be_ixf;ym_201908 d_20; ct_100
risk podcast ABA

3 Elements of a Vendor Cyber Monitoring Program

Growing cyber threats have made real-time monitoring of vendors an increasingly important element of a vendor management program. I sat down with Sam Lisker, ABA’s senior vice president of innovation in the office of member engagement, at the 2019 ABA Risk Management Conference in Austin, to talk about this evolving technology and how it can

More

Frequently Asked Questions About Cyber Monitoring

Vendor cybersecurity monitoring provides real-time data on vendors’ cybersecurity by collecting and assessing publicly available information. It detects threats and vulnerabilities before they are exploited so that action can be taken to prevent breaches. Cybersecurity ratings can: Uncover and address cybersecurity issues that need to be resolved before they are exploited. Identify third-party vendors that

More
In this world nothing certain death and taxes

OCC: Operational Risk Remains Elevated

The only certainties in life are death and taxes, the saying goes, but I can think of one more thing: risk. Even as we work to mitigate risks, new ones are constantly emerging. Or, as is the case with cyber risk, old controls become less reliable as fraudsters find ways around them. The Office of

More
Equifax Breach

3 Tips for Avoiding an Equifax-Style Breach

When one of the nation’s largest credit reporting companies reports a breach involving the private financial data of over 145 million Americans, people take notice.

More
 Featured image for Ask Me Anything Q&A
NGAGE 2019
COAST TO COAST
User Conference