Chris Bedel

1 min read

Coming to Your State?: New York Releases First-of-its-Kind Cybersecurity Regulation for Banks

Last week, New York Governor, Andrew Cuomo announced new proposed state regulation for banks, insurance companies, and other financial institutions. In doing so, New York would become the first state in the nation with such regulation. Citing the...

Read More

1 min read

Is it Time to Take the Organization of Your Information Security Program to the Next Level?

The Information Security Program at Banks and Credit Unions is getting to be a pretty complex thing. Policies, audits, reviews, board reports,...

Read More

1 min read

Key to Successful Vendor Management Program: Walk Before You Run

[caption id="attachment_683" align="alignnone" width="1344"] I have some colleagues who disagree with this approach, but I’ve seen far too many of my...

Read More

1 min read

How do you measure success when it comes to stopping Phishing attacks?

An article on CSO Online this week caught my attention and raises an excellent question. That being, "what is a good success rate in your phishing...

Read More

Don't Ditch SMS, But Change the Way You Use It

Banks are facing a dilemma in using SMS messages to help authenticate their customers. On one hand, fraudsters are targeting such systems more.

Read More

5 min read

Key Takeaways in Access Control from the Korn Ferry Case

Digital key in pixeled keyhole, 3d render

Read More

All Boards Need a Cybersecurity Expert?

An article that I stumbled upon a few weeks back has me wondering just that... Do boards of directors at financial institutions need a cybersecurity...

Read More

Inside The Competitive Testing Battlefield of Endpoint Security

I'm honored to be quoted in "Final Analysis" section of Kevin Townsend's article this week at SecurityWeek.com, especially with the level of quality...

Read More

1 min read

Segregate your Backup Data to Protect yourself from an Attack

There's been some buzz about various strains of ransomware evolving to selectively target backup data as well as the primary source in an effort to...

Read More