Banking Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Identity Theft Red Flags Rule Survey: Inside Look at the Surprising Findings

    29/07/2008

    Interview with Tom Field, Editorial Director at Information Security Media Group As Nov. 1 looms, Identity Theft Red Flags Rule compliance is an absolute must for financial institutions. Information Security Media Group recently surveyed 300 banking and credit union leaders to gauge their progress toward compliance. The results have proven intriguing, even surprising. In this interview, Information Security Media Group Editorial Director Tom Field provides: Overview of the findings; Analysis of what they mean; Insight into challenges banking institutions face before and after Nov. 1.

  • GLBA Compliance: Trends to Watch, Traps to Avoid

    16/07/2008

    Interview with Nathan Johns of Crowe Chizek and Company Gramm-Leach-Bliley - it's at the heart of every financial institution's security program. In this exclusive interview, Nathan Johns, formerly of the FDIC, discusses current GLBA compliance trends, including: Where institutions are most challenged to meet compliance; Where they are seeing successes; Vendor management; How a risk-based approach helps to maximize scant resources.

  • Banking Regulators on Identity Theft Red Flags Rule Compliance

    16/07/2008

    Excerpt of a Q&A with William Henley of OTS and Jeff Kopchik of FDIC In conjunction with the recent Identity Theft Red Flags Rule Roundtable webinar, we conducted an interview session with William Henley of OTS and Jeff Kopchik of FDIC. Topics ranged from: What should institutions expect on Nov. 1? What have been the biggest compliance challenges? What should institutions pay most attention to re: Identity Theft Red Flags? This is an excerpt of that Q&A session. To hear the entire dialogue, please register for the Identity Theft Red Flags Rule webinar, which also features practitioners' perspectives on compliance, as well as our own new survey results on where banking institutions stand in their efforts to meet the Nov. 1 compliance deadline.

  • CISO Interviews: Roger Batsel, Republic Bank, on Business Continuity/Disaster Recovery

    01/07/2008

    How to Put the "Business" back into Business Continuity Planning Planning for disaster - whether a simple service disruption or a pandemic event - is paramount to any financial institution. But where does the responsibility fall? Roger Batsel, SVP, Managing Director of Information Systems at Republic Bank, Louisville, KY., says it's time to separate duties: let IT handle system outages and put business continuity planning in the hands of the business folks. In this exclusive interview, Batsel discusses the positive impact this novel approach has had on his bank.

  • Identity Theft Red Flags Rule: The Road to Compliance

    13/06/2008

    Interview with Evelyn Royer of Purdue Employees FCU Everyone knows the date: Nov. 1 - that's when U.S. financial institutions must be in compliance with the Identity Theft Red Flags Rule. With institutions now racing to meet or beat the deadline, Information Security Media Group is launching a new webinar, ID Theft Red Flags Roundtable - Tips from Regulators and Practitioners on How to Meet Nov. 1 Compliance. As a sneak preview of this webinar, we caught up with participant Evelyn Royer, VP Risk Management/Support Services, Purdue Employees FCU, to discuss: First steps toward Red Flags compliance; Biggest obstacles to overcome; How well institutions are/are not for the Red Flags deadline.

  • Suspicious Activity Reports: Perceptions & Reality in Anti-Money Laundering Investigations

    12/06/2008

    Interview with Investigator Kevin Sullivan At the heart of the Bank Secrecy Act (BSA) and the core of any good Anti-Money Laundering (AML) program is the Suspicious Activity Report (SAR), which all financial institutions - banks, credit unions, brokers, casinos, insurance companies, etc. - must file when confronting questionable transactions. In this exclusive interview, anti-money laundering investigator Kevin Sullivan discusses: Erroneous perceptions of SARs; Examples of effective SARs in successful investigations; Bad habits to avoid when preparing SARs. Also, be sure to check out Sullivan's upcoming webinar: Expert's Guide to Suspicious Activity Reports (SARS): Tips to Avoid Regulatory Pitfalls & Penalties

  • The Growing Business Role for Security Leaders: John Pironti, ISACA

    04/06/2008

    Interview with John Pironti of ISACA's Education Board Security leaders are quickly evolving in their roles to focus more on the business of banking, less on the technology of information security. This is the main message delivered by the results of ISACA's recent Information Security Career Progression Survey of 1400 Certified Information Security Managers (CISMs) in 83 countries. To learn more about the survey results and the trends they identify, listen to this interview with John Pironti, Chief Information Risk Manager with Getronics, and a member of ISACA's Education Board. Pironti touches on: The survey results; Trends impacting security professionals; What it all means specifically for security leaders at financial institutions.

  • The Role of Information Security in a Merger/Acquisition

    03/06/2008

    Interview with Nalneesh Gaur, Chief Information Security Architect, Diamond Management & Technology Consultants Mergers and acquisitions are a way of life for financial institutions, and so many pertinent business issues bubble up whenever an M&A is discussed. But when does information security enter the discussion? Not early enough, says Nalneesh Gaur of Diamond Management & Technology Consultants. In this interview, Gaur discusses the importance of information security in an M&A, sharing his insight on: When information security should enter the M&A discussion; Who should lead that discussion; 7 key questions to ask re: information security in an M&A activity.

  • Gartner IT Security Summit 2008 Vendor Interviews

    03/06/2008

    Information Security Media Group recently attended the Gartner IT Security Summit 2008 in Washington, D.C. where the theme of the conference was information security 5-10 years from now. We interviewed vendors on the floor of the expo hall and heard about solutions focusing on topics ranging from application security to GRC to automated compliance. Click on the following links to listen to our exclusive interviews with these vendors. Applied Identity Download MP3 | Streaming BigFix Download MP3 | Streaming BT Download MP3 | Streaming LogLogic Download MP3 | Streaming McAfee Download MP3 | Streaming NetIQ Download MP3 | Streaming PGP Download MP3 | Streaming Protegrity Download MP3 | Streaming Rapid7 Download MP3 | Streaming ScanSafe Download MP3 | Streaming Tricerion Download MP3 | Streaming Click here to download a ZIP file of all Interviews

  • Phishing Report: Top Threats & Trends in 2008 and Beyond

    15/05/2008

    Interview with David Jevans, Director, Anti-Phishing Working Group Phishing, vishing, whaling - there are a growing number of electronic social engineering threats to unsuspecting consumers and their identities. Financial institutions and their customers increasingly are targets of these attacks. But they're also fighting back. Listen to this interview to hear: What are the major phishing trends? What kinds of anti-phishing solutions are proving effective? How do institutions reach prospective victims and educate them about phishing?

  • Data Leakage: How to Prevent it

    12/05/2008

    Philip Alexander, Information Security Officer at a Major US Financial Institution Data leakage - it's one of subtle insider threats to information security at financial institutions. It's tough for leaders to know exactly where their critical data resides - never mind how it's being treated when it leaves the corporate environment in the hands of well-intentioned employees and vendors. Listen to this interview for insights from Phil Alexander, ISO at a major U.S. banking institution, on: The biggest data leakage challenges; How to determine where data resides; What happens when sensitive data leaves the corporate environment? Best practices in data disposal?

  • How to Re-engineer an Information Security Risk Assessment Program

    06/05/2008

    Interview with Brian Huntley, VP & ISO, Camden National Bank Just over two years ago, Brian Huntley arrived at Camden National Bank in Maine, charged with responding to regulatory guidance and transforming the bank's information security risk assessment program from one that was threat-based to one that is now asset-based. Listen to this interview for insights on: How Huntley tackled the challenge; The toughest and easiest parts of the project; Accomplishments to date; Tangible results that bank employees and customers now see.

  • Data Loss Prevention Strategies for Institutions of All Sizes

    30/04/2008

    Interview with DLP Expert Jared Thorkelson Data loss prevention (DLP) is a challenge for institutions of all sizes. But not all banking/security leaders understand the scope of the threat, where it originates and how best to eradicate it. In this interview, DLP expert Jared Thorkelson discusses: What's most misunderstood about DLP; The greatest sources of data loss in banking institutions; How institutions of all sizes can take immediate steps to improve DLP

  • Workplace Violence -- What You Need to Know: Kim Matlon, Crisis Expert

    28/04/2008

    Interview with Kim Matlon, Business Continuity/Crisis Management Expert Workplace violence - it's one of the most common but least understood risks to all businesses. From robberies gone awry to bullies in the workplace to domestic anger spilling over from home, the workplace is rife for violent situations. In this interview, Kim Matlon, COO of R&A Crisis Management Services, an Ill.-based business continuity, crisis management and project management consulting firm, offers insight on: The four types of workplace violence; Red flags to look for in employees and communications; How to help ensure employees' safety.

  • RSA Conference: Insider Threat, Risk Management Emerge as Key Topics

    14/04/2008

    Annual Security Event Offers Plenty to Financial Institutions Risk management and the insider threat. These are the two dominant themes emerging from the conversations and presentations at the RSA Conference in San Francisco. From the keynote stage to the expo floor, with stops in between at the program sessions, information security experts, vendors and practitioners clearly were influenced by the major headlines of the year: the Societe Generale fraud, Hannaford data breach, anti-money laundering, the regulatory push for better vendor management and pandemic preparation. Listen to this wrap-up for an overview of Information Security Media Group's RSA Conference coverage

  • Online Banking: 'Deputizing Our Customers' at Bank of America - Notes from RSA Conference Day 2

    10/04/2008

    Bank of America is well known for its mobile banking services. Currently, the institution has 750,000 mobile banking customers receiving services on 400 different kinds of devices. But did you realize that one of the ways BoA secures its electronic offerings is by providing its customers with abuse reporting capabilities? Listen to this dispatch from editor Tom Field to hear more about BoA's online initiatives, as well as to hear insights from a Fifth Third Bank executive on forensics and e-discovery.

  • Exclusive Insights from Security Solutions Leaders: RSA Conference 2008

    09/04/2008

    Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all. So, the Information Security Media Group team did the job for you, visiting with more than 60 vendors of particular interest to banking and security leaders. Click on the following links to listen to our exclusive interviews with these vendors. A - F G - Q R - Z 8e6 TechnologiesDownload MP3 | StreamingActivIdentityDownload MP3 | StreamingAdobeDownload MP3 | StreamingAirDefenseDownload MP3 | StreamingAlgoSecDownload MP3 | StreamingApplication SecurityDownload MP3 | StreamingArcSightDownload MP3 | StreamingAxedaDownload MP3 | StreamingBeyond TrustDownload MP3 | StreamingBioPasswordDownload MP3 | StreamingBlue Coat SystemsDownload MP3 | StreamingBrabeionDownload MP3 | StreamingBreach Se

  • RSA Conference 2008: Internet Banking Case Study

    09/04/2008

    Imagine living in a country where electronic voting is universal, there are 39 million Internet users, and 25 million of them are also Internet banking users. Welcome to Brazil, whose online banking services and lessons-learned were presented to attendees at the RSA Conference on Tuesday. According to Maria Aarao of security vendor Certisign Certificadora Digital, Brazilian banks benefit from a country where Internet usage is high and the government actively supports electronic services - and security. Brazilians vote and pay their income taxes online, and the Internet banking marketplace has existed since 1995. Among the most common services used by commercial and consumer customers today: Real-time money transfer; Bill pay; Tax payment; Social security payments.

  • Anti-Money Laundering Trends: 2008

    09/04/2008

    Interview with AML Investigator Kevin Sullivan From Second Life to former NY Gov. Eliot Spitzer, anti-money laundering has dominated the news in 2008. To gain new insights in the latest trends, threats and solutions, we interviewed veteran AML investigator Kevin Sullivan on: What's new in BSA compliance; How AML has evolved over the past decade; What's most misunderstood about AML by financial institutions. Webinar - BSA Compliance: How to Conduct an Anti-Money Laundering Investigation

  • Pandemic Preparation: How do Financial Institutions Stack up?

    27/03/2008

    Interview With Emergency Management Expert Regina Phelps Of all the major areas of business continuity/disaster recovery, pandemic preparation is where financial institutions say they've done the least work. And yet it is the major focus of banking regulators, which in 2008 expect institutions to step up their pandemic preparation efforts. In this interview, Regina Phelps, founder of Emergency Management & Safety Solutions, shares insights on: How financial institutions stack up against other industries in terms of pandemic preparation; Where institutions are most prepared; Where they are least prepared; Other elements of business continuity/disaster recovery that need attention now.

página 168 de 173