Executives deal with risk all of the time, except that is, information technology risk. For many non-IT leaders in government and business, IT risk is outside their comfort zone. Oregon CISO Theresa Masse wants to change that.
Imagine drafting the top IT security minds into a defense force to protect the nation's critical IT infrastructure. Defense Minister Jaak Aaviksoo and other Estonian leaders mull the possibility of instituting such a draft.
Fraud attempts will escalate, not diminish, as new threats and channels blossom in 2011. Growth in mobile banking and the use of social networks are expected to pose new security challenges, experts say.
What are the key banking/security topics on the minds of leaders of the nation's largest institutions? Paul Smocer of BITS discusses the latest trends, threats.
Steve Elefant, CIO, Heartland Payment Systems
One theme repeated by every major Obama administration officials speaking RSA Conference 2010, the IT security conference held in early March in San Francisco, was the need for the government and business to work together to protect the nation's critical IT...
"Historically, there's been a dichotomy between network security on the one hand and investigative process on the other," FBI Director Robert Mueller says. "It has been a great divide between us but needn't be."
Government and business must think creatively to help safeguard America's digital assets, says Melissa Hathaway, the former White House acting senior director for cybersecurity who led President Obama's 60-day cybersecurity policy review.
Hathaway, an interview with GovInfoSecurity.com, cited the innovative...
The public-private consortium that published last February the Consensus Audit Guidelines, or CAG, will issue a new report that will link specific automated tools with its critical security controls.
The Federal CIO Council recommends that agencies' decision to permit social media must involve a collaborative, risk-based decision-making process that requires strong business justifications that identify mission requirements.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.