Financial institutions have many risk management frameworks at their disposal but few of them address human behavior risks, which may stem from an employee's information processing or the tools used. Assessments of these risks often lack depth, said Rei Nikolai Magnaye, CISO at Equicom Savings Bank.
Credit risk is a persistent challenge for financial institutions, particularly in business lending. Ivan Perić, head of global artificial intelligence R&D at Synechron, discussed how AI can assess credit risk, ensure regulatory compliance and mitigate operational risks.
In a deep dive into the cybersecurity's industry's shift toward platformization, Netskope CEO Sanjay Beri explores the nuances of integrating multiple security services, the importance of truly integrated platforms and the future of cybersecurity architecture.
The banking and financial services industry will see an increase in scams and frauds perpetrated through fake businesses, incentivizing bad actors to continue creating these fraudulent entities, said Mary Ann Miller, a fraud and cybercrime executive adviser with Prove.
In the latest weekly update, legal expert Jonathan Armstrong joined three ISMG editors to discuss the Department of Justice's antitrust lawsuit against Apple, ransomware payment dilemmas and AI copyright infringement fears - highlighting the intricate legal issues shaping big tech and cybersecurity.
With elections in more than 50 countries this year, bad actors and nation-states will likely misuse AI to misinform 2 billion voters. Mark Johnston, director of the office of the CISO at Google Cloud, explains how pre-bunking techniques can help users check AI-driven misinformation campaigns.
The Change Healthcare attack - the most disruptive cyber incident to ever hit the U.S. healthcare ecosystem - spotlights the risks that come from relying on a handful of major suppliers, said leaders of the Health Information Sharing and Analysis Center.
Palo Alto Networks Senior Vice President Anand Oswal details how Talon's browser technology secures unmanaged devices, enhances SASE capabilities and facilitates hybrid work. The platform security behemoth bought Tel Aviv, Israel-based based Talon in December for $458.6 million.
The move to cloud has uncovered a range of risks that enterprises might inadvertently overlook. Transition often highlights cloud concentration risk, which encompasses vendor, availability, business continuity and regulatory risks, said Abid Adam, group chief risk and compliance officer at Axiata.
Despite advances in endpoint security, Sergei Rousakov, chief security architect at LinkedIn, said the landscape remains complex. He said endpoint tools need to take a more integrated approach that includes identity and device context to truly protect against cybersecurity threats.
In the latest weekly update, four editors discussed ISMG's plans for in-depth and diverse coverage at the 2024 RSA conference, the latest guidance on web trackers from federal regulators and the latest forecasts on quantum computing - and why security teams should care.
Gartner Director Analyst Tisha Bhambry and data security adviser and vCISO Jatinkumar Modh discuss the workplace challenges CISOs face and how an emerging group of virtual CISOs can offer fresh perspectives and solutions to organizations that lack cybersecurity resources.
In the latest "Proof of Concept," panelists Sam Curry of Zscaler and Heather West of Venable LLP discuss the crucial role of explainability and transparency in artificial intelligence, especially in areas such as healthcare and finance, where AI decisions can significantly affect people's lives.
Fraudsters increasingly focus on synthetic entity fraud because forming a corporation requires few verification checks. This lack of rigorous verification by business registrars has led to an explosion in fake companies, said Andrew La Marca at Dun & Bradstreet.
Microsegmentation is a fundamental approach to achieving a mature zero-trust-guided strategy. But before tackling the complex job of microsegmenting infrastructure, IT teams must understand the business context and criticality of the data, said Robert LaMagna-Reiter, CISO at Hudl.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.