TOM FIELD: So Greg, what is the value to an enterprise from automating user life cycle management as you have done?
GREG KYRYTSCHENKO: What used to take us approximately 10 days to complete from a provisioning user life cycle now takes about five to 10 minutes. So, the time to deliver has definitely been...
If 2007 is any indication, then 2008 is going to be a wild year for financial institutions facing a slew of risk management issues.
Hanging like the sword of Damocles above all is the subprime mortgage crisis, which sees institutions looking for ways to avoid foreclosures and challenges surrounding underwriting....
It was a banner year for information security incidents, which proved to be indiscriminate. No national boundary, employee group or trusted service provider is exempt. And no breach is worth its cost in damages, reparations and loss of reputation. From these incidents, we draw 10 lessons learned to guide financial...
FIELD: I wanted to talk to you from the consumer's perspective. What are you seeing as the biggest areas of concern right now regarding identity theft?
BRODER: Well, I think consumers are always concerned about their privacy and running the risk that someone else will get hold of their information and will...
TJX Companies, Inc. (NYSE: TJX) has settled with all but one of the seven banks and associations that sued in a putative class action as a result of the intrusions into TJX’s computer system.
The TJX data breach. The Bank of India hack. The San Diego County wildfires. It's been a year full of memorable disasters - and some notable recoveries and regulations, too.
As we reflect on the biggest stories of 2007, it's clear that bad news was big. Some of our most popular stories were about Commerce Bank,...
Greg Kyrytschenko, Information Security Manager, People's United Bank, CT., discusses identity and access management, including:
• How he tackled his own institution’s identity management project
• The value of automating user lifecycle management
• The ROI of identity and access...
The TJX Companies, Inc. (NYSE: TJX) may have agreed to pay more than $40 million in a recently-announced settlement with Visa, but the collateral damage might have been significantly worse had the case gone to trial and revealed details of the security/compliance conditions that allowed customer data to be breached....
'Tis the season - for an upsurge in phishing attacks.
Researchers at information security company Cyveillance saw more than a 300 percent jump in attacks on Thanksgiving Day. This one-day spike is a tactic used by criminals, who like to strike on holiday weekends, often targeting smaller businesses and credit...
BONI: It is very, very important that we move beyond the idea that we have to just find the source of a problem and shut it down until now we have to find the source of the problem, investigate how and why and where the problem was instituted into our environments. And then share that with law enforcement or other...
MIKE D'AGOSTINO: Hi. This is Mike D'Agostino with Information Security Media Group, producers of BankInfoSecurity.com and CUInfoSecurity.com. We recently attended the BAI 2007 Retail Delivery Conference and Expo in Las Vegas, where the theme was "Customer Innovation in the Banking and Financial Services Industry."...
The cost of a data breach has gone up to nearly $200 per compromised customer record. And if your third-party service provider loses your customer data, the cost to you is even higher.
Bill Boni, Corporate Information Security Officer and Vice President, Motorola Corporation
Bill Boni shares lessons he has learned in his 30 year career in IT security and discusses how organizations should manage their IT security function in order to respond to emerging threats. He reviews:
• How...
Information Security Media Group recently attended the BAI Retail Delivery Conference 2007 in Las Vegas. Our correspondents covered the expo floor from a vendor point of view, and we spoke with a number of vendors who had products or services specific to information security. In general, the vendors that had some sort...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.