SBN

How is Cybercrime Impacting the Financial Sector? — CyberSpeak Podcast

On this episode of the CyberSpeak with InfoSec Institute podcast, Todd Weller, chief strategy officer at Bandura Systems, discusses cybercrime in the financial sector and how to build a security awareness program on a budget.

In the podcast, Weller and host Chris Sienko discuss:

  • How has cybersecurity in the financial sector changed over time? (1:15)
  • How is security awareness different in the financial sector versus other sectors? (5:35)
  • What’s the most common entry point for cybercriminals trying to hack a financial company? (7:25)
  • What are some of the weak points of security among financial organizations? (10:55)
  • Are SWIFT-related fraud attacks still an issue or has it died down? (14:10)
  • What are some laws or regulations that have been put into place that have helped curb fraud and cybercrime in finance? (17:10)
  • Is the lack of security awareness a leadership issue, and if so what can be done to change minds at the C-suite level? (20:30)
  • What are some cost-cutting methods for small businesses to help address their company’s security shortcomings? (22:40)
  • What are some security upgrades that provide the most bang for your buck? (24:35)
  • What are some strategies to ask leadership for funds to address security awareness? (26:40)

Learn more about security awareness: https://www2.infosecinstitute.com/security-awareness

See special offers for CyberSpeak with InfoSec Institute listeners: https://www2.infosecinstitute.com/podcast-offer

You can watch a video version of the discussion below:

About CyberSpeak with InfoSec Institute

Get security awareness and IT training insight direct from the trenches in this weekly podcast hosted by InfoSec Institute’s Chris Sienko. Each week on CyberSpeak with InfoSec Institute, IT and security practitioners share their insights into a new topic, including security awareness, IT and security careers and keeping organizations safe from cybercrime.

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Jeff Peters. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/zJ4-fUrJq74/