John Pironti discusses the fundamental steps that a financial organization must take to design an effective risk management program. He emphasizes the danger of focusing on the technology, instead of on the data flows in an organization. In this interview, you will learn strategies to minimize your risk from data...
RICHARD SWART: Hi. This is Richard Swart with Information Security Media Group, publishers of BankInfoSecurity.com and CUInfoSecurity.com. Today we’re speaking with Kenneth Newman. He joined the American Savings Bank as the Vice President of Security in March of 2005, and is responsible for managing their...
It's About Protecting the Network Endpoints
Last week's announcement of yet another unencrypted laptop being stolen - this time it is retailer The Gap's recruiting vendor and its gaping lack of security (the vendor laptop was stolen with personal information of 800,000 applicants Gap Press Release ) opens another...
Bruce Sussman, Senior Manager at Crowe Chizek's Risk & Attest Group speaks on meeting the challenges of PCI compliance and stopping data leakage.
Sussman draws upon his extensive experience as a VP of Audit, Fraud and Risk for one of the leading payment card networks and as a thought leader for the PCI compliance...
Breach is a Warning to All Financial InstitutionsThe announcement by online brokerage TD Ameritrade that a database had been breached reinforces an important lesson to other financial institutions: Know your systems and who’s accessing them.On Sept. 14, Ameritrade went public with the news that it had...
CA Bill Would Make Bad Security Costly To Retailers Move over data breach notification laws: There’s a tough new bill in town, under which banks and credit unions could get money back from breached retailers that didn’t do right in protecting credit or debit card information. This new data breach...
Richard Swart: Hi, this is Richard Swart with Information Security Media Group. Today I’ll be speaking with Debbie Wheeler, CISO of Fifth Third Bank. How are you doing this morning, Debbie? Debbie Wheeler: I’m doing well. Thank you.Swart: I appreciate you taking time to talk to us today. ...
Ken Newman discusses the challenges of getting employees to buy into training programs and some of the successful strategies he has used to deliver timely and effective training that focuses on protecting customer data. He also discusses the changes in the information security field and how this impacts an...
Incident Response Starts With a Comprehensive – and Tested – Plan of Action It’s 3 a.m., and your cell phone is buzzing off the bedroom dresser. Your boss is calling to tell you that the network servers that support your institution’s online banking site have been offline for the last two...
The Information Security Media Group podcast with Debbie Wheeler, CISO of Fifth Third Bank focuses on the role of effective risk management for IT security and data leakage prevention.
Debbie Wheeler, CISO of Fifth Third Bank discusses recent challenges and changes in the banking community. She highlights...
The management of electronic data used to be a “nice thing to do.†Nowadays, the proper archiving, retention and monitoring, filtering and encryption of electronic data isn’t an option but imperative for financial institutions in order to meet compliance with regulations and federal law, including...
When talking about data breaches and the need for security, whenever credit or debit cards are mentioned, the words "Payment Card Industry Data Security Standards" will appear. This apparently causes many in the financial services and retail industries to reach for that bottle of aspirin and a glass of water....
Information about the threats of identity theft seem to be everywhere -- media headlines, websites, billboards, television ads, and your financial institution has probably warned its customers of the problem.
The real question is – how bad is the problem? When you compare studies and reports, it can yield...
Employees play an integral role in protecting the assets of an institution, and as such, need to be adequately trained and made aware of the basic security practices which are frequently overlooked. A set-it and forget-it approach "we're protected because we have a firewall" to information security ignores end-users,...
The latest report by the IT Policy Compliance Group finds that nine of ten companies are exposed to financial risk from data losses and thefts that can be cost-effectively avoided. The report, “Why Compliance Pays – Reputations and Revenues at Risk,†finds the majority of the 475 firms surveyed must...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.