FTC settlement agreements in two cases involving data exposed on peer-to-peer networks offer a reminder of the risks involved in using the networks. Social Security numbers, healthcare information and other personal details were exposed.
It's been more than 10 years since enactment of the Gramm-Leach-Bliley Act (GLBA). But the fundamental security tenets of GLBA are just as relevant today - especially as banking institutions look to conform to the recently released FFIEC supplement, "Authentication in an Internet Banking Environment."
Join banking...
The recent Sony and Epsilon breaches sent a strong reminder that companies lack transparency and aren't prepared to respond to a breach once it occurs, says Kirk Herath, Chief Privacy Officer at Nationwide Insurance Companies.
Amarillo National Bank is a regional financial institution with 18 locations, and a robust IT infrastructure composed of 150 servers, 600 workstations, platforms, network devices, applications, databases, physical security devices, card readers, doorway entry devices, HVAC units, UPS systems, biometric scanners, video...
Combining and correlating data to meet specific regulatory compliance requirements can prove cumbersome for financial institutions. Combining that data along with real-time threat detection and analysis, and working it into an incident response plan, can prove nearly impossible.
Register for this webinar for...
Leveraging Asset-Based Configuration and Vulnerability Analysis with Real-Time Event Management
It is crucial to monitor for compliance in a manner as close to real time as possible to ensure the organization does not drift out of compliance over time. The greater the gap between monitoring cycles, the more likely...
The Gramm-Leach-Bliley Act (GLBA), also known as The Financial Modernization Act of 1999, was enacted to ensure protection over customer's records and information. Authorization to implement this act was given to The Federal Trade Commission (FTC) with an effective date for compliance set on May 23, 2003.
GLBA...
Most organizations spend 30-50% more on compliance than they should 1. No matter the industry, with regulations such as GLBA, PCI, FISMA, SOX, and other regulations and mandates, it seems nobody is immune to scrutiny - but why spend so much more than what is necessary? In order to reduce the burden of an IT audit,...
Hi. This is Tom Field, Editorial Director with Information Security Media Group. Welcome to today's session entitled Log Management: How to Better Safeguard Customer Data. Your presenters and sponsors today are Chris Peterson, Founder and CTO of LogRhythm, and John Earl, CTO and Vice President of PowerTech. ...
Does your organization use real customer profiles and statistics to drive marketing efforts or real employee data for salary/benefit analysis? Is your organization conducting one of these or other critical business activities that require data analysis? While these activities are critical to organizational success,...
Many business activities require access to real production data, but there are equally many that do not. Data masking secures enterprise data by eliminating sensitive information, while maintaining data realism and integrity. Many Fortune 500 companies have already integrated data masking into their PCI DSS and GLBA...
We're barely out of January, and already this year has revealed itself as one to remember. Between the worsening conditions within the banking sector, the Heartland breach and a very noticeable shift in the regulatory climate, we're already hard pressed to pick this year's "Story of the Year." And somehow I suspect...
Phishing, malware and the Nigerian 404 scam. These are among the top 2009 agenda items for the M&I Corporation in Wisconsin - not just to fight the threats, but to make customers more aware of them.
Customer awareness is a huge priority for Wisconsin's largest bank, says Scott Coghill, CISM, Vice President,...
Regulatory compliance is the backbone of a financial institution's information security program. But compliance alone isn't enough, says John Pironti of ISACA's Education Board, who advises institutions to take a risk-based, not a "checklist-based" approach to security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.