This monthly Security Agenda will highlight some of the most recent additions to our course library. January's edition features former RSA chair Art Coviello discussing "Tactical and Investment Advice for Responding to Attackers." Other industry influencers like internet pioneer Vent Cerf, John Buzzard, Fraud Expert...
This panel will review some of the key themes discussed during the first day of the summit, and foreshadow how those key themes and others will be carried over into the next day. Which sessions will be hot, and how will tomorrow's speakers expand on the topics raised today?Additional Summit Insight:Hear from more...
As information-security threats intensify, organizations risk becoming disoriented - focused more on grappling with complex technology, an explosion of data, increased regulation and a debilitating skills shortage. This is a huge danger, since prompt action is required to interpret an increasingly complex threat...
By 2019, nearly 90 million mobile wallet users will be providing a valuable stream of interchange revenue and transaction data for wallet providers. Offering a mobile wallet is a competitive move that financial institutions and issuers simply cannot ignore. But attackers have interest in mobile wallets as well, and...
In a fast changing world, financial institutions are increasingly at the mercy of smart assaults on their ATM networks. Vigilance is no longer enough to defend against ATM fraud. Breaches are inevitable as hackers develop new methods for exploiting ATM security vulnerabilities. In order to win, security tech needs a...
Non-stop technology innovation, dynamic business environment, attackers exploit every conceivable gap, older security technologies not keeping up, newer ones coming at you at a dizzying pace, over-invested, underinvested, scarcity of security personnel-no perfect answers. Increasingly sophisticated and dangerous...
It's a boom time for cybercrime and cyber-espionage, aided by at least two factors. First, many organizations' websites and databases sport well-known technical weaknesses, while employees remain all to susceptible to low-cost social-engineering attacks. Second, attackers can pummel these technical and human targets...
How well prepared are organizations to respond to a potentially devastating data breach - such as the likes that hit Anthem, OPM or even Ashley Madison? Are their security programs and controls truly as effective as security leaders believe them to be? These are among the questions answered by the results of the 2015...
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold in the software, hardware,...
The absolute worst time to develop a breach response plan is directly after you have discovered a breach. The absolute best way to have your response team fail is to have them untrained on rarely practiced procedures while being overly reliant upon expensive, improperly configured technology. It is proven that humans...
As well as being prepared to operationally and technically respond to an incident, organizations must also be prepared for the legal aspects of response. Private-sector organizations must be well versed in the response and notification processes and understand the how, what and why of the law enforcement/public agency...
Intelligence is critical in mounting an effective defense and, equally as important, is an effective offense. This session will look at intelligence gathering from both sides of the DMZ. There is a great deal of critical information available about your adversaries and a startling amount about you, your organization,...
Even though many traditional defense mechanisms can be circumvented, it is essential that a proactive, layered, defensive security program be put in place and managed effectively. This will not prevent the well-organized targeted attacks, but will eliminate 99 percent of the background noise and most of the less...
Since the phrase "Advanced Persistent Threat" (APT) was coined nearly ten years ago, it has been the subject of extensive discussion and debate in the IT security community, attracting terabytes-worth of media buzz. The spotlight on APT's has been critical of bringing the reality of today's threats to light, but the...
The absolute worst time to develop a breach response plan is directly after you have discovered a breach. The absolute best way to have your team fail at responding is to not have them trained with well-practiced procedures and have them be overly reliant on expensive, improperly configured technology. Strike, strike,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.