Risk management is a common theme across and within businesses, and at North Carolina State University the Enterprise Risk Management (ERM) program is attracting notice from prospective employers and students alike. Mark Beasley, head of the school's ERM initiative, discusses:
What makes the program unique;
The...
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
Audit and enterprise risk - they're inextricably linked. As cyber threats grow - from the inside and out - require organizations and their regulators to pay closer attention to technology and information security.
What are some of the key audit and risk trends to track? David Melnick of Deloitte answers that...
It is an age old question: Who really is in charge of security? A look back into history, one can see the origination of the word "password" and how it came from the guard at the gate of a city or castle, who upon approached, would say "Halt, who goes there?"
Because of the economic conditions, risks to organizations - from the inside and out - are at a critical high. Risk managers at public and private organizations are forced to make careful decisions on how to invest scarce resources.
In an exclusive interview, Joe Restoule, President of the Risk and Insurance...
Because of the economic conditions, risks to organizations - from the inside and out - are at a critical high. Risk managers at public and private organizations are forced to make careful decisions on how to invest scarce resources.
In an exclusive interview, Joe Restoule, President of the Risk and Insurance...
The failing economy and the Heartland Payment Systems data breach have focused all of us on the risks of fraud.
But what are today's biggest fraud risks to banking institutions, and how can these risks be mitigated?
In an exclusive interview, Steve Neville, Director of Identity Solutions with Entrust,...
A consortium of federal agencies and private organizations has just released the first version of the Consensus Audit Guidelines (CAG), which defines the most critical cyber security controls to protect government agencies and critical infrastructure industries, including financial services.
The fallout is still coming from the Heartland Payment Systems (HPY) data breach, and banks and credit unions are still dealing with the aftermath. At today's count there are more than 124 banks and credit unions affected by the breach, the number of cards affected topping 250,000.
The big question is: If your...
Identity theft rose by nearly 25 percent last year in the United States, according to a new report released today. The 2009 Identity Fraud Survey Report by Javelin Strategy & Research shows that the number of identity fraud victims increased 22 percent to 9.9 million people being hit, at a total cost of $48 billion.
The number of identity fraud victims has increased 22 percent in the U.S., costing 9.9 million victims a total of $48 billion in 2008.
This is the news from the fifth annual Identity Fraud Survey Report from Javelin Strategy & Research. In an exclusive interview, James Van Dyke, Javelin founder and President,...
We're barely out of January, and already this year has revealed itself as one to remember. Between the worsening conditions within the banking sector, the Heartland breach and a very noticeable shift in the regulatory climate, we're already hard pressed to pick this year's "Story of the Year." And somehow I suspect...
When it comes to regulatory compliance and its intended purpose, I'm a believer. I genuinely believe that if a bank or credit union implements and supports all required controls essential to achieving compliance, they're the better for it, and their account holders can sleep better at night. What you might've missed...
As banking regulators emphasize the necessity of application security, a broad-based consortium now sheds new light on the most common vulnerabilities.
Experts from more than 30 U.S. and international cyber security organizations, including the National Security Agency and the Department of Homeland Security's...
I'm experiencing the New Year's phenomenon. That's what I call the very early part of each year when I struggle writing the correct date on things like checks, forms and the many other documents that require it.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.