This one was almost predictable.
We were just days away from Aug. 1, the date after which the Federal Trade Commission (FTC) would start enforcing compliance with the Identity Theft Red Flags Rule.
Then came the announcement from the FTC that it's going to extend the deadline. Again.
Risk management is a common theme across and within businesses, and at North Carolina State University the Enterprise Risk Management (ERM) program is attracting notice from prospective employers and students alike. Mark Beasley, head of the school's ERM initiative, discusses:
What makes the program unique;
The...
Risk management is a common theme across and within businesses, and at North Carolina State University the Enterprise Risk Management (ERM) program is attracting notice from prospective employers and students alike. Mark Beasley, head of the school's ERM initiative, discusses:
What makes the program unique;
The...
To be filed under the category of "One small step, one giant leap ..."
It's just come to my attention that when President Obama revealed his administration's cybersecurity policy at the end of May, the document's introduction featured a prominent reference to an article published on our sites in February of this year.
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
What are some of the key audit and risk trends to track? David Melnick of Deloitte answers that...
So, General Motors files for bankruptcy today. Whoever thought such an event would unfold in our lifetimes - that the U.S. leader in one of the top industries of the 20th century would sputter into the 21st and end up broken down beside the road, like a car whose owner neglected to heed the "Check engine" light?
She did a Geithner.
In making her first public appearance since delivering her long-awaited cybersecurity review to President Obama last week, Melissa Hathaway took to the stage at the RSA Conference in San Francisco on Wednesday. And she did exactly what Treasury Secretary Timothy Geithner was criticized for when...
And so it begins ...
As this morning dawns on San Francisco, so begins the 2009 edition of the RSA Conference.
As anyone in information security can tell you, this is the Mardi Gras, the Super Bowl, the event in the industry. It's where security professionals from all walks of the public and private sectors come...
OK, so here's a reaction I never expected.
We've talked a lot about the banking crisis over the past year - the differences between Wall Street and Main Street, and how all financial institutions are impacted in one way or another by fallout from the industry's "3 B's," Bailouts, Bernie and Bonuses.
It is an age old question: Who really is in charge of security? A look back into history, one can see the origination of the word "password" and how it came from the guard at the gate of a city or castle, who upon approached, would say "Halt, who goes there?"
Angry about the Heartland data breach?
Anxious because you have an upcoming regulatory exam?
Frustrated by the effects of the global recession, and wondering when the heck we're going to climb out of it?
Because of the economic conditions, risks to organizations - from the inside and out - are at a critical high. Risk managers at public and private organizations are forced to make careful decisions on how to invest scarce resources.
In an exclusive interview, Joe Restoule, President of the Risk and Insurance...
Every day I'm driving to or from work -- or even on the weekends - it seems like I hear about some new urgent priority that I must be aware of, whether it be the flailing economy, President Obama's directives, data breaches, or any number of other news-worthy items. But I love the news - so I don't mind!
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.