Doug Brown Discusses Mobile Strategy, New Products, Biometric Security
Bank of America was one of the first institutions to move toward mobile banking in a big way. Two years into the initiative, Doug Brown, SVPO of Mobile Product Development, discusses:
Mobile trends at BoA;
Security hurdles the institution...
Vendor management was one of the hot regulatory topics going into 2009, and it's only gotten hotter as the year has unfolded.
James Christiansen, a longtime financial services/security leader and currently CEO of Evantix, discusses:
Vendor management trends at financial institutions;
How the Heartland breach...
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;
Potential career paths in cybersecurity.
Nadia D. Short...
In these times of mergers and acquisitions in the banking industry, identity and access management (IAM) is a huge challenge.
Mike Del Giudice of Crowe Horwath LLP shares insights on:
IAM trends in financial services;
How banking institutions are tackling IAM challenges;
The 'gotchas' to avoid.
Steve Katz was the world's first CISO, and he has unique insight on the information security profession - how it's developed and where it's headed.
In an exclusive interview, Katz discusses:
How the information security role has evolved;
Which trends are changing the role;
The skillsets necessary for today's...
According to the 2009 Banking Information Security Today survey, banking institutions - despite the economy - are investing in new banking services, i.e. mobile banking and remote capture.
To gain further insight into spending trends, we spoke with Christine Barry, research director with Aite Group, on:
Hard times have taken a toll everywhere - even when it comes to internal audit practices at financial institutions.
Yet, in the wake of security breaches and questionable business practices at some financial institutions, federal regulators are cracking down on auditors. In an exclusive interview, Holly Kidder, a...
For thousands of years, people have attempted to hide sensitive information from competitors or enemies.
Since January, critics of the Heartland Payment Systems data breach have called out for tougher encryption standards for financial institutions and their third-party service providers. Applications for...
Electronic communication is at the heart of every organization, but one compromised e-mail can damage your corporate brand, compromise intellectual property or put you in non-compliance with laws and industry regulations.
Do you want to explain to your customers how you lost control of their personal financial...
There are more opportunities than ever for skilled information security professionals.
This is the belief of Gerald Masson, Director of Johns Hopkins University Information Security Institute, and in an exclusive interview he discusses:
Job prospects for information security professionals in the public and...
Individually, banking institutions, law enforcement agencies and regulatory boards understand the risks of money-laundering crimes.
But collectively, in active collaboration, they could do much more to prevent, detect and investigate these crimes, says AML expert Kevin Sullivan.
In an exclusive interview in...
Verizon Business investigated 90 major data breaches in 2008, including 285 million compromised records. Nearly Â¾ of those breaches were external hacks, and 99.9 percent of the records were compromised via servers and applications.
These are among the findings of Verizon's new 2009 Data Breach Investigations...
As the swine flu outbreak triggers new fears of a global pandemic, security organizations must dust off and review their emergency management plans. For insight on how to prepare for swine flu, pandemic expert Regina Phelps offers expert insight on:
What you need to know about swine flu;
How your organization...
The annual RSA Conference was held in San Francisco April 20-24, bringing together the nation's - in some case's the world's -- top security experts, leaders and vendors for a week-long exploration of the day's top threats and opportunities.
Cybersecurity. Cloud Computing. Encryption. Public/Private...
To this point, information security professionals have been generalists. Going forward, they'll have to be specialists. At least this is the opinion of John Rossi, professor of systems management/information assurance.
In an exclusive interview on the future of the information security profession, Rossi...