Steven Elefant Discusses the Breach, End-to-End Encryption
Steven Elefant joined Heartland Payment Systems as a consultant in November 2008. Two months later, the company announced it had been the victim of the biggest reported data hack in history.
Now CIO of Heartland, Elefant appeared at the BAI Retail...
Allan Bachman has fought fraud since the early 1970s, and he's seen the crimes evolve in both sophistication and scale.
In an exclusive interview, Bachman, Education Manager for the Association of Certified Fraud Examiners (ACFE), discusses:
The evolution of fraud schemes;
The most common types of fraud seen...
This year's BAI Retail Delivery Conference & Expo, beginning Nov. 3 in Boston, is the 32nd annual event - and it very much will reflect the times that financial institutions have experienced over the past year.
Risk management, social networking, customer confidence - these all will be major themes at this year's...
From ACH to ATM, payments to phishing, fraud schemes abound. And bank customers and businesses are the targets.
So what can banking institutions do to fight back?
Bob Neitz is the senior vice president in charge of the Fraud Corporate Risk Management Program at Wells Fargo. In an exclusive interview, Neitz...
Malware, Consumer Technology, Social Networks Head the List of Vulnerabilities
Know what scares security expert John Pescatore the most? The image of a remote employee sitting at a home office or public setting, plugging into an unsecured network, accessing critical business data via a personal laptop or...
Interview with Pete Fahrenthold of Continental Airlines, RIMS
Enterprise Risk Management (ERM) is a topic of interest throughout an organization - and increasingly at the board of director level.
But how does a security leader engage the board on ERM - and keep it engaged?
Pete Fahrenthold of Continental...
The fall flu season has begun in the U.S., and the news each day is filled with stories about H1N1 (swine flu) outbreaks at schools and businesses. But how bad is the outbreak? Is it on a par with a typical flu season? Far better or far worse?
To help separate fact from fiction, noted pandemic expert Regina Phelps...
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
Interview with Rep. Yvette Clarke, Chair, House Subcommittee on Emerging Threats, Cybersecurity and Science and Technology
To quell the rising tide of information breaches and to protect government and key civilian IT systems, the idea of regulating IT and data is gaining ground among those who shape federal law...
Governance, risk and compliance - GRC - are priorities for information security leaders of all organizations. And these priorities have only been underscored by the economic recession and elevated scrutiny of businesses and government agencies.
In an exclusive interview on GRC trends, Chris McClean, analyst with...
Social networking. Cyberbullying. Identity theft.
There are myriad threats to children as they explore their online universe. And to counter these threats is Safe and Secure Online, a new interactive presentation that brings information security professionals into classrooms to give sound advice to 11-14-year-old...
Interview with Dave Jevans of the Anti-Phishing Working Group
On Oct. 7, the U.S. government announced the results of "Operation Phish Phry," which saw 100 suspects in two countries charged with being part of a major multinational phishing ring.
And although these indictments are the most ever in a cyber crime...
As people increasingly turn to information assurance to start - or re-start - a career, the nation's community colleges play a greater role in job training.
Erich Spengler, professor at Moraine Valley Community College near Chicago, discusses:
The role of community colleges in information assurance education;...
Interview with Shirley Inscoe and BC Krishna, Authors of Insidious: How Trusted Employees Steal Millions and Why It's so Hard for Banks to Stop Them
Insider fraud has always been a risk for banking institutions, but this risk has only grown in the past year. And so has the size of the crimes.
Shirley Inscoe and...
It's one of the newest and most popular stops on the Washington, D.C. tour, and its artifacts of history leave clues for how information security professionals should approach their future.
The International Spy Museum has just celebrated its 7th year and its 5 millionth visitor, says Executive Director Peter...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.