Welcome to BankInfoSecurity's FFIEC Guidance Resource Center!

FFIEC

The latest news, views and education on the Federal Financial Institutions Examination Council's latest guidance on the risks and risk management controls necessary to authenticate services in an Internet banking environment.

The Latest News

  • FFIEC Issues Cyber Assessment Tool

    Regulator: Tool to be Used in Cyber Exams in 2016 FFIEC Issues Cyber Assessment Tool
    Tim Segerson

    The FFIEC has released its much-anticipated Cybersecurity Assessment Tool. Hear why banking regulator Tim Segerson believes the tool is expected to be rolled into regulatory examinations by summer of 2016. Read more...

  • Watch for 'Visual Hacking'

    3M's Rooney on the Need for Privacy Screens Watch for 'Visual Hacking'
    Ben Rooney of 3M

    With the rise in awareness of visual security threats and the advent in open plan office environments, protecting data inside the organization is a growing concern, says Ben Rooney, a marketing executive at 3M. Read more...

  • Classifying Data: Seeking Automation

    TITUS's Charbonneau on Data Classification Trends Classifying Data: Seeking Automation
    Stephane Charbonneau, CTO of TITUS

    Organizations that want to protect sensitive data first need to know where it is. But outside of military and government realms, few employees know how to manually classify data, or have an incentive to do so, says TITUS CTO Stephane Charbonneau. Read more...

  • Context-Aware Security: Limiting Access

    Bringing Various Factors Together to Authenticate Users Context-Aware Security: Limiting Access
    Bill Evans

    Employing context-aware security can reduce the risk of a hacker mimicking a legitimate user to illicitly access a system, says Bill Evans of Dell Security. Read more...

  • Securing Homegrown Mobile Apps

    Denim Group's John Dickson Offers 'Lightweight, Easy' Tip Securing Homegrown Mobile Apps
    John Dickson

    Enterprise developers are under pressure to produce quickly mobile apps, often leaving security as a second thought. Denim Group's John Dickson suggests ways to make security a priority. Read more...

  • Article

    Cloud Security Certification Launched

    Designed to Measure Advanced Competence By Geetha Nandikotkur
    Cloud Security Certification Launched

    (ISC)² and the Cloud Security Alliance have unveiled a new cloud security professional certification designed to measure advanced competence. Will training for the certification help professionals gain a better understanding of cloud security?

  • Interview

    The Rise of Trusted Online Identities

    Consumers Want Easier Identity Management, Says CA's Briault By Information Security Media Group
    The Rise of Trusted Online Identities

    What's your digital identity strategy? Numerous agencies in countries across Europe - such as the Italian postal service - are creating new approaches to verifying identities and allowing them to be used as a trusted service, says CA's Paul Briault.

  • Interview

    Disrupting Attacks With Kill Chains

    Fortinet's Bryden on Threat Intelligence Trends By Information Security Media Group
    Disrupting Attacks With Kill Chains

    Threat intelligence is increasingly being brought to bear to help businesses apply kill-chain concepts, focusing on disrupting discrete parts of online attacks as early as possible, says Fortinet's Simon Bryden.

  • Interview

    Enterprise Risk: Internet of Things

    Level 3's Chris Richter on Blocking Attackers By Information Security Media Group
    Enterprise Risk: Internet of Things

    The Internet of Things is posing an increased risk to all organizations. One global data center provider, for example, recently discovered that its malware-infected power supplies were part of a botnet, says Chris Richter of Level 3 Communications.

  • Interview

    How CIOs Must Prioritize Defenses

    BAE's White Details Social Engineering, IP Theft Risks By Information Security Media Group
    How CIOs Must Prioritize Defenses

    The list of information security threats facing organizations continues to grow longer. But it's up to CIOs to put the right defenses - and priorities - in place, says David White at BAE Systems Applied Intelligence.

More news...

Webinars

  • PREMIUM MEMBER EXCLUSIVE

    The Secret Fraud Eco-System and How to Put Threat Intelligence to Work

    Fraud Summit - Chicago 2014 - What becomes of customer account information once it is stolen by fraudsters? It enters a sophisticated underground economy, where account names and numbers are sold...

  • PREMIUM MEMBER EXCLUSIVE

    Mobile: Security Risk or Strength?

    Fraud Summit - San Francisco 2014 - Mobile banking usage and acceptance is growing by 50%. How prepared are banks and technology vendors to mitigate these risks while meeting customer needs? Register...

More webinars...

White Papers

More whitepapers...
ARTICLE Fidelis CEO Talks Threat Defense

Fidelis Cybersecurity is being spin off from General Dynamics. CEO Peter George discusses the...

Latest Tweets and Mentions

ARTICLE Fidelis CEO Talks Threat Defense

Fidelis Cybersecurity is being spin off from General Dynamics. CEO Peter George discusses the...

The ISMG Network