Leading Technology Vendor Discusses the Need for Vulnerability Assessments & Remediation Processes for Applications Whether Developed In-House or By a Third-Party
Application security is a key focus of regulatory agencies - ensuring that financial institutions pay as much attention to third-party applications as...
Interview with Matt Bishop, Professor of Computer Science, UC-Davis
Career opportunities abound for people interested in entering information security as an entry-level or mid-career position.
In this exclusive interview, Matt Bishop, Professor of Computer Science at UC-Davis, discusses:
His current...
Interview With AML Expert Ross Delston
Anti-money laundering has been one of the dominant stories in financial services this year, and the trend isn't likely to abate anytime soon.
In this exclusive interview, attorney and AML expert Ross Delston discusses:
The latest AML trends, including Trade-Based...
Interview With Crime/Security Expert Dana Turner
Resource allocation - the people, places and things - is one of the most overlooked aspects of Business Continuity planning.
In this exclusive interview, crime and information security expert Dana Turner offers insights on:
What resource allocation truly...
Interview with Jennifer Bayuk, Former CISO at Bear Stearns & Co.
Governance is a term increasingly used in financial institutions, as banking/security leaders try to introduce new processes and disciplines to their organizations.
In this exclusive interview, Jennifer Bayuk, an information security specialist...
To quote from his own biography, Eugene H. Spafford is one of the most senior and recognized leaders in the field of computing. He has an on-going record of accomplishment as a senior advisor and consultant on issues of security and intelligence, education, cybercrime and computing policy to a number of major...
Interview with Brent Rickles, SVP, First National Bank of Bosque County, on Securing Financial Data and Systems Through Application Whitelisting
"Whitelisting" is a new twist on information security. Instead of trying to find a software solution that keeps all of the potential bad guys out of your systems,...
Interview with Cyber Crime Expert Eric Fiterman
In the wake of the arrests of 11 hackers tied to the TJX data breach, security experts everywhere are warning of bigger, bolder threats to come.
So, what should banking institutions have learned from TJX-style breaches, and what can they do now to protect their...
Interview with William Henley, Director at the Office of Thrift Supervision
The downturn in the U.S. economy has financial institutions challenged to "do more with less." While the focus continues to be on the mortgage crisis, William Henley, Director, IT Risk Management for the Office of Thrift Supervision,...
Interview with Tom Field, Editorial Director at Information Security Media Group
As Nov. 1 looms, Identity Theft Red Flags Rule compliance is an absolute must for financial institutions. Information Security Media Group recently surveyed 300 banking and credit union leaders to gauge their progress toward...
Interview with Nathan Johns of Crowe Chizek and Company
Gramm-Leach-Bliley - it's at the heart of every financial institution's security program. In this exclusive interview, Nathan Johns, formerly of the FDIC, discusses current GLBA compliance trends, including:
Where institutions are most challenged to meet...
Excerpt of a Q&A with William Henley of OTS and Jeff Kopchik of FDIC
In conjunction with the recent Identity Theft Red Flags Rule Roundtable webinar, we conducted an interview session with William Henley of OTS and Jeff Kopchik of FDIC. Topics ranged from:
What should institutions expect on Nov. 1?
What have...
How to Put the "Business" back into Business Continuity Planning
Planning for disaster - whether a simple service disruption or a pandemic event - is paramount to any financial institution. But where does the responsibility fall?
Roger Batsel, SVP, Managing Director of Information Systems at Republic Bank,...
Interview with Evelyn Royer of Purdue Employees FCU
Everyone knows the date: Nov. 1 - that's when U.S. financial institutions must be in compliance with the Identity Theft Red Flags Rule.
With institutions now racing to meet or beat the deadline, Information Security Media Group is launching a new webinar, ID...
Interview with Investigator Kevin Sullivan
At the heart of the Bank Secrecy Act (BSA) and the core of any good Anti-Money Laundering (AML) program is the Suspicious Activity Report (SAR), which all financial institutions - banks, credit unions, brokers, casinos, insurance companies, etc. - must file when...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.