The Information Security Media Group podcast with Debbie Wheeler, CISO of Fifth Third Bank focuses on the role of effective risk management for IT security and data leakage prevention.
Debbie Wheeler, CISO of Fifth Third Bank discusses recent challenges and changes in the banking community. She highlights...
Can Happen Here – Be Vigilant It’s the worst nightmare for an information security pro: Your website is hacked, and user accounts are compromised.The announcement two weeks ago that the Bank of India website was compromised by 30 pieces of malware should be the “shot across the bow†for...
Current Protection Practices May Put Information at RiskWhile financial institutions are doing a "better job" than other businesses grappling with the Payment Card Industry's Data Security Standards, there are still compliance questions that need closer examination, according to David Taylor, president and CEO of the...
Join Information Security Media Group's Richard Swart in a conversation with Nathan Johns, former Chief of Information Technology at the FDIC. Based on his years of experience with banks, technology and audits, Johns offers his thoughts on training (classroom, online and hands-on), as well as advice for people just...
Analysts at Gartner and IDC identify “super user†access as the root of three of the top eight common sources of compliance risks. But what can you do about it? Listen to this podcast addressing the following questions:What is the super user?What security risks do super user accounts create?What steps can...
Analysts at Gartner and IDC identify “super user†access as the root of three of the top eight common sources of compliance risks. But what can you do about it?
Listen to this podcast addressing the following questions:
What is the super user?
What security risks do super user accounts create?...
The sixth anniversary of September 11th draws near, and the question floating among those in the financial services industry remains, “Is my institution ready in the event another 9-11 happens?â€For information security expert William Crowell, his thinking is that by having a completely integrated and...
The recent revisions to the Bank Secrecy/Anti-Money Laundering Exam Manual are being seen as a move in the right direction by those close to the subject. According to Sepideh Behram, Senior Compliance Counsel at the American Bankers Association, the revisions made to the 2007 version reflect “certain points of...
The management of electronic data used to be a “nice thing to do.†Nowadays, the proper archiving, retention and monitoring, filtering and encryption of electronic data isn’t an option but imperative for financial institutions in order to meet compliance with regulations and federal law, including...
Imagine the scene – it is the final battle of a prolonged war. No, we’re not talking about the Iraq war, this war is against your financial institution, and the last waves of enemy soldiers (hackers or other evildoers) are crashing in to take over customer data or computer networks. There are many...
Have you sat down in front of your screen and tried to discover why it is taking forever to download or you've found while troubleshooting there's been something added to the numerous operations that your PC computes? It may turn out to be that the source of your PC's slowing is spyware, software that was installed on...
When talking about data breaches and the need for security, whenever credit or debit cards are mentioned, the words "Payment Card Industry Data Security Standards" will appear. This apparently causes many in the financial services and retail industries to reach for that bottle of aspirin and a glass of water....
It’s an often heard comment by those in the banking industry -- the need for consistency in the examination processes that institutions must undergo. That message is being heard, and acted on. With the recent announcement by U.S. Treasury Secretary Henry Paulson of an initiative to ensure that compliance...
Research reveals that despite the importance internal auditors and corporate compliance professionals put on making sure the right controls are in place for access to systems and data, 70 percent of respondents in a recent survey of auditors said it is critical to IT compliance, the majority said there are...
Researchers from New Zealand’s Honeynet Alliance report that anyone is at risk on the internet. More increasingly attackers are now part of organized crime, set with the intent to defraud their victims.
The attackers goal: Deploy malware on a victim’s machine and to start collecting sensitive data,...