Banking Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • FDIC on Emerging Tech and Vendor Management

    01/06/2011

    The FDIC's Donald Saxinger says vendor management programs are getting more scrutiny from regulators, especially in areas of emerging technology such as cloud computing and mobile banking.

  • FFIEC Guidance and Compliance

    01/06/2011

    As the financial industry anxiously awaits the release of new online authentication guidance from the FFIEC, experts speculate about what steps banks and credit unions should be taking now to prepare.

  • ACH Fraud: Bank Speaks Out

    01/06/2011

    After one commercial customer fell victim to corporate account takeover, this institution suffered significant losses and learned that legal disputes rarely favor the bank.

  • Public Health Serves as Cybersec Model

    31/05/2011

    The same approach governments and businesses employ to protect individuals from the dangers of secondhand smoke could be applied to safeguard cyberspace, says Scott Charney, Microsoft's vice president of trustworthy computing, engineering excellence and environmental sustainability.

  • Why We Need Ethical Hacking

    27/05/2011

    "Ethical hacking" - is the term an oxymoron, or is it one of today's necessities in the fight against cybercrime? Jay Bavisi, president and co-founder of the EC Council, feels strongly about why we need ethical hackers more today than ever before.

  • Pressure is on Privacy Pros

    26/05/2011

    From Epsilon to Sony, recent data breaches and legislative trends tell a dramatic story about the turbulent state of privacy worldwide, according to J. Trevor Hughes, head of the International Association of Privacy Professionals.

  • The Case for E-Mail Encryption

    24/05/2011

    With so much critical information being exchanged today via e-mail, now is the time to deploy next-generation e-mail encryption solutions, says Bob Janacek, CTO and founder of DataMotion.

  • Privacy: "Mobile Technology Concerns Me"

    23/05/2011

    Kirk Herath, Chief Privacy Officer at Nationwide Insurance Companies, has been in privacy management for more than a decade, and he has two main concerns about today's enterprise: Mobile technology and cloud computing.

  • Privacy: "You Can't Prepare Enough"

    23/05/2011

    The recent data breaches at Epsilon and Sony should send a chilling message to privacy officers everywhere. "You can't prepare enough," says Kirk Herath, chief privacy officer of Nationwide Insurance Companies.

  • Business Continuity: Breaking the Silos

    20/05/2011

    One of the unexpected impacts of the global economic crisis is that many organizations have lost their business resiliency, says Lyndon Bird, director of The Business Continuity Institute, headquartered in the U.K.

  • U.S. Initiates Cybersecurity Diplomacy

    20/05/2011

    Chris Painter knows that the United States must determine what are the standard behavioral practices on the Internet before achieving substantial international agreements on cybersecurity.

  • Health Information Exchange Success Strategies

    16/05/2011

    Timathie Leslie and Kristine Martin Anderson of Booz Allen Hamilton share insights on how to ensure the success of health information exchanges.

  • Congressman Sees Obama Plan as a Start

    13/05/2011

    Rep. James Langevin sees some shortcomings in the president's cybersecurity initiatives unveiled Thursday.

  • Device ID & Log Analysis: Complementary Forces

    13/05/2011

    ThreatMetrix's Taussig says strong authentication should be part of every financial institution's layered security approach. And according to expected changes to the Federal Financial Institutions Examination Council's 2005 online authentication guidance, that means proven measures to enhance device identification.

  • Fight Fraud with Device ID

    10/05/2011

    ThreatMetrix's Taussig says device identification must be part of layered security measures. Banking regulators want financial institutions to deploy multiple layers of online security. But what does that expectation mean when it comes to investments in fraud detection?

  • Social Media: Minimizing Risks

    09/05/2011

    All employers need to overcome the common misperception that "you can say anything you want on social media and not have any consequences," says compliance specialist Roy Snell.

  • Public Jitters Over IT Security on Rise

    06/05/2011

    The Unisys Security Index shows growing public anxiety about Internet security. Unisys CISO Patricia Titus wonders how restless the public would be if the poll was conducted after revelations of breaches at RSA, Epsilon and Sony.

  • Limited Government: Path to NSTIC

    04/05/2011

    Big brother isn't the relation the government sees itself portraying in developing the National Strategy for Trusted Identities in Cyberspace. Uncle Sam has a more avuncular role in mind, giving advice and serving as a role model.

  • Bin Laden Impact on Money Laundering

    04/05/2011

    Kevin Sullivan spent months at Ground Zero after the 9/11 attacks on the World Trade Center. Now, post-Bin Laden, Sullivan says the 9/11 experience changed him both personally and professionally, and impacted how banking institutions view money laundering and BSA violations.

  • The Case for Cloud Security Standards

    03/05/2011

    "On a global basis, countries are recognizing that they need a uniform commercial code, if you will, for data - a unified approach for managing IT infrastructure services," says Marlin Pohlman of the Cloud Security Alliance.

página 139 de 173