This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Gary Meshell, WW Leader Financial Services, IBM Security, opened his IBM Think 2019 talk, How Financial Services Companies Should Respond to CyberSecurity Attacks with a bold assertion and truism. IBM and TD Bank jointly developed cybersecurity incident response solution for the financial services industry.
In the wake of the news earlier this month that British Airways had found, and reported, a data breach within the 72 hours mandated by the General Data Protection Regulation , the question remains: How much is it going to cost, if anything? In the ICO investigations that followed, the regulator said that when it came to data of U.K.
We have to regulate how to use it in the future. When FindFace was finally smart enough to go public, it launched in 2016 as a tool for young urbanites to identify one another in public and connect later on socialmedia, rather than approach someone at random on the train. It already exists,” Ivanov said.
In this post, he discusses some of the special circumstances around using AI and machine learning to assess credit risk, a highly regulated field. They’re focused on using many types of alternative data, such as information gleaned from socialmedia, to deduce credit risk. Enterprises: Lax cybersecurity?
Generally, what is needed is a layered response where more than one factor is invoked and there is never reliance on a single security measure. Indeed, regulation such as Payment Services Directive 2 (PSD2) enshrines the need for multi-factor authentication for payment providers such as banks and credit card issuers. Layered Approach.
No one has been more successful at using socialmedia to generate awareness and a positive image for their bank than Jill (@JillCastilla, @CitizensEdmond). Jill’s use of Twitter is a model for any bank CEO looking to engage on socialmedia. Regulator Award. FFIEC’s CyberSecurity Self-Assessment Tool.
They insist on inequitable, overly heavy-handed regulation and security expectations that stifle out young companies. To bring us back down to Fintech and cybersecurity, my main point is that *privacy* and *personal data* could be sacred in one context (e.g., Look at all those hypocrites in the large financial companies!
They insist on inequitable, overly heavy-handed regulation and security expectations that stifle out young companies. To bring us back down to Fintech and cybersecurity, my main point is that *privacy* and *personal data* could be sacred in one context (e.g., Look at all those hypocrites in the large financial companies!
We organize all of the trending information in your field so you don't have to. Join 23,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content