ISMG Releases ID Theft Red Flags Rule eBook

ISMG Releases ID Theft Red Flags Rule eBook Princeton, NJ - October 29, 2008 - - Information Security Media Group (ISMG), publisher of and, releases a new "survival guide" ebook dedicated to Identity Theft Red Flags Rule Compliance.

Nov. 1 is finally here, and financial institutions throughout the U.S. are still scrambling to meet their federally-mandated Identity Theft Red Flags Rule compliance deadline.

For the past year, ISMG has guided these efforts with articles, interviews, research, webinars and white papers. Now the best of this content has been compiled into a single ebook compilation that includes all the resources necessary to help institutions ensure not only their own compliance, but also that of their third-party service providers and key business partners.

This ebook includes:

  • A summary of the final rule and guidelines, including a listing of all 26 red flags;
  • A detailed look at the examination procedures for the new rule;
  • Insights from federal regulators and banking practitioners on what to expect post-Nov. 1;
  • Analysis of what compliance means to your institution and its customers for years to come.

"The ID Theft Red Flags Rule is a big deal for financial institutions, and it deserves big-deal treatment," says Mike D'Agostino, ISMG Marketing Director. "That's why we made this topic the subject of our first ebook compilation, giving readers easy access to the best of our premium content."

View the ID Theft Red Flags Rule ebook now

For more information about the ID Theft Red Flags Rule, check out this resource site:

About ISMG: With members representing over 13,000 financial institutions, and regular input from federal banking agency officers and their own board of advisors, ISMG delivers webinars and online training that is focused, timely and -- most important -- useful. Presented by actual practitioners and industry experts, each presentation (ranging from 90 minutes to two-plus hours) delivers how-to and practical information on the inner-workings of information security programs at financial institutions.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.