Interview With AML Expert Ross Delston
Anti-money laundering has been one of the dominant stories in financial services this year, and the trend isn't likely to abate anytime soon.
In this exclusive interview, attorney and AML expert Ross Delston discusses:
The latest AML trends, including Trade-Based...
Interview with Jennifer Bayuk, Former CISO at Bear Stearns & Co.
Governance is a term increasingly used in financial institutions, as banking/security leaders try to introduce new processes and disciplines to their organizations.
In this exclusive interview, Jennifer Bayuk, an information security specialist...
Brian Dean is Senior Vice President in the Privacy Department at Ohio-based Key Bank with assets under management of approximately $102 billion. A privacy professional for over eight years, Dean has long worked with Key management to begin the convergence journey. He refined this vision as an adjunct professor at a...
Information Security Media Group (ISMG), publisher of BankInfoSecurity.com and CUInfosecurity.com, recently posed a few questions to Debbie Wheeler, Chief Information Security Officer for Fifth Third Bancorp headquartered in Cincinnati, Ohio with approximately $111 billion in assets under management. In her current...
With the Identity Theft Red Flags Rule compliance date creeping closer, we contacted several banking institutions from around the country for their insights on keeping an information security training program robust and interesting.
We all know that employee and customer awareness are a big part of Identity Theft Red Flags Rule compliance. But what exactly is missing from banking institutions' current awareness programs, which must meet the new standards by Nov. 1?
We recently caught up with representatives of banking regulatory agencies to...
To quote from his own biography, Eugene H. Spafford is one of the most senior and recognized leaders in the field of computing. He has an on-going record of accomplishment as a senior advisor and consultant on issues of security and intelligence, education, cybercrime and computing policy to a number of major...
As part of the Nov. 1 Identity Theft Red Flags Rule compliance deadline, financial institutions must step up efforts to train employees and customers alike to be more cognizant of Identity Theft and its symptoms.
The idea behind the education is simple: Increasing security awareness prevents the crime from happening....
Following is a list of the 26 red flags identified for financial institutions in the interagency Identity Theft Red Flags Rule. Institutions must comply with this rule by Nov. 1.
So, if last week's indictment of 11 hackers by the U.S. Department of Justice and the U.S. Attorney General's office was just the "tip of the iceberg" in terms of information security threats to financial institutions and merchants, then what's below the surface?
More breaches, say industry and security experts,...
In a month of bad news for banking (see recent stories about IndyMac Bank and other failures), our recent series of articles and insights on Gramm-Leach-Bliley Act (GLBA) compliance delivers a reassuring message: Banking institutions are making progress in safeguarding customer information.
A "progressive learning...
BASICS
What is the CISSP?
The Certified Information Systems Security Professional (CISSP) certification is a broad exam, yet fairly balanced in its coverage of security topics. If you are responsible for maintaining IT security in your organization, this is an excellent exam to strengthen and expand your...
Stephen Northcutt, CEO of the SANS Technology Institute and an acknowledged expert in training and certification, addresses the role of certification and the state of education within Information Security.
Q: What is the role of certification in information security?
Northcutt: Certification means that someone...
When most people hear "Social Engineering," they think of the criminal aspects of the term. But the practice also has professional applications for security practitioners who want to help test and improve organizations' security practices.
Social Engineering is the act of gaining unauthorized access to systems or...
John Pironti, chief information risk strategist with Getronics, shares his insight on leading edge risk management practices for information security & banking professionals. His tips include:
Focus on Basic Principles
As we start looking at risk management and more specifically information risk management, which...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.