BONI: It is very, very important that we move beyond the idea that we have to just find the source of a problem and shut it down until now we have to find the source of the problem, investigate how and why and where the problem was instituted into our environments. And then share that with law enforcement or other...
The cost of a data breach has gone up to nearly $200 per compromised customer record. And if your third-party service provider loses your customer data, the cost to you is even higher.
Bill Boni, Corporate Information Security Officer and Vice President, Motorola Corporation
Bill Boni shares lessons he has learned in his 30 year career in IT security and discusses how organizations should manage their IT security function in order to respond to emerging threats. He reviews:
• How...
Some customers of the New Jersey-based Commerce Bancorp have received notification from the bank that their identities may be compromised. The bank announced on Tuesday that an employee may have given out confidential customer information.
Richard Swart: Hi. This is Richard Swart with the Information Security Media Group, publishers of BankInfoSecurity.com and CUInfoSecurity.com. Today, we are speaking with Steven Jones, the Director of Information Security at Synovus. Good morning, Steven.
Steven Jones: Good morning. How are you?
Swart: ...
Preliminary results of the nationwide pandemic exercise for the financial services industry were released recently, and show that while the industry itself is among the most prepared, there is still much work to be done for individual institutions to be fully prepared for a true pandemic disaster.
Michael Jackson, Associate Director of Technology Supervision of the FDIC, provides early data on the impact of the recent California wildfires, including:
Number of banks and other FDIC-supervised institutions impacted;
Specific guidance on what the FDIC expects in a business continuity plan;
Preview of the...
Interview with William Henley, Director of IT Risk Management, Office of Thrift Supervsion (OTS)
In this interview, Henley discusses the impact of the California wildfires and reports on the number of thrifts that activated their incident management and disaster recovery plans. Henley also discusses the critical...
Steven Jones is the Director of Information Security for Synovus, a bank holding company with 39 banks in the Southeast United States. In this podcast interview Mr Jones discusses the comprehensive risk management process he had created that provides best in class residual risk reporting and metrics. He discusses...
Best-Practices for Getting Across the Right Messages
The board members at a financial institution are responsible for oversight and implementation of a sound security program, including the overall guidance and direction of setting a cultural value related to risk awareness, driving policy and strategy, defining a...
Forensic Analysis Helps Solve the CrimeIn the event of a data break-in, forensic analysis -- the use of scientific techniques to investigate crimes -- is needed for various tasks, including: - investigating crimes and inappropriate behavior,- reconstructing computer security incidents,- troubleshooting operational...
Incident Response Starts With a Comprehensive – and Tested – Plan of Action It’s 3 a.m., and your cell phone is buzzing off the bedroom dresser. Your boss is calling to tell you that the network servers that support your institution’s online banking site have been offline for the last two...
Steps to Take Against Phoned-in ThreatsThe recent “hostage” by phone scam that hit numerous retail stores and several banks in more than four states points to a question for other financial institutions that were not targeted. (See FBI notice:...
The latest disclosure of a data breach involving financial information points up the need for a comprehensive response program, including complying with federal and state notification laws. Fidelity National Information Services revealed in July that a former employee of its Certegy check processing unit stole...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.