The recent WikiLeaks release of thousands of sensitive government documents puts security leaders on notice: The breach threat is real, and no organization is immune.
"Companies are increasingly looking for individuals who have a business mindset and can make the connections among security, IT risk and business," says John Reed, executive director of Robert Half Technology.
Understanding the contact versus contactless variables for an implementation of EMV in U.S. is the first step, says Smart Card Alliance's executive director.
"This seems to have been possible by the lack of a secure online banking environment provided by our former bank," says Jim Payne, Choice Escrow's manager of business development.
"With the right people, process and technology, you could be able to put a system together that would greatly reduce the impact these types of attacks have," says cybersecurity expert Eric Cole, a SANS Institute faculty fellow.
Information security incidents are more sophisticated - and so are the criminals who perpetrate them. This raises the bar for professionals seeking careers in incident response in 2011.
"Where mobile payments are concerned, I don't want to say banks will be taken to the cleaners, but I think that's where their biggest threat is," says Avivah Litan of Gartner.
When financial institutions and businesses store Social Security numbers in databases, they run the risk of exposing their customers to insider threats.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.