The 2014 Faces of Fraud survey is now closed. This survey helps us benchmark how organizations affected by today's financial security risks will address fraud and cyberthreats in 2014.
How equipped are organizations to detect and defend against advanced cyber attacks? Take the Next-Gen Protection: The 2013 Bit9 Cybersecurity Study and help us find out.
What are today's most predominant and damaging fraud incidents impacting banking institutions and their customers? And what anti-fraud investments are institutions making to thwart the fraudsters? Take the 2013 Faces of Fraud: The Threat Evolution survey and help us answer these questions.
Are organizations' incident response programs evolving to keep up with the new threat landscape? According to the Information Security Media Group 2013 Incident Response Survey, the answer is a resounding "no."
The 2013 Mobile Security Strategies survey is now closed for participation. Results will be available in the coming weeks, providing practical insights on emerging security trends and investments.
Stay tuned for analysis of how organizations will address the top mobile security challenges of 2013, with emphasis...
Government entities are focused increasingly on external threats to security and privacy. But how prepared are they for internal threats - specifically, those that manifest through their own printing and imaging devices?
If acknowledging a risk is one step toward mitigating it, then survey respondents at least have...
Security remains the biggest inhibitor for businesses and government agencies to adopt a comprehensive approach to cloud computing.
To determine the level of concern among those charged with their organization's security and/or their cloud computing initiatives, Information Security Media Group has launched the...
A follow-up to ISMG's 2011 Faces of Fraud Survey, this study looks not only at the latest fraud trends and how institutions are fighting back, but also at their progress in putting together layered security controls in conformance with the FFIEC Authentication Guidance.
Given the persistence of fraud threats and...
ACH, ATM, payment cards - we know what today's top fraud threats are to financial institutions. But how are these organizations fighting back? What are the most successful strategies for detecting and deterring threats, as well as educating customers and obtaining resources?
The Faces of Fraud: Fighting Back survey...
Are you and your customers better off than you were a year ago?
This is the key question for banking/security leaders at the dawn of 2010. Emerging from a year in which financial institutions struggled with the economy, the Heartland Payment Systems breach and other attacks, as well as the ongoing challenges to...
What level of education do information security professionals have today? What level do they need? Which industry certifications are musts? Where are the best career opportunities?
These are among the questions you can help answer by taking the Information Security Today: Career Trends survey.
A new, annual...
Exclusive Survey Sets the Agenda for How Banking Institutions Will Tackle Their Biggest Challenges
In 2008, the inaugural State of Banking Information Security survey identified customer confidence, vendor management and security awareness as key issues long before news events and global economic conditions...
In many ways, it's easy to quantify the effects of the current economic crisis. The fall of the large investment banks; Wall Street's historic losses; the closing of 15 banks so far this year, including Washington Mutual - the largest bank failure in history.
But how do you measure what is perhaps one of the greatest...
In May, the Office of the Comptroller of the Currency (OCC) became the first banking regulatory agency to issue a bulletin reminding institutions of the importance of application security as part of a sound information security program. All applications, whether internally developed, vendor-acquired, or contracted...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.