Join in this tactical discussion of how financial institutions are using new technologies to successfully prevent, identify and respond to security threats, no matter where they originate.
Learn how to identify, prevent and rapidly respond to user threats and data breaches
Find out how, while mitigating security threats, you can work towards compliance for PCI and other key mandates
Do you really know who is accessing your critical data? Do you really know where threats to your data security originate? This webcast features Paul Reymann, one of the nation's leading financial institutions regulatory experts and co-author of Section 501 of the Gramm-Leach-Bliley Act Data Protection regulation.
Today's headlines confirm what will happen to your institution if it does not have effective IT security systems. Financial institutions suffer serious consequences - from stolen customer data and intellectual property to powerful viruses and other malware. Not only are business operations interrupted, but corporate security failures lead to damaged or lost trust, substantial financial loss and lost revenues, as well as high forensics and remediation costs. In addition, PCI, GLBA and SOX mandates present a complex challenge for securing massive amounts of customer data, monitoring complex applications and managing large numbers of users.
To successfully manage threats and compliance challenges, financial institutions need a comprehensive security strategy that can successfully do battle with inside - and outside - threats. Institutions must implement proactive practices that identify, prevent and respond to potential threats and ensure a limited need-to-know access policy.
Companies increasingly leverage new threat-monitoring technologies to build a clean, concise and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications and databases.
This webinar examines the key threats financial institutions face today, and how to gain the actionable security intelligence that is required to enable sound risk management and compliance.
Mr. Flinton has over 15 years experience in IT and information security marketing. Prior to netForensics, Bob held product management and marketing positions at Sterling Software, Symantec, Cybertrust and most recently at Novell, in that company's Identity and Security Management business unit.
Bob has a Bachelor of Science degree from West Virginia University, and earned his MBA at Marymount University in Arlington, Virginia.
Reymann is one of the nation's leading financial institution regulatory experts and co-author of Section 501 of the GLBA security rule. He guided Technology Risk management activities at the Department of Treasury's Office of Thrift Supervision (OTS) in Washington D.C., where he authored several key regulatory directives on emerging risk management issues, including the industry's first regulatory directive on "Transactional Internet Banking."
Reymann is recognized in the prestigious 2006 Heritage Registry of WHO's WHO. He is also the author of numerous articles and papers on technology risk, transactional web sites, customer information, network security and other technology and safety and soundness topics.