Lastminute.com is a worldwide travel company that helps customers in 40 countries search and book travel related products and services. The company operates a portfolio of well-known brands, each with a consumer website in multiple languages and its own security and performance needs. Their total combined traffic...
Users are often lax about their own passwords to the dismay of many employers and organizations they transact with. Strong authentication is critical and organizations must be careful about security measures for their online customer transaction accounts - but when users become too frustrated during the login process...
In today's shifting security and regulatory environment, ongoing third-party monitoring is crucial to compliance success. But how do you keep up with a constantly changing and growing list of vendors?
This session will outline the keys to third-party risk management success through a modern approach to monitoring...
The realms of data privacy and information security have traditionally been separate in most organizations. However, these domains are increasingly fusing, and in today's digital world, you need them to work in unison.
Many companies leave the question of ownership to their legal department, but today's CIOs are...
For financial institutions, every new customer heralds an opportunity - but if the organization doesn't know enough about that customer there may be risks as well. Using know your client (KYC) and customer due diligence (CDD) checks as an initial first line of defense in reducing the risk of money laundering and...
Join Enterprise Strategy Group (ESG) and Dtex Systems to get a detailed look at a newly released ESG Research Insights Report, "Insider Threat Program Realities." Based on the survey of 300 security and IT professionals in the US, the report underscores the continued struggle most organizations face when it comes to...
Website breaches are becoming a daily occurrence. Organizations, entrusted with millions of customer data points, are failing to protect consumers adequately and as a consequence, losing valuable data.
Despite the expectation that companies should be prepared for both accidents and deliberate attacks, there is a...
Customer accounts are an integral tool to help merchants foster customer loyalty. But when login credentials are compromised, they present a unique opportunity for fraudsters to commit CNP fraud and steal customer PII. In 2018 alone, Account Takeover attacks resulted in over $11 billion in losses.
The fallout from...
The extra-territorial scope of GDPR, and many other regions introducing new data protection and privacy requirements such as The California Consumer Privacy Act (CCPA), means it is essential that privacy decision makers understand the need to have a common approach to dealing with regulations - instead of addressing...
Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives should consider to...
The abuse and/or misuse of privileged credentials plays a role in almost every cybersecurity breach incident today. With privileged access in hand. an attacker essentially becomes a malicious insider - and that's an alarming scenario for any IT professional, all the way up to the C-level and the Board.
Privileged...
The risks posed to enterprises managing third parties have evolved. Increasing reliance on third-party vendors, new privacy regulations, shifting cybersecurity threats, and frequent data breaches have upended the third-party risk landscape. As a result, modern risk solutions must adapt to solve both security and...
The trend of moving applications, data and infrastructure to public clouds in unrelenting. While the transition is a strategic move to transform operations, improve the customer experience, and reduce costs, this spreading of data across multiple hosting centers complicates DDoS mitigation strategies and leads to...
As organizations are relying more and more on cloud collaboration tools to store and share sensitive customer data, security concerns abound. Failure to comply with regulation is not a risk worth taking, and the financial cost, time lost and reputation damage from even one data breach can jeopardize an entire...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.