article thumbnail

Supply Chain Resiliency: Beyond Third-Party Risk Programs

FS-ISAC

In your own words, what is supply chain resiliency, and why is it one of the most important areas of cybersecurity in financial services today? It is important for financial services as well as other sectors, because as individual enterprises we cannot control what happens at another organization.

article thumbnail

From Emerging Trends to Cyber Risks: a Latin American Perspective

FS-ISAC

Financial institutions and their partners and suppliers are constantly fighting the growth of malware attacks, specifically Ransomware-as-a-Service, which has proven to be extremely profitable for attackers. but not necessarily directed at financial institutions alone - it is one of the biggest threats we face.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Privacy Week 2024: The Definitive Roundup of Expert Quotes

Solutions Review

This is likely to impact industries where transparency matters, such as healthcare, financial services, and insurance. And when a phishing attack succeeds, the cybercriminals capture private data, personal information, company data, or they may even install malware directly onto the device to facilitate ongoing attacks.

article thumbnail

Data Privacy Awareness Month 2024: Roundup of Expert Quotes

Solutions Review

This is likely to impact industries where transparency matters, such as healthcare, financial services, and insurance. And when a phishing attack succeeds, the cybercriminals capture private data, personal information, company data, or they may even install malware directly onto the device to facilitate ongoing attacks.

article thumbnail

Data Privacy Day 2024: The Definitive Roundup of Expert Quotes

Solutions Review

This is likely to impact industries where transparency matters, such as healthcare, financial services, and insurance. And when a phishing attack succeeds, the cybercriminals capture private data, personal information, company data, or they may even install malware directly onto the device to facilitate ongoing attacks.