More than 220 million private records have been breached in the last three years. With the average cost of a data-leak incident reaching $6.3 million in 2007, organizations of all sizes must act to protect sensitive data.
One industry that is keenly aware of the importance of safeguarding personal information is...
For more than a decade, government and industry bodies around the world have issued a growing number of regulations designed -- in whole or in part -- to ensure the security, integrity and confidentiality of personal and corporate data . Combined, these individual regulatory guidelines outline what constitutes best...
Financial organizations must effectively manage a broad array of potentially damaging events caused or made possible by inadequate governance of user access to an enterprise's information assets. Such events range from policy and compliance violations of various regulations and measures, such as Sarbanes-Oxley Act...
One of the biggest challenges in managing financial service organizations is the complexity of controlling user access to information resources. Some of these organizations have attempted to implement roles-based systems to address these challenges, but real-world experience have shown that unless roles fit into a...
Debit card fraud is one of the most prevalent security threats against banking institutions and customers alike. In this interview, Daniel McIntyre, information security and business recovery analyst with Superior Bank of Birmingham, AL., shares his insight on:
The magnitude of the debit card threat;
Strategies...
Background checks are increasingly conducted by financial institutions for all levels of employees. What are some of the tips to use and traps to avoid when screening job candidates? Editorial Director Tom Field recently spoke with Les Rosen, President and CEO of Employment Screening Resources, a specialist in...
In the wake of record-setting bank fraud at Societe Generale, the risk of the Insider Threat is again on the front burner at financial institutions. In this exclusive interview with Editorial Director Tom Field, Jerry Murphy of the Robert Frances Group offers insight on:
The most common forms of Insider Threat at...
Interview With Jerry Murphy, SVP, the Robert Frances Group
In the wake of record-setting bank fraud at Societe Generale, the risk of the Insider Threat is again on the front burner at financial institutions. In this exclusive interview, Jerry Murphy of the Robert Frances Group offers insight on:
The most common...
TOM FIELD: So Greg, what is the value to an enterprise from automating user life cycle management as you have done?
GREG KYRYTSCHENKO: What used to take us approximately 10 days to complete from a provisioning user life cycle now takes about five to 10 minutes. So, the time to deliver has definitely been...
FIELD: I wanted to talk to you from the consumer's perspective. What are you seeing as the biggest areas of concern right now regarding identity theft?
BRODER: Well, I think consumers are always concerned about their privacy and running the risk that someone else will get hold of their information and will...
Greg Kyrytschenko, Information Security Manager, People's United Bank, CT., discusses identity and access management, including:
• How he tackled his own institution’s identity management project
• The value of automating user lifecycle management
• The ROI of identity and access...
Forensics has become a hot topic for a variety of internal factors, including the importance of the Internet to everyday business and, with it, the rise of electronic fraud.
Externally, financial institutions especially feel regulatory heat in the form of FFIEC GLBA Notification Rule, SEC/NASD Rule 3010 and even he...
Privacy breaches can have devastating impact upon organizations if they do not respond to them well - and ensure that their third-party service providers are also adequately protected. Register for this webinar to learn:
Why there are more privacy breaches than ever before
How to plan for - and respond to - a...
Information Security Media Group recently attended the BAI Retail Delivery Conference 2007 in Las Vegas. Our correspondents covered the expo floor from a vendor point of view, and we spoke with a number of vendors who had products or services specific to information security. In general, the vendors that had some sort...
The Internet has become a strategic customer acquisition and services distribution channel for financial services companies. Consumers are able to apply and obtain credit online, transfer funds, trade commodities and pay bills by simply clicking a few buttons from anywhere at any time. Unfortunately, in the online...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.