Vendor Management: Banking/security leaders all know they need to get a better handle on it - but how?
Charlie Miller, former director of vendor governance at Merrill Lynch, offers his insight on improving vendor management, including:
The biggest challenges facing banking institutions;
Where to start the...
The Heartland Payment Systems (HPY) data breach came as an unpleasant surprise to many financial institutions and their customers in early 2009. What are the threats we should eye as we look ahead to 2010?
In an exclusive interview, Bryan Sartin of Verizon Business, discusses the company's exhaustive research of...
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
What are some of the key audit and risk trends to track? David Melnick of Deloitte answers that...
President Obama on Wednesday spelled out the details of his long-awaited plan for financial services regulatory reform. In an exclusive interview, Christie Sciacca, formerly with the Federal Deposit Insurance Corporation, currently a director with LECG in Washington, D.C., discusses:
The biggest news from Obama's...
With the Obama administration's focus on cybersecurity, this is a good time to start or move into an information security career. And Regis University in Colorado is one institution offering state-of-the-art education for undergraduates and graduates alike.
In an exclusive interview, Daniel Likarish, faculty of the...
On Thursday, the World Health Organization declared the H1N1 virus to be the first global pandemic in over 40 years.
In an exclusive interview, pandemic expert Regina Phelps explains exactly what this means, discussing:
How organizations should respond to this announcement;
Lessons learned so far from the H1N1...
Texas attorney Richard Coffman was the first to file a class action suit against Heartland Payment Systems (HPY) after its data breach was announced publicly this past January.
In an exclusive interview, Coffman discusses:
The status of legal actions against Heartland;
What's unique about the Heartland case;...
Email security is an issue for businesses and agencies of all sizes. To tackle that challenge, BITS and eCert Inc. have just released a new paper entitled "Email Sender Authentication Deployment."
In an exclusive interview, Paul Smocer, VP of Security at BITS, discusses:
Top email security challenges facing...
Data and privacy protection - there's much that government, industry and consumers alike can do to improve information security. And the Federal Trade Commission (FTC) is at the heart of education and enforcement efforts.
In an exclusive interview, the FTC's Joel Winston discusses:
Top privacy risks facing...
In the face of fraud, enterprise authentication is the key to helping to prevent information security breaches. But how do you deploy solutions that are at once versatile, compliant and cost-effective?
Steve Neville, Director of Identity Products and Solutions at Entrust, discusses:
The top enterprise...
Identity and Access Management (IAM) - it's a challenge for banking institutions of all sizes. And with institutions continually merging, acquiring and establishing new partnerships, the IAM challenge is only growing.
In an exclusive interview, Jay Arya, 1st VP of Information Security at Investors Savings Bank,...
Doug Brown Discusses Mobile Strategy, New Products, Biometric Security
Bank of America was one of the first institutions to move toward mobile banking in a big way. Two years into the initiative, Doug Brown, SVPO of Mobile Product Development, discusses:
Mobile trends at BoA;
Security hurdles the institution...
Vendor management was one of the hot regulatory topics going into 2009, and it's only gotten hotter as the year has unfolded.
James Christiansen, a longtime financial services/security leader and currently CEO of Evantix, discusses:
Vendor management trends at financial institutions;
How the Heartland breach...
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;
Potential career paths in cybersecurity.
Nadia D. Short...
In these times of mergers and acquisitions in the banking industry, identity and access management (IAM) is a huge challenge.
Mike Del Giudice of Crowe Horwath LLP shares insights on:
IAM trends in financial services;
How banking institutions are tackling IAM challenges;
The 'gotchas' to avoid.
Del Giudice...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.