It is an age old question: Who really is in charge of security? A look back into history, one can see the origination of the word "password" and how it came from the guard at the gate of a city or castle, who upon approached, would say "Halt, who goes there?"
This is something that used to really get me going as an information security practitioner. Someone would forward me (and everyone else they knew) an email that had the most dire of warnings - "EMAIL VIRUS WILL WIPE YOUR HARD DRIVE - Do not open !!!"
Angry about the Heartland data breach?
Anxious because you have an upcoming regulatory exam?
Frustrated by the effects of the global recession, and wondering when the heck we're going to climb out of it?
I was thinking after my last few Heartland-centric posts that I should probably get back to covering the basics of our practice and re-focus on all things regulatory. So I started skimming through my notes from recently completed fieldwork looking for ideas. The last few engagements happened to be with Credit Union...
The numbers are staggering as we try to get a handle on exactly how many institutions, cards and customers have been affected by the Heartland breach.
One single institution's report of the number of cards compromised by the Heartland Payment Systems (HPY) data breach - 10,000.
We're barely out of January, and already this year has revealed itself as one to remember. Between the worsening conditions within the banking sector, the Heartland breach and a very noticeable shift in the regulatory climate, we're already hard pressed to pick this year's "Story of the Year." And somehow I suspect...
Phishing, malware and the Nigerian 404 scam. These are among the top 2009 agenda items for the M&I Corporation in Wisconsin - not just to fight the threats, but to make customers more aware of them.
Customer awareness is a huge priority for Wisconsin's largest bank, says Scott Coghill, CISM, Vice President,...
Last week the NCUA announced the formation of the National Examination Team (NET) to "enhance the supervisory process in areas where economic conditions have adversely impacted federally insured credit unions." Or as I like to think of this move, the FDIC sneezes, and NCUA catches a cold.
Stupid robbery attempts are always funny, but when they happen in your backyard, well, they're even funnier.
A few weeks back, near my home in New Hampshire, a would-be robber held up a local Citizens Bank branch, and he attempted to get away with an undisclosed amount of cash.
Regulatory compliance is the backbone of a financial institution's information security program. But compliance alone isn't enough, says John Pironti of ISACA's Education Board, who advises institutions to take a risk-based, not a "checklist-based" approach to security.
Getting people on the phone this time of year can be quite a challenge. Between getting ready for the holidays, celebrating the holidays and trying to wrap up everything outstanding before year end there's simply a shortage of available time. And so as we work on building out the project schedule for the first...
Say the words $50 billion. Sort of rolls off your tongue. I'd be really upset if my family, firm or investment company had invested money with Bernard Madoff's alleged Ponzi scheme. It is shaping up to be one of the biggest investment frauds ever.
At a time when risks are high and consumer confidence is low, corporate boards of directors aren't paying nearly enough attention to information security and cyber threats.
This is the key takeaway from a new, which shows that there is a "gaping hole as wide as the Grand Canyon" in board and senior executive...
The market fluctuates, budgets shift, staffing resources change. But regulatory mandates? They stay the same.
Despite the economic downturn and its broad effects, banking institutions continue to be held to - and measure up to - exacting standards from regulatory agencies. In this exclusive interview, David...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.