How can organizations best mitigate risk and meet increasingly stringent compliance requirements in the face of infrastructure transition and pressure to control costs? The answer: Virtual and cloud-based solutions. Unfortunately, these solutions introduce significant challenges with respect to security, audit and...
As emerging technologies such as cloud computing and mobile banking become the norm, the FDIC's Donald Saxinger says vendor management programs must specifically address the outside risks posed by working with non-traditional financial services providers.
After one commercial customer fell victim to corporate account takeover, this institution suffered significant losses and learned that legal disputes rarely favor the bank.
As the financial industry anxiously awaits the release of new online authentication guidance from the FFIEC, experts speculate about what steps banks and credit unions should be taking now to prepare.
The FDIC's Donald Saxinger says vendor management programs are getting more scrutiny from regulators, especially in areas of emerging technology such as cloud computing and mobile banking.
Adam Greene, the primary author of the proposed
accounting of disclosures rule mandated under the HITECH Act, describes its major provisions and offers advice on how to prepare.
Celebrity snooping at healthcare facilities highlights an alarming - and often unchecked - trend: PHI privacy violations committed by current or former employees, contractors, and other insiders. Protecting patient privacy comes down to more than policies and regulations. What's needed is a way to enforce PHI...
As banking institutions seek tremendous cost savings from cloud infrastructure and services, two key factors must be considered: The Patriot Act, which has strict stipulations regarding access to data and where it is stored, and the protection of data -- even from third party service providers.
This webinar...
With the 2011 National Defense Authorization Act (NDAA), the DOD is taking a leadership position by defining policy that emphasizes the need to protect and defend the software layer.
House Cybersecurity Caucus Co-Founder Jim Langevin, D-R.I., says President Obama's cybersecurity legislative package is a step in the right direction, but lacks the stricter regulation needed for businesses that run critical IT infrastructures.
Many organizations are unprepared to adequately respond to a breach, security expert Bob Chaput says. "Breach notification planning is just a fundamental, basic part of risk management in the new millennium," he adds.
The recent Sony and Epsilon breaches sent a strong reminder that companies lack transparency and aren't prepared to respond to a breach once it occurs, says Kirk Herath, Chief Privacy Officer at Nationwide Insurance Companies.
Federal authorities have issued a detailed notice of proposed rulemaking that sets out guidelines for how patients must be provided with an accounting of who has viewed their protected health information.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.