Join the Community

21,469
Expert opinions
43,716
Total members
378
New members (last 30 days)
131
New opinions (last 30 days)
28,520
Total comments

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

Andrew Kays

Andrew Kays CEO at Socura

What D.O.R.A means for your security team

From January 2025, all UK financial organisations that do business in the EU must comply with the new Digital Operational Resilience Act (DORA). In all honesty, it’s a new regulation that forces organisations to do many things that they should have been doing for years. Most financial organisations will breeze through requirements such as red team...

/security /regulation

Veronika Tibilashvili

Veronika Tibilashvili Senior Consulting Department Manager at Lextensio

The importance of KYC and Due Diligence in business

KYC (Know Your Customer) and Due Diligence are key elements for the successful operation of any business, especially in today's globalized world, where the risks of fraud and financial crimes are increasing. These procedures help companies avoid legal problems, preserve their reputation and protect their financial interests. What is KUS and Due ...

/security /regulation

Aare Reintam

Aare Reintam Chief Operating Officer at CybExer Technologies

The Need for Enhancing Cyber Preparedness in Financial Institutions

Cybersecurity threats have been a grim reality for the financial sector for a long time now. According to a recent report from the IMF, the industry has been hit by over 20,000 attacks, resulting in a $12bn loss over the last 20 years. Moreover, digitalisation has introduced new vulnerabilities and cyber risks to an already vulnerable sector. Whil...

/security

Konrad Litwin

Konrad Litwin Global General Manager - Testing at Perforce Software

The Role of Modern Software Development in Digital Operational Resilience Act (DORA) Compliance

July 17 2024 marks six months to January 17 2025’s introduction of the Europe’s Digital Operational Response Act (DORA), which aims to improve digital resilience in 21 financial entity types and includes more stringent rules around ICT security and risks. With the scale of security risks and dependency on software systems only increasing, DORA’s i...

/devops

Taras Boyko

Taras Boyko Founder at BankBee

Achieving Cybersecurity in Finance Through Collaborative Efforts

In the rapidly evolving landscape of financial technology, the convergence of innovative digital solutions and traditional financial services has presented unprecedented opportunities and challenges. Among the most critical challenges are cybersecurity and data protection, which have become key focal points for fintech companies, financial institu...

/security

Chris Brown

Chris Brown CEO and Executive Coach at New Cyber Executive

What Fund Management Boards Need to Know about Cybersecurity

Fund management executives and board directors play a crucial role in helping asset management firms navigate cybersecurity. As the financial, operational and reputational costs of cyber risk continue to mount, successful collaboration between fund management executives, cybersecurity executives and the board is essential for effective oversight o...

/security /regulation

Jamel Derdour

Jamel Derdour CMO at Transact365 / Nucleus365

Online Payment Processing: How it Works and Best Practices for Security

In the modern world, more and more businesses are moving online, and with that comes the need for secure online payment processing. Whether you are a small business owner or a large enterprise, it is important to understand how online payment processing works and the best practices for ensuring the security of your transactions. How Online Payment...

/security /payments

Cheryl Chiodi

Cheryl Chiodi Industry Strategist, Financial Services at Akamai

5 Ways to Protect Your Financial Institution from Account Takeover Fraud

No matter how much emphasis is placed on creating safe passwords, avoiding phishing attempts, and safeguarding sensitive personal data, the risk of account takeover (ATO) fraud remains ever-present. This type of fraud, where criminals brazenly steal account credentials and personal identifiable information, including social security numbers, addre...

/security /crime

Aare Reintam

Aare Reintam Chief Operating Officer at CybExer Technologies

Preparing for DORA

The Digital Operational Resilience Act (DORA) will enter into force on the 17th January 2025. After this point, banks, other financial institutions, and all organisations providing services and products in the financial sector in the EU will be required by law to adhere to the regulation. This includes explicit rules around areas including incide...

/security

Michael Berman

Michael Berman CEO at Ncontracts

Strengthening Cybersecurity Defenses: The Significance of Vendor Cyber Monitoring

In the rapidly evolving landscape of cybersecurity, financial institutions face an ongoing battle to protect their systems and data. That battle extends beyond their own systems and data to those of their critical third-party vendors. Not only must they protect their own systems from cyberattacks, they must also ensure that the third-party vendors...

/security /crime

Now Hiring