In the wake of record-setting bank fraud at Societe Generale, the risk of the Insider Threat is again on the front burner at financial institutions. In this exclusive interview with Editorial Director Tom Field, Jerry Murphy of the Robert Frances Group offers insight on:
The most common forms of Insider Threat at...
Interview With Jerry Murphy, SVP, the Robert Frances Group
In the wake of record-setting bank fraud at Societe Generale, the risk of the Insider Threat is again on the front burner at financial institutions. In this exclusive interview, Jerry Murphy of the Robert Frances Group offers insight on:
The most common...
As French banking officials try to piece together the puzzle created by a rogue insider who cost Societe Generale $7.2 billion in fraudulent trades, their U.S. counterparts wrestle with the loaded question: Could it happen here?
If 2007 is any indication, then 2008 is going to be a wild year for financial institutions facing a slew of risk management issues.
Hanging like the sword of Damocles above all is the subprime mortgage crisis, which sees institutions looking for ways to avoid foreclosures and challenges surrounding underwriting....
iPods. iPhones. Thumb drives. Personal laptops. Wireless headsets. They’re among the toys your employees just got over the holidays, and they’re rapidly being deployed to conduct business within your institution.
But did you also realize that these same consumer-friendly tools represent one of your...
The TJX data breach. The Bank of India hack. The San Diego County wildfires. It's been a year full of memorable disasters - and some notable recoveries and regulations, too.
As we reflect on the biggest stories of 2007, it's clear that bad news was big. Some of our most popular stories were about Commerce Bank,...
A Florida man arrested after the data theft of millions of customer records has pled guilty in Federal court in Tampa. The Fidelity National Information Services/Certegy Check Services data theft case first broke in July. (Related story: Fidelity’s Data Theft Yet Another Signpost on Insider Threat) The senior...
BAYLOR: Companies really should understand the flow of data within the company. They should know where the data enters and where it leads, and they should classify the data according to sensitivity. The sensitivity of the data should really be the primary criteria as to where to spend resources. Data which...
Bill Boni, Corporate Information Security Officer and Vice President, Motorola Corporation
Bill Boni shares lessons he has learned in his 30 year career in IT security and discusses how organizations should manage their IT security function in order to respond to emerging threats. He reviews:
• How...
Last week’s announcement by NJ-based Commerce Bancorp that one of its employees may have released customer information (See story: Bank Warns of Identity Fraud Investigation)swings the security spotlight back to information security’s dirty little secret: the insider threat.
Information Security Media Group recently attended the BAI Retail Delivery Conference 2007 in Las Vegas. Our correspondents covered the expo floor from a vendor point of view, and we spoke with a number of vendors who had products or services specific to information security. In general, the vendors that had some sort...
It’s hard enough to secure the data you control. But how about when your employees are running around plugging in unapproved USB drives into computers and sending out unencrypted sensitive information in emails to customers, putting your institution at risk for a data breach?
Know What Assets You Have and Where They Are – This may sound very basic, but after one laptop turns out to be missing, the basics look like very good rules to follow
Featuring Elan Winkler, Director of Messaging Product Marketing, Secure Computing
Listen to this interview for insights on how to create a "culture of compliance", building the right systems, processes and skills to solidify your regulatory compliance program today - and for the future.
Among the topics...
It's About Protecting the Network Endpoints
Last week's announcement of yet another unencrypted laptop being stolen - this time it is retailer The Gap's recruiting vendor and its gaping lack of security (the vendor laptop was stolen with personal information of 800,000 applicants Gap Press Release ) opens another...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.