Many organizations talk about engaging customers to help prevent fraud. Jim Van Dyke, CEO of Futurion, has new ideas for how to best involve customers in fighting fraud in three stages: Prevention, detection and resolution.
New York has become the first US state to issue its own set of cybersecurity rules for financial institutions. What is the potential impact on other states, other industry sectors? Paul Bowen of Arbor Networks shares insight.
Enterprise security leaders largely understand the business problems posed by a lack of privileged access management. But understanding and overcoming the obstacles to deploying a successful PAM rollout? That's the real challenge, says Alex Mosher of CA Technologies.
Bryce Austin, a former technology lead at Target during the retailer's massive November 2013 breach, says the role of the CISO needs to evolve, ensuring that cybersecurity is balanced with the overall needs of the company. He claims tying the CISO's performance to the company's revenue is the best way to do that.
Consumers are willing to be inconvenienced to help their banking institutions reduce fraud and enhance the security of financial transactions, says Robert Zerby of Wells Fargo. Why increased publicity surrounding retail breaches is spurring consumers to work more closely with their banks, he says.
When she first joined the Los Angeles County district attorney's office, Maria Ramirez prosecuted street gangs. Now she's cracking down on cyber gangs and is opening her case file to share lessons learned from cases involving business email compromise and ransomware.
When it comes to vulnerability management, many organizations opt to protect only their most critical security gaps - but, meanwhile, the criminals exploit the secondary vulnerabilities. Kevin Flynn of Skybox Security explains why context is everything in managing vulnerabilities.
Mayra Koury wears a lot of hats at $2 billion Tech Credit Union in San Jose. One of them is fraud investigator. Hear how she single-handedly staked out the institution's ATMs and helped law enforcement catch a skimming fraudster in action.
The Indian government's move to demonetize high-value currency has given impetus to online and card transactions, creating new challenges for ensuring cashless transactions are secure, says Dr. A.S. Ramasastri, director at the Institute for Development and Research in Banking Technology.
With increasing digitization in business and heavy dependence on technology, the security leader's contributions have become valuable to any board or senior management. But should CISOs have a seat on the board? Sunil Varkey, CISO at the major Indian IT services company Wipro, offers his insights.
Threat intelligence needs to be treated as a program, and not a technical point-in-time solution, says Venkatesh Subramaniam, global CISO at U.S.-based Ocwen Financial Corp., who shares his recommendations for fellow practitioners in this video interview.
The threat landscape for financial institutions has changed considerably since the DDoS attacks of 2012. Rich Bolstridge of Akamai Technologies tells how the definition of "adequate cybersecurity" has also shifted.