article thumbnail

Making Banking a More Effortless Experience

CIO Business Intelligence

Along with nearly every other industry, banking is facing greater competitive pressure than ever. As banks continue to face this reality, they’re also tasked with addressing a variety of rapidly changing issues, including those surrounding data protection, adoption of cryptocurrency, and anonymizing data (AI models). .

Banking 117
article thumbnail

Steps CIOs should take to protect customer data in Nigeria’s open banking systems

CIO Business Intelligence

Due to Nigeria’s fintech boom borne out of its open banking framework, the Central Bank of Nigeria (CBN) has published a much-awaited regulation draft to govern open banking procedures. And at its core is the need to secure customer data through a robust set of requirements. Traditional banking is fading away,” he says.

Banking 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How Should CIOs Handle More Cybersecurity Regulations?

The Accidental Successful CIO

to require banks to formalize their cybersecurity program. These proposed new laws would require some of the world’s largest banks to invest millions of dollars in cyber protections. These proposed new laws would require some of the world’s largest banks to invest millions of dollars in cyber protections.

Banking 140
article thumbnail

SINET Showcase 2015 Update

CTOvision

Application deadlines have been extended but you must apply right away. security companies that are addressing industry and government’s most pressing needs and requirements. Deputy Chief Information Security Officer. Chief Information Security Officer. Department of Homeland Security. Lisa Davis.

article thumbnail

Low code/no code tools reap IT benefits—with caveats

CIO Business Intelligence

Low-code/no-code visual programming tools promise to radically simplify and speed up application development by allowing business users to create new applications using drag and drop interfaces, reducing the workload on hard-to-find professional developers. So there’s a lot in the plus column, but there are reasons to be cautious, too.

Tools 128
article thumbnail

SecureWorld Returns to Houston with Energy and Enthusiasm

SecureWorld News

RELATED: Here's an article from The National CIO Review on "The Organizational Importance of the Chief Information Security Officer." They go through data analytics, a business application, digital applications, etc. So if IT is not on an equal footing with the rest of the leadership, I find that to be a problem."

Energy 73
article thumbnail

3 ways to deter phishing attacks in 2023

CIO Business Intelligence

Vishing: Voice over IP (VoIP) and Plain Old Telephone Services (POTS) are also susceptible to phishing attacks – attackers use speech synthesis software and automated calls to solicit victims to share bank details and login credentials. Cyberattacks, Data and Information Security, Phishing

Training 140