article thumbnail

Guest Post: Digital Technology Is Transforming Banks

Security Industry Association

Within the financial and banking sectors, digital transformation has become synonymous with the increasing shift toward mobile and online banking, as well as the widespread adoption of cloud-based services to enhance customer engagement and streamline internal operations.

Banking 52
article thumbnail

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC

LogisManager

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC By Steven Minsky | May 5, 2023 Silicon Valley Bank (SVB) was closed by regulators and reminded us of the recession associated with Lehman Brothers and Washington Mutual Bank in 2008.

Banking 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What a 1930s Bank Robber Can Teach Financial Institutions About Ransomware

Pure Storage

Legend has it that when Willie Sutton, a notorious bank robber from the last century, was asked why he robbed banks, he responded, “That’s where the money is.” Willie Sutton didn’t rob banks at random. Willie Sutton was remarkably successful because he always zeroed in on banks with the most readily available cash and valuables.

Banking 105
article thumbnail

Overcoming observed challenges when adopting a zero trust architecture

Citrix

Related Stories Citrix Session Recording 2212 supports lossy video codec, playback justification logging Mitigating risk from Cambium Networks cnMaestro SQL injection vulnerability How banks can meet expectations for the evolving future of work

article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

Threat modeling is an essential tool for developers and security professionals to identify and mitigate potential security risks in software systems proactively. Threat modeling is the process of identifying potential threats and vulnerabilities in a system and determining the likelihood and impact of each threat.

article thumbnail

Understanding DORA: How to operationalize digital resilience

everbridge

Aligned with existing regulations like NIS2 in the EU and the Bank of England Operational Resilience Regulation in the United Kingdom, DORA offers organizations the chance to leverage existing capabilities to meet the new requirements effectively.

article thumbnail

3 Steps to Prepare for 2024 and Beyond with the Risk Maturity Model

LogisManager

In this blog, we will explore three ways to prepare for the future: engaging your Risk Committee and Board of Directors with the Risk Maturity Model, using risk management to anticipate and mitigate potential risks, and optimizing vendor spending while enhancing your security. Understand how these changes will affect available resources.