Planning for disaster - whether a simple service disruption or a pandemic event - is paramount to any financial institution. But where does the responsibility fall?
Roger Batsel, SVP, Managing Director of Information Systems at Republic Bank, Louisville, KY., says it's time to separate duties: Let IT handle system...
Keeping abreast of what's going on in the regulatory compliance domain is something I need to do. It's sort of the life-blood of my career these days, as I spend most of my time either managing or executing audit and assessment activities predicated upon the various regs. Beyond wanting to be certain that my clients...
I was talking the other day with a friend who works at an information security risk company. He shared with me the higher-level details of a physical penetration test on which he tagged along.
We've known for roughly six months now that the Identity Theft Red Flags Rule compliance deadline is Nov. 1, barely four months away. How close, then, are banking institutions to meeting that deadline?
That is the question of the summer, and the answer will be found in the results of our new Identity Theft Red...
Our insightful content just became a whole lot more interactive - and opinionated.
With the debut of five new blogs on BankInfoSecurity.com and CUinfoSecurity.com, Information Security Media Group (ISMG) is opening the floodgates to a whole new level of informed opinion and two-way communication with its vast...
Finally, it's your turn to have your say.
Since first joining Information Security Media Group late last summer, one of my primary goals has been to debut a blog for BankInfoSecurity.com and CUinfoSecurity.com.
Today, proudly, I'm able to announce the launch of not just one blog, but five - with more to come in...
I started scoping out my next blog entry with PCI in mind (and how it will likely find its way into the community-bank/credit union space in a few years) and was blind-sided by one of my favorite nits to pick recently: the risks presented by poorly managed third-party vendor relationships.
Regulatory compliance rules my work day. It's the driving force behind my practice and the primary reason our clients become our clients; we're very good at understanding what needs to be done and then helping make sure that it does. So it's always an interesting conundrum when I'm asked by a client what PCI is, and...
On one hand, this step does show that the business has made a conscientious effort to plug a major security hole.
But on the other, can't you see that first lawsuit filed by a breached customer saying "Hey, you gave me this stuff and said my PC was safe ...?"
With just under five months to go before the Nov. 1 deadline, how close are financial institutions to compliance with the new Identity Theft Red Flags Rule?
This is the key question to be answered by a new survey from Information Security Media Group (ISMG), which seeks to shed new light on what tracks to be one of...
The clear message from banking regulators in their Senate testimony is: Banks are hurting.
The follow-up question is: Exactly how badly are they hurting, and how will their pain trickle down to impact information security programs and priorities?
Security leaders are quickly evolving in their roles to focus more on the business of banking, less on the technology of information security.
This is the main message delivered by the results of ISACA's recent Information Security Career Progression Survey of 1400 Certified Information Security Managers (CISMs) in...
The OCC recently issued a bulletin (2008-16) in which it targets application security and the need for banking institutions to properly address application security "whether internally developed, vendor-acquired, or contracted for." I for one am relieved.
Interview with John Pironti of ISACA's Education Board
Security leaders are quickly evolving in their roles to focus more on the business of banking, less on the technology of information security.
This is the main message delivered by the results of ISACA's recent Information Security Career Progression...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.