In the wake of the $81 million SWIFT transaction cyberheist from the Bank of Bangladesh - the first in a cascade of SWIFT-related heists - regulators and bankers throughout the world have stopped, taken a step back, and reviewed how interbank transactions and payments are managed and operated. The SWIFT attacks have...
In the wake of new cyber initiatives in the U.K., how should banks and other businesses be working with law enforcement? In this session, a panel of legal, technical and law-enforcement experts will discuss what well-prepared organizations are doing right, when it comes to proactive interaction with law enforcement,...
Organizations know they can no longer take a reactive approach when it comes to data breaches and other cyberattacks. But what should organizations do to ensure their strategies are effective, especially in a world where fraud is a daily occurrence?
This panel of legal, technical and law enforcement experts...
Data breaches have slipped into the conscious minds of consumers everywhere, compelling financial institutions to re-think how they engage their accountholders in meaningful ways that can reduce fraud and enable the consumer to be a frontline defensive player in the fight against fraud. This session will explore...
By 2019, nearly 90 million mobile wallet users will be providing a valuable stream of interchange revenue and transaction data for wallet providers. Offering a mobile wallet is a competitive move that financial institutions and issuers simply cannot ignore. But attackers have interest in mobile wallets as well, and...
How can gaining visibility into indicators of exposure (IOEs) shrink layers of attack and more effectively contain incident? By understanding how network modelling and simulation can be used to visualize and analyze an attack surface, as well as understanding how to measure IOEs, such as vulnerability density,...
As fraudsters switch focus back to card-not-present schemes, research from consultancy Aite Group indicates that CNP fraud will soon outpace card-present fraud in the U.S. by a three-to-one margin. Globally, payments provider ACI Worldwide saw a 30 percent increase in CNP fraud in the first half of 2015. And ACI found...
Adversaries are outsmarting enterprise security strategies by exploiting the foundation of online security. Cyberthreats are becoming more complex and harder to detect. Intel predicts the next big hacker marketplace to be in the sale of digital certificates, which are already selling for more than $1,000 each in...
Cybersecurity has become a board of directors and C-suite issue, as numerous cybersecurity incidents over the past couple of years have proven. The tipping point could be viewed as the Target breach, since that breach led to direct effects on both the management team and the board.
The perception has been that...
With new technologies appearing almost daily, attackers have a constant stream of potential new tools, tactics and practices to evaluate as offensive weapons. This constantly expanding attack surface forces defenders also to assess new technologies, all while protecting an themselves amid an ever-escalating arms...
As information-security threats intensify, organizations risk becoming disoriented - focused more on grappling with complex technology, an explosion of data, increased regulation and a debilitating skills shortage. This is a huge danger, since prompt action is required to interpret an increasingly complex threat...
This panel will review some of the key themes discussed during the first day of the summit, and foreshadow how those key themes and others will be carried over into the next day. Which sessions will be hot, and how will tomorrow's speakers expand on the topics raised today?Additional Summit Insight:Hear from more...
What are the biggest threats to your organization's data? Recent high-profile cyberattacks would lead an organization to believe that its external threats are the most concerning. Unfortunately, this misconception allows another significant threat to your organization's critical assets to remain completely under the...
Distributed ledger technology, such as the blockchain, promises simplicity, speed and greater transparency in transactions that are conducted across the world, in payments and beyond. But what about the risks? How much do we truly understand about this emerging technology, and have we placed fintech on a pedestal too...
Although developed to support the infamous Bitcoin, the blockchain mechanism is proving to have a multitude of use-cases, from IoT micropayments to capital-market trading, retail banking and even voting.
The blockchain, in effect, is a distributed ledger, shared with hundreds of thousands of automated auditors that...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.