Remove Applications Remove Banking Remove Information Security Remove Security
article thumbnail

Making Banking a More Effortless Experience

CIO Business Intelligence

Along with nearly every other industry, banking is facing greater competitive pressure than ever. As banks continue to face this reality, they’re also tasked with addressing a variety of rapidly changing issues, including those surrounding data protection, adoption of cryptocurrency, and anonymizing data (AI models). .

Banking 108
article thumbnail

Steps CIOs should take to protect customer data in Nigeria’s open banking systems

CIO Business Intelligence

Due to Nigeria’s fintech boom borne out of its open banking framework, the Central Bank of Nigeria (CBN) has published a much-awaited regulation draft to govern open banking procedures. And at its core is the need to secure customer data through a robust set of requirements. Traditional banking is fading away,” he says.

Banking 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO Business Intelligence

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] This concept of least-privilege access is fundamental to Zero Trust Security practices.

article thumbnail

How Should CIOs Handle More Cybersecurity Regulations?

The Accidental Successful CIO

It turns out that regulators have been watching us and they now think that securing the company is important enough that they are starting to create regulations in this area. to require banks to formalize their cybersecurity program. Under the new regulations banks would now be required to hire a chief information-security officer.

Banking 140
article thumbnail

Security Experts Assess 2.0 Draft of NIST Cybersecurity Framework

SecureWorld News

The addition of the 'implementation examples' are an extremely useful tool for organizations to actually implement the security controls they choose. Defending and Investigating Advanced Intrusions on Secure Email Gateways" at SecureWorld Dallas on Oct. Nader Zaveri – Sr. 8 (day 1 of the 2-day conference).

article thumbnail

SINET Showcase 2015 Update

CTOvision

We have previously written about the very positive impact the Security Innovation Network (SINET) is having on the community. Application deadlines have been extended but you must apply right away. security companies that are addressing industry and government’s most pressing needs and requirements. Chief Information Officer.

article thumbnail

3 ways to deter phishing attacks in 2023

CIO Business Intelligence

In fact, CIO has reported that it takes only a few minutes for experienced hackers to set up a social engineering attack against enterprises (and their managed service providers) that consider themselves to be secure and protected. This helps in early identification of attacks and increasing overall security hygiene.

Training 139