Interview with Jennifer Bayuk, Former CISO at Bear Stearns & Co.
Governance is a term increasingly used in financial institutions, as banking/security leaders try to introduce new processes and disciplines to their organizations.
In this exclusive interview, Jennifer Bayuk, an information security specialist...
Information Security Media Group (ISMG), publisher of BankInfoSecurity.com and CUInfosecurity.com, recently posed a few questions to Debbie Wheeler, Chief Information Security Officer for Fifth Third Bancorp headquartered in Cincinnati, Ohio with approximately $111 billion in assets under management. In her current...
Clearly all businesses are really under pressure given the current slow economic environment. However, the greatest impact on a financial institution no matter what is always its customer. "At the heart of a bank lies the customer and customer trust is paramount for financial institutions," says Doug Johnson from the...
Institutions of all sizes struggle with staffing resources - having enough hands available to tend to information security matters. At America First Credit Union in Riverdale, Utah, Lane Gittins, the Systems Security Manager, has learned to overcome this challenge by working in a consultative style - directing a...
Financial institutions are increasingly better prepared for a pandemic disaster, but cyber security attacks are a growing concern.
This is the message from the current and past chairmen of the Financial Services Sector Coordinating Council for Critical Infrastructure Protection and Homeland Security (FSSCC).
George...
With the decrease in the total number of viruses, some have theorized that the need for virus protection is becoming less and less necessary. Protecting systems such as servers and workstations is nothing new. In fact, using anti-virus software was the first method enlisted to stop malicious code from infecting and...
Mobile banking, Web 2.0, remote check capture - they're among the emerging technologies that appeal most to banking institutions. The key driver: the chance to offer more services to customers, and also cut costs through the further automation of banking transactions.
We recently spoke with leaders of the top...
When a Dallas, TX bank needed some help to stop unauthorized data, it pulled out the biggest guns it could locate to stop the data leaking out of its networks.
The choice was a natural progression of what the bank was already doing to stop data loss, according to Omni American Bank's Chief Information Officer Tony...
Credit and debit card fraud: It's the threat that keeps growing and evolving.
A year ago, many banks and credit unions were forced to cancel and reissue thousands of cards as a result of the TJX breach. More recently, banks located in Indiana saw accounts breached from ATM or debit card transactions. Indiana law...
The Federal Deposit Insurance Corporation (FDIC) has made progress with its internal security controls, but still needs to make significant improvements to its security management practices.
This is the key finding of a recent report issued by the Government Accountability Office (GAO) in an audit of the banking...
The clear message from banking regulators in their Senate testimony is: Banks are hurting.
The follow-up question is: Exactly how badly are they hurting, and how will their pain trickle down to impact information security programs and priorities?
Security leaders are quickly evolving in their roles to focus more on the business of banking, less on the technology of information security.
This is the main message delivered by the results of ISACA's recent Information Security Career Progression Survey of 1400 Certified Information Security Managers (CISMs) in...
During March 2006, Mexican banking authorities established the use of a second factor authentication based on "dynamically generated information" -- in addition to username and password -- as a requirement for doing monetary operations through e-banking systems. This regulation allowed the use of one-time access code...
Information Security Media Group recently attended the Gartner IT Security Summit 2008 in Washington, D.C. where the theme of the conference was information security 5-10 years from now. We interviewed vendors on the floor of the expo hall and heard about solutions focusing on topics ranging from application security...
Interview with Nalneesh Gaur, Chief Information Security Architect, Diamond Management & Technology Consultants
Mergers and acquisitions are a way of life for financial institutions, and so many pertinent business issues bubble up whenever an M&A is discussed.
But when does information security enter the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.