What's the cost of a data breach?
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses:
The current cost of a data breach - and how it's risen since 2009;
Data breach trends across industry;
What organizations should do to...
Ghosts of Crimes Past and Present Will Haunt the Future of Banking Institutions and Customers
"The more things change, the more things stay the same." This old saying holds true when it comes to the different types of fraud hitting financial institutions.
In 2009, institutions were hit from every angle with...
The Advanced Persistent Threat - what exactly is it, and how are organizations vulnerable?
Ron Gula, CEO of Tenable Network Security, explains the threat and the challenges to mitigating it. In an exclusive interview, Gula discusses:
Why some organizations are especially vulnerable;
Strategies and solutions...
The most critical and often weakest link in ANY security program is the human element. This is true in data security, and as the events of Christmas day showed us, national security as well.
How prepared is the financial services industry in the event of a cyber attack?
The Financial Services Information Sharing and Analysis Center (FS-ISAC), a national industry forum, will conduct Cyber Attack Against Payment Processes (CAPP), an exercise to measure the ability of financial institutions, payment...
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber...
Business risks have grown in size and complexity in 2009. How, then, must risk management evolve to meet the challenges of 2010?
James Pajakowski, EVP of Global Risk Solutions with Protiviti, shares his insight on:
The risk management trends for 2010;
How information security professionals must meet the new...
Organizations and security controls have changed, so senior management and regulators now demanding more of internal auditors.
Beyond financial and control issues, internal auditors now are being asked to assess the effectiveness of an organization's enterprise risk management program, says Warren W. Stippich, Jr....
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
There is no such thing as the hack-proof computer.
Once we accept that reality, the next challenge is to acknowledge that a certain amount of IT risk is a part of conducting business. Risks also come in many different forms. I'm often asked which is worse -- regulatory, policy or compliance risk? I believe it may...
The Federal CIO Council recommends that agencies' decision to permit social media must involve a collaborative, risk-based decision-making process that requires strong business justifications that identify mission requirements.
Risk management is a common theme across and within businesses, and at North Carolina State University the Enterprise Risk Management (ERM) program is attracting notice from prospective employers and students alike. Mark Beasley, head of the school's ERM initiative, discusses:
What makes the program unique;
The...
Risk management is a common theme across and within businesses, and at North Carolina State University the Enterprise Risk Management (ERM) program is attracting notice from prospective employers and students alike. Mark Beasley, head of the school's ERM initiative, discusses:
What makes the program unique;
The...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.