article thumbnail

Money at Risk: Finance & Data Security in the Digital Age

NexusTek

Getting a sense that their bank, lender, or investment firm has weak security can drive customers to close their accounts and switch to a competitor. Customers increasingly demand access to their financial information through online and mobile platforms, with 61% of customers currently using some form of online banking each week 7.

article thumbnail

Understanding DORA: How to operationalize digital resilience

everbridge

Aligned with existing regulations like NIS2 in the EU and the Bank of England Operational Resilience Regulation in the United Kingdom, DORA offers organizations the chance to leverage existing capabilities to meet the new requirements effectively. Automation and real-time alerts allow proactive detection and response to security incidents.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Jerry Perullo: Cyber in the Board Room: Battle-Tested Advice

FS-ISAC

Jerry Perullo draws on more than two decades of experience, including as CISO at Intercontinental Exchange/New York Stock Exchange (ICE/NYSE), and recently as interim CISO at Silicon Valley Bank, to explain his framework for presenting cybersecurity risks and solutions to the Board. These should be included in the incident response plan. (17:32)

article thumbnail

Make Rapid-Fire Reporting Standards Work for You

FS-ISAC

Several trade associations – including Bank Policy Institute, U.S. There are several steps financial institutions can take to improve response time and ensure readiness when a crisis strikes. Develop an effective incident response plan and handling strategies. The directive has resulted in some pushback.

article thumbnail

Lessons Your Business Can Learn from Colonial Pipeline Cyberattack 

LAN Infotech

Had the attack been on the OT, the technologies that control physical processes would have created a red alert about the intent of the hackers. This includes information like credit card information, medical records, bank account credentials, and Social Security numbers. It was not an attack on the operational technology (OT).