Browse Definitions :

SearchFinancialSecurity

SearchFinancialSecurity.com is the only security-specific information resource that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost. Get in-depth technical advice and learning materials related to the strategies, technologies and business processes associated with ensuring security in high-risk financial environments.

View the complete archive of Financial Security and Compliance news, research and expert advice.

Go to:  SearchFinancialSecurity

Recently on  SearchFinancialSecurity

(ISC)² Security Congress

(ISC)²'s 2019 Security Congress will unite industry colleagues from around the globe for three days of education, best-practice sharing and networking in a variety of formats.

More Highlights
  • SecureWorld Events 2019

    Join your fellow security professionals at a SecureWorld conference near you.

  • RSA® Conference 2019

    March 4 – 8, 2019, San Francisco

  • (ISC)² Security Congress 2018

    (ISC)²'s Security Congress will bring cybersecurity professionals together from around the world for three days of education and thought-leadership sessions, best-practice sharing and networking.

Definitions
  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Federal Deposit Insurance Corporation (FDIC)

    The Federal Deposit Insurance Corporation (FDIC) is an independent agency of the United States (U.S.) federal government that preserves public confidence in the banking system by insuring deposits... (Continued)

  • Governance, Risk and Compliance (GRC)

    Governance, risk and compliance (GRC) is a combined area of focus developed to cover an organization's strategy to handle any interdependencies between the three components.

Browse Financial Security Topics

Business process security

The business process security topics page provides financial industry IT security professionals with up-to-date information and resources on financial transaction protocols and security, debit and credit card fraud prevention, logical and physical security convergence, and business partner and vendor security issues. Get guidelines for integrating and building security into the day-to-day processes of financial organizations.

Recent Definitions

  • asset management

    Asset management is a financial service offered by professional firms for the holding, transferring, buying and selling of different types of cash and investments.

  • e-commerce (electronic commerce)

    E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.

  • money laundering

    Money laundering is the act of disguising the original ownership, identity and destination of the profits of a crime by hiding it within a legitimate financial institution and making it appear to have been acquired from a legal source.

Highlights

More Business process security Topics

Back to Top

Information security management

Our financial services security technology topics page provides financial industry IT security professionals with up-to-date information and resources on ID management and access control; network security; online, Web and application security; and secure communications. Browse the financial services security technology subtopics below and discover the latest news, expert advice, tips, resources and white papers on managing user identities and controlling access.

Recent Definitions

  • Bitcoin ATM

    A Bitcoin ATM is an automated teller machine that lets users buy, sell and transfer the cryptocurrency, just as regular ATMs provide financial services related to traditional currencies.

  • blockchain economy

    The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.

  • Ripple

    Ripple is a payment protocol, cryptocurrency creator and high-tech payment firm that uses blockchain technology to help banks conduct fast global financial settlements.

Highlights

More Information security management Topics

Back to Top

Regulations and compliance

Compliance is a major painpoint for the financial services industry. Just keeping track of the federal and state legislation, as well as legislation for the financial and banking industries can be a drain on your resources. Learn about financial services laws, such as FACTA, FFIEC and PCI DSS, SOX and HIPAA, and get best practices for complying with federal and international laws and regulations, such as Basel II.

Recent Definitions

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Federal Deposit Insurance Corporation (FDIC)

    The Federal Deposit Insurance Corporation (FDIC) is an independent agency of the United States (U.S.) federal government that preserves public confidence in the banking system by insuring deposits... (Continued)

  • corporate governance

    Corporate governance is the combination of rules, processes or laws by which businesses are operated, regulated or controlled.

Highlights

More Regulations and compliance Topics

Back to Top

Security strategies

The financial services security management strategies topics page provides up-to-date information and resources on data governance, threat prevention, risk assessment and disaster recovery planning. These security management strategies are perfect for CSOs, CISOs and other financial services executives and decision makers.

Recent Definitions

  • times interest earned (TIE)

    Times interest earned (TIE) is a metric used to measure a company’s manageable debt limits; by its ability to pay the monthly interest on it’s debts. TIE is used to determine a given company’s ability to pay its obligations to debtors.

  • reinsurance

    Reinsurance protects insurers against excessive losses, helping to ensure their sustainability and prevent bankruptcy and failure as a business.

  • card skimming

    Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).

Highlights

More Security strategies Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close