While governments and industry watchdog groups are mandating security measures over privacy, healthcare and financial data, enterprises have their own business priorities and concerns that are equally vital to their ongoing success.
Companies are complex entities that create, modify, store, and move vast amounts of...
Listen to this podcast by the Information Security Media Group as David Nelson, FDIC Examination Specialist shares his research and insight on current trends in cyber fraud and financial crimes and the their impact on the financial industry.
Nelson discusses his observations on other data from FDIC and other...
Evolution of identity fraud techniques, including man-in-the-middle
The authentication solution landscape for financial institutions - what are some of the choices banks have to fight fraud (e.g., risk-based authentication, strong authentication, PKI, OTP, smart cards)
Life in the trenches - Implementing FFIEC...
Discover how one time passwords can fit into a complete authentication and security plan
Learn what factors to consider when creating a security solution
Hear one financial institution's experience with implementing one-time password technology
Find out how to balance security with end-user experience
Hear about the current state of call center authentication.
Learn how to apply voiceprint technology to strong authentication for your Financial Institution.
Find out how the FFIEC Guidelines apply to telephone banking and call centers.
Why is insider fraud on the rise now? What are the trends?
What is the strategy of how to deal with it? Controls, analytics, etc.
What is the "day in the life" of a case/attack? What process does it typically go through?
How can one systemize the investigations? Technology, policy,
responsibility,...
As the Sarbanes Oxley (SOX) compliance challenge continues for financial services organizations, automated data auditing has become a priority. But how can you design data auditing systems and processes if you’re not sure what auditors are looking? Or what controls you need in place to satisfy requirements or how to...
Lessons learned from TJX and previous data breaches to improve data protection
Outline data protection regulations financial institutions face
What regulators expect financial institutions to have in place for data protection
Best practices in data protection from a regulator, banker and processor
In this webinar, you will be privy to the following topics of discussion:
Describe malware, crimeware intrusions and how they relate to phishing;
Overview of current attacks and help to anticipate likely trends;
Describe different ways clients are attacked, understanding of proactive defenses;
Describe...
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evidence about which malicious strategies are
successful at deceiving general users. We first analyzed a large set of captured phishing attacks...
The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow physical and logical access to Federal government locations and systems. The Personal Identity Verification (PIV) standard for Federal Employees and Contractors,...
Organizations publish information online including confidential data. Data is rendered in varied formats; it can vary from simple HTML pages to documents in Adobe's PDF or Microsoft's Word/Excel formats. Confidential data is restricted to a set of users who have to login and be authenticated on the website. A common...
This paper discusses and analyzes the internet-based, password reset functionality provided by many organizations for their customers. The average application user is being forced to remember more and more complex passwords to accomplish their daily routines. The very nature of complex passwords, sometimes results in...
What are the driving forces behind the rise of malware? Who’s behind it, and what tactics do they use? How are vendors responding, and what should organizations, researchers, and end users keep in mind for the upcoming future? These and many other questions will be discussed in this article, combining security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.