Hear about the current state of call center authentication.
Learn how to apply voiceprint technology to strong authentication for your Financial Institution.
Find out how the FFIEC Guidelines apply to telephone banking and call centers.
Why is insider fraud on the rise now? What are the trends?
What is the strategy of how to deal with it? Controls, analytics, etc.
What is the "day in the life" of a case/attack? What process does it typically go through?
How can one systemize the investigations? Technology, policy,
Understand why IT Audit is needed and what it will achieve
Gives attendees tools to use in preparing for IT Audit
Learn to identify, evaluate and improve IT Controls
Learn how to continuously collect and categorize information for year round availability
From GLBA to the ID Theft Red Flags Rule, information security awareness is a lynchpin of banking regulatory guidance. Register for this webinar to learn:
The fundamentals of an information security education program;
How to structure your program to satisfy the requirement and the need;
How to prepare and...
This workshop will expand on many of these areas and present practical and proven approaches many institutions have adopted in order to comply with Section 501(b) of GLBA and Section 216 of Fair and Accurate Credit Transaction Act. In the course of this workshop, we will provide detailed "best practices"...
Examination of IT risk assessments and how they are vital to financial institutions
A look at why IT risk assessments are important to your organization
How an IT risk assessment is performed
Sample assessment matrix included
Board members and senior management are responsible for planning and implementing an IT risk management system that works. But they must understand the risks and safeguards - and in these challenging times they especially must know their legal accountability, as dictated by such regulations as the Gramm-Leach-Bliley...
If you look at recent breaches, you see a common thread: If privileged identities were better managed, breach impacts would greatly lessen. Bill Mann of Centrify discusses the essentials of privileged ID management.
Every organization is concerned about malware - how it evolves, slips past multilayered defenses and infects networks. John Nielsen, Product Manager for IBM Mobile Security, discusses the latest malware trends and steps organizations may take to fight back.
Next-generation (NG) firewalls, with features such as deep packet inspection, intrusion detection, application identification, and granular control, are important weapons in the battle against hacking and malware. Mobile applications have taken the overall scheme of corporate IT, and NG firewalls enable organizations...