The third edition of ISMG's Data Breach and Fraud Prevention Summit in Asia took off June 8 in Mumbai. Here are some highlights and first impressions from the day-long event, featuring key industry thought leaders.
ISMG's upcoming Data Breach & Fraud Prevention Summit Asia 2016 in Mumbai will focus on the latest fraud techniques and technologies, as industry thought leaders take us through new approaches to tackle breaches as well as today's top schemes and solutions to stop them.
The Hong Kong Monetary Authority plans to raise the cybersecurity of its banking system through a new, three-pronged approach. But critics say the regulator needs to come up with clear security mandates to ensure a cybersecure ecosystem.
Europe's biggest annual information security conference returns to London this week. Here's my pick of the top Infosec Europe sessions, with topics ranging from cybercrime and incident response to EU regulations and the Internet of Things.
Narayan Neelakantan, outgoing CISO at the National Stock Exchange of India, is concerned that the lack of capacity in incident response is going to haunt Indian organizations in the near future. He shares insight on IR maturity and the imminent need.
The Reserve Bank of India has issued new cybersecurity guidelines to scheduled banks, directing them to devise cybersecurity policies distinct from their institutions' existing IT or IS security policies.
Security is moving fast, but is still playing a catch-up game with technology. In this scenario, age-old paradigms need to be revised to remain relevant, says Oracle's security lead for APAC, Chris Pickett
Nandkumar Saravade, DSCI's chief, has been named CEO of Reserve Bank of India's new IT subsidiary. Security leaders set expectations for the new role and suggest important areas that need immediate attention.
IBM's Vaidyanathan Iyer says security practitioners need new tactics to bridge the skills gap and fight emerging threats. He suggests the use of analytics and machine learning would easily help fill the gap in detecting threats.
In the wake of reports that 65 million stolen credentials from micro-blogging platform Tumblr have surfaced online, following 117 million LinkedIn credentials, it's clear that 2016 is fast becoming the year of what one security expert dubs "historical mega breaches."
Cross-regional collaboration, biological cybernetics and active defense/deception technology where some of the forward-looking themes at the recent MESA event in Dubai. Here are some highlights from ground zero.
Since California passed its pioneering data breach notification law in 2003, many other states and some countries have followed suit. Here's a closer look at the status of breach notification requirements in four regions.
The U.S. Congress delves into the issue of whether CISOs should report to CIOs, a topic that leads the Friday, May 27, 2016, edition of the ISMG Security Report, an on-demand audio report offered every Tuesday and Friday.
As Asian countries work to bring their cybersecurity capacity up to speed, collaboration can help ease the burden. Dr. Amiruddin Wahab, Cybersecurity Malaysia's CEO, shares insight on national capacity building and cross-regional cooperation.