Should software developers be held liable for their programming errors? A consortium of international cybersecurity experts says yes - and will present its plan for such a program on Tuesday. But at least one dissenting voice calls the effort "counterproductive and silly."
Are you and your customers better off today than you were a year ago?
This is the key question to be explored in the Banking Information Security Today survey. The 2010 study explores how banking/security leaders are responding to today's key banking issues, including fraud prevention, regulatory compliance and...
Third-party service providers are a staple of banking services in the information era. How can banking institutions get the most from these relationships?
Brian Hurdis, executive vice president of technology services at FIS, discusses:
The biggest information security challenges facing banking institutions in...
Interview with Brian Hurdis, EVP Technology Services, FIS
Third-party service providers are a staple of banking services in the information era. How can banking institutions get the most from these relationships?
Brian Hurdis, executive vice president of technology services at FIS, discusses:
The biggest...
A missing laptop may have caused a security breach at Flagstar Bank in Grand Rapids, MI, according to a letter the bank sent to some of its customers on Nov. 25.
The bank's letter tells customers that a laptop owned by an unidentified bank vendor was stolen and held an undisclosed number of customer social security...
Public and private sector organizations alike are charged with protecting critical data and responding to incidents that put information security at risk. In this session, David Matthews, deputy CISO for the City of Seattle, reveals:
Data protection challenges;
Tools to meet those challenges;
How to respond to...
Organizations are leaping to embrace "cloud computing" - accessing virtualized resources via the Internet. But are they jumping too soon without weighing all the legal considerations regarding security and privacy? Register for this webinar to hear a government security leader's expert insights on:
e-Discovery and...
As TJX, Hannaford and Heartland have taught us, incident response isn't just about reacting to your own institution's security breaches - it's about what happens when your card processors, merchants and vendors are compromised.
Register for this session for insight on:
How to immediately respond to a payment...
There are four "high risk" areas that aren't getting the attention they deserve as financial institutions work toward complying with the ID Theft Red Flags Rule, says a leading industry compliance expert.
Vendor Management: Banking/security leaders all know they need to get a better handle on it - but how?
Charlie Miller, former director of vendor governance at Merrill Lynch, offers his insight on improving vendor management, including:
The biggest challenges facing banking institutions;
Where to start the...
Application vulnerabilities are real and hackers are targeting industries that offer the best avenues for illicit monetary gains. At the same time, economic, competitive and time-to-market pressures are driving enterprises to use third-party commercial off-the-shelf (COTS), open source and outsourced code as part of...
Application vulnerabilities are real and hackers are targeting industries that offer the best avenues for illicit monetary gains. At the same time, economic, competitive and time-to-market pressures are driving enterprises to use third-party commercial off-the-shelf (COTS), open source, outsourced code and...
Vendor Management: Banking/security leaders all know they need to get a better handle on it - but how?
Charlie Miller, former director of vendor governance at Merrill Lynch, offers his insight on improving vendor management, including:
The biggest challenges facing banking institutions;
Where to start the...
Vendor management was one of the hot regulatory topics going into 2009, and it's only gotten hotter as the year has unfolded.
James Christiansen, a longtime financial services/security leader and currently CEO of Evantix, discusses:
Vendor management trends at financial institutions;
How the Heartland breach...
Organizations are being driven to increase the strength of authentication across a much broader user population than ever before. The most common way of authenticating employees and partners - username and password - is also one of the weakest in use today. Traditionally, providing stronger authentication using...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.