing, an information
security officer responsible for identity and access management at LaSalle Bank, a large
Midwestern bank ($113 billion in assets) serving individuals and businesses with over 400 branch
locations. He cannot recall the...
Betsy Broder offers practical advice for financial institutions on best practices to protect their customer information, and explains the federal government's efforts to address ID theft. She also addresses possible legislation that could affect a financial institution's data security and identity theft prevention...
UPDATED 10/31 -- For more than a week, wildfires ravaged Southern California, and financial institutions in the area were forced to temporarily close branches and initiate their emergency response plans.
The wildfires are slowing, and as firefighters work to extinguish the last of the fires, news has been positive...
Featuring Elan Winkler, Director of Messaging Product Marketing, Secure Computing
Listen to this interview for insights on how to create a "culture of compliance", building the right systems, processes and skills to solidify your regulatory compliance program today - and for the future.
Among the topics...
Sometimes a Breach is as Simple as Walking in the Front Door Chris Koger is not an actual identity thief, but he may play one soon at a bank branch near you.An Atlanta-based “ethical hacker” and information risk assessor, Koger specializes in human, operational and physical weaknesses of small- to...
To safeguard digital customer files and stymie potential identity thieves, Brintech’s Chris Koger has a quick list of tips for bank officers. They’re based on the most common errors that risk assessors come across
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.