Training

Governance & Risk Management , Privacy

Top IT Compliance Challenges: Who's Touching Your Data and What Are They Doing With It?

Top IT Compliance Challenges: Who's Touching Your Data and What Are They Doing With It?
Join in this tactical discussion of how financial institutions are using new technologies to successfully prevent, identify and respond to security threats, no matter where they originate.
  • Learn how to identify, prevent and rapidly respond to user threats and data breaches

  • Find out how, while mitigating security threats, you can work towards compliance for PCI and other key mandates

Do you really know who is accessing your critical data? Do you really know where threats to your data security originate? This webcast features Paul Reymann, one of the nation's leading financial institutions regulatory experts and co-author of Section 501 of the Gramm-Leach-Bliley Act Data Protection regulation.

Background

Today's headlines confirm what will happen to your institution if it does not have effective IT security systems. Financial institutions suffer serious consequences - from stolen customer data and intellectual property to powerful viruses and other malware. Not only are business operations interrupted, but corporate security failures lead to damaged or lost trust, substantial financial loss and lost revenues, as well as high forensics and remediation costs. In addition, PCI, GLBA and SOX mandates present a complex challenge for securing massive amounts of customer data, monitoring complex applications and managing large numbers of users.

To successfully manage threats and compliance challenges, financial institutions need a comprehensive security strategy that can successfully do battle with inside - and outside - threats. Institutions must implement proactive practices that identify, prevent and respond to potential threats and ensure a limited need-to-know access policy.

Companies increasingly leverage new threat-monitoring technologies to build a clean, concise and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications and databases.

This webinar examines the key threats financial institutions face today, and how to gain the actionable security intelligence that is required to enable sound risk management and compliance.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.