Mon.Jun 09, 2025

article thumbnail

Susan Koski: How to Manage the Move to the Post-Password Cyber Landscape

FS-ISAC

How to Manage the Move to the Post-Password Cyber Landscape Fraud is one of the sector’s biggest concerns, but passwords aren’t much of an obstacle to today’s innovative cybercriminals. Biometrics are the next frontier, but how do you get customers to accept the pivot? Susan Koski, Chief Information Security Officer, PNC, has been examining the challenge and recommends managing by facts and known risks, understanding fraud prevention as a cross-sector problem, and remembering that the customer e

article thumbnail

How Does the Embodied Carbon in Flash Compare to HDDs?: Part 2

Pure Storage

How Does the Embodied Carbon in Flash Compare to HDDs?: Part 2 by Pure Storage Blog Summary The writing is on the wall for HDD. With its declining performance per TB, HDD isn’t suitable for the evolving needs of data centers. Enterprises are turning to flash storage for its better density, performance, and power efficiency. The University of Wisconsin study referenced in Part 1 of this blog series compared embodied CO2e (aka manufacturing emissions) at the storage device level.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meg Anderson: Lessons in Cyber Leadership From a Trailblazing CISO

FS-ISAC

Lessons in Cyber Leadership From a Trailblazing CISO The goal of information security is to not react to the change. It's to learn about change in advance. That’s one of the many lessons Meg Anderson, Former CISO, Principal Financial Group, has learned after 40 years in cybersecurity. It’s a lesson she’s instilled in her teams, along with the power of saying no, the vital importance of developing a pipeline, and why cyber leaders need business leaders’ trust.

article thumbnail

How Pure Storage Became a Great Place to Work in the Bay Area  — for the Fifth Time

Pure Storage

How Pure Storage Became a Great Place to Work in the Bay Area — for the Fifth Time by Pure Storage Blog At Pure Storage, we’ve always believed that when you put people first – when you truly see them, hear them, and invest in them – you unlock their full potential. That belief is more than just a value statement for us. It’s a business imperative.

article thumbnail

Business Continuity Plan Testing Made Simple: A 5-Step Lifecycle Overview

Discover a clear, 5-step roadmap for business continuity plan testing. Whether you’re refining your existing business continuity plan or building one from scratch, understanding the right steps will make all the difference. Download the infographic to learn how to: Quickly identify and assess critical risks to your operations Conduct a focused Business Impact Analysis (BIA) to prioritize what matters most Develop a practical, action-ready business continuity plan tailored to your needs We’re her

article thumbnail

Debbie Janeczek: How to Prepare for the Quantum Revolution

FS-ISAC

How to Prepare for the Quantum Revolution The quantum revolution is coming to the financial sector. Debbie Janeczek, Global Chief Information Security Officer, ING, is preparing for it and says the rest of the sector should, too. She suggests starting with building leadership’s awareness of quantum risks, inventorying algorithms, and developing the skill sets needed for post quantum cryptography.

More Trending

article thumbnail

Jochen Friedemann: The Fun Side of Financial Services Cybersecurity

FS-ISAC

The Fun Side of Financial Services Cybersecurity Financial services cybersecurity has its challenges – but it’s also interesting, varied, and just plain fun, says Jochen Friedemann, Chief Information Security Officer at Talanx , the Hanover-based insurance/re-insurance firm. Cybersecurity is also more impactful than it’s ever been, thanks to cyber’s importance to senior management, with more educational and career opportunities than ever before.

article thumbnail

The best affordable antivirus software in 2025: Protection without compromise

Acronis

Discover the best budget-friendly antivirus options for 2025 to keep your devices safe. Read now to find reliable protection without breaking the bank!

Banking 52
article thumbnail

Ariel Weintraub: Ensure Your Supply Chain Continuity – Even Under Pressure

FS-ISAC

Ensure Your Supply Chain Continuity – Even Under Pressure Cybersecurity threats to an institution are no longer limited to the organization themselves, as threat actors launch attacks across the entire supply chain in hopes of disrupting the financial services sector. Managing supply chain risk is top of mind for Ariel Weintraub, Chief Information Security Officer, Aon, who emphasizes that cybersecurity is not a competition, but an opportunity to share best practices and timely information to ma

Outage 52
article thumbnail

Cloud or Clown? How to Know If Your Enterprise Is Ready for the Cloud

NexusTek

Cloud or Clown? How to Know If Your Enterprise Is Ready for the Cloud June 9, 2025 Peter Newton SVP, Cloud Consulting You’ve read the success stories. You’ve sat through the sales pitches. You’ve heard “digital transformation ” so many times that it’s practically tattooed on your frontal lobe. But the real question isn’t “Should we move to the cloud?

Alert 59
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.