The past year has been an education for anybody in the banking industry. And the year's events have also had an impact on banking education, says Kirby Davidson, President and CEO of the Graduate School of Banking at the University of Wisconsin-Madison.
In an exclusive interview, Davidson discusses:
How the past...
The Obama Administration has a heavy emphasis on information security, and already we're seeing greater attention paid to cybersecurity and FISMA reform. Now is the time for government agencies to benchmark and strengthen their information security programs.
Learn from security veteran Patrick Howard, CISO of the...
Information security requirements and challenges change on a daily basis - and with them come growing opportunities for individuals with skills in digital forensics.
Rob Lee, a director with Mandiant and curriculum lead for digital forensic training at SANS Institute, discusses:
the growing need for digital...
Who could forget September 2008? With the failure of Lehman Brothers and the takeover of Merrill Lynch by Bank of America in one weekend, and then the subsequent failure of Washington Mutual -- the largest bank failure in history -- last September was a seismic month in the banking industry.
But from that turmoil...
The DoD has banned the use of USB devices after an unauthorized device containing "agent.btz", a variation of the Storm Worm, was connected to a sensitive DoD network causing massive outages. To ensure security without impeding government business, a new policy is forthcoming that will require the management and...
Two related banks in Kentucky and Indiana were closed by federal and state regulators on Friday, Sept. 18.
Irwin Union Bank, F.S.B., Louisville, Kentucky, and Irwin Union Bank and Trust Company, Columbus, Indiana - both subsidiaries of Irwin Financial Corporation, Columbus, Indiana - were shut down.
The landscape of hackers is filled with stories from those whose job is to hunt them down. SANS forensics instructor, Rob Lee, also a senior forensics consultant at the IT security consultancy Mandiant shares three "villain" examples of the types of attacks being seen in the field by the company's forensic...
Jobs in information security -- including architects, analysts and administrators with hot skills and competencies -- are among the IT opportunities offering the most employment security in the current economy.
This is the news from Foote Partners, LLC, a Florida-based research consultancy that focuses on IT...
It's been a year since the financial services industry was first rocked by the global recession. The 'crisis of confidence' resulted in scores of bank failures, major mergers and acquisitions, and a very public cry for regulatory reform.
A year later ... is the banking industry better off?
William Isaac, former...
The procedures, tasks, and behaviors that bear upon compliance can be overwhelming. Yet organizations that can master these activities, operate more efficiently, compete more effectively, and build their brands. Learn how Governance, Risk, and Compliance technologies can help.
This white paper presents a low risk,...
More than half of current cyber attacks against businesses and government agencies are focused on two common vulnerabilities, according to "The Top Cyber Security Risks," a new report based on data from actual attacks.
Organizations are doing a good job protecting their operating systems, but they're leaving their critical applications vulnerable to dangerous cyber threats.
This is the key takeaway - and to some extent the surprise - of the new Top Cybersecurity Risks report released on Sept. 15 by TippingPoint, Qualys, the...
Critical approaches to affordable fraud detection
Financial institutions are offering more and more online and self-service applications, as well as expanding the methods that consumers can use to access these applications.
But with the constant addition of new banking applications and access methods, financial...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.