As many IT teams work overtime to enable remote workers, maintaining security practices and compliance may not be top of mind, but threat actors are actively seeking opportunities to benefit from current circumstances.
Although enabling a remote workforce is typically a common practice, some particularly urgent and...
The ability to deliver continuity and scale is a hurdle to overcome when facilitating remote work. Giving a large number of end users access to corporate resources quickly is no easy task.
How can organizations ensure core business systems are scaled to handle the load and how can they quickly scale up and down, on...
Third-party risk management (TPRM) is more important now than ever. The practice extends far beyond "checking the box" for compliance. And while compliance is a critical component, recent market turbulence has organizations prioritizing business continuity, financial due diligence, and business resilience. How can you...
Managing risk complexities posed by multiple third-party vendors will always be a challenge. CISOs, security and compliance professionals are making third-party risk management a priority like never before due to remote working, supply chain complexity, cloud storage, phishing and ransomware attacks, and regulations...
In today's dynamic cyber world, third-party security is necessary but can be challenging to implement. How did a leading investment firm succeed in creating a robust and efficient third-party security process?
In this exclusive webinar, CAPTRUST IT Governance, Risk, and Compliance leader Jon Atchison will discuss the...
Financial institutions face two major network security related challenges while working to serve their customers: the constant demand to improve in order to successfully compete in the market and regulatory compliance.
Yet, when it comes to security, the InfoSec team often uses slow, manual (and error prone)...
Organizations have undergone rapid network transformation in the last two months, and though the change has now stabilized into a new normal, new security concerns that affect an organization's overall risk often have not been addressed. Now that the dust has settled, many leaders are examining the transformation and...
How organizations in the most demanding and complex environments are leveraging Tanium to build resilience, maintain business continuity, and manage their long-term risk for today, tomorrow, and the new normal.
This paper discusses:
Endpoint Management and Security in the Age of COVID-19
Why Internal Endpoint...
In 2020, most new cyber attacks will come through encrypted traffic.
Currently companies, incl. midsize companies have perimeter-based security appliances. But with data and applications moving into the cloud, and the majority of employees in the network accessing corporate data and applications remotely, the...
As many IT teams work overtime to enable remote workers, maintaining security practices and compliance may not be top of mind, but threat actors are actively seeking opportunities to benefit from current circumstances.
Download this whitepaper to learn ways to reduce your attack surface, including:
Enforcing least...
"Digital transformation" was an overused marketing buzz phrase until the global crisis came along and - over the course of a single weekend - changed permanently how we live and work.
Enterprises are emerging from firefighting mode now and beginning to strategize about what comes next. What will be the balance of...
Digital transformation is driving utilization of third parties, which can introduce significant risk to your organization. In fact, over 60% of breaches today are linked to a third-party. With this stat in mind, it's no wonder that a multitude of potential third-party cyber risk management (TPCRM) solutions have been...
These days, more of your people-maybe even your entire workforce-are working from home. Your operations have shifted, and your cybersecurity needs to, too. But even as the potential for risk widens amidst a rapidly evolving threat landscape, you can help keep your enterprise safe and your people...
This informational webinar will outline 4 actions you can take today to keep employees secure and productive during these challenging times, with tips straight from your identity and access management peers.
As COVID-19 spread in the spring of 2020, organizations around the world have scrambled to enable a remote workforce, acting in "firefighting" mode and laser-focused on business continuity. But as the new normal settles in, digital transformation is rising as a critical - if altered - priority, and security teams need...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.