| Similar Articles |
 |
OCC Bulletin May 15, 2000 |
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems...  |
OCC Bulletin November 1, 2001 |
Third-Party Relationships This bulletin provides guidance to national banks on managing the risks that may arise from their business relationships with third parties...  |
OCC Bulletin September 1, 2006 |
Automated Clearing House Activities Guidance for National banks -- which may be exposed to a variety of risks when originating, receiving or processing ACH transactions, or outsourcing these activities to a third party.  |
Global Services May 27, 2007 Raj Chaturvedi |
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal.  |
Bank Director 4th Quarter 2009 Kenneth L. Glascock |
Internal Audit: Boosting Your ROI A high-performance audit function can help the bank and board achieve its risk-adjusted goals.  |
CFO March 15, 2004 Craig Schneider |
A World of Trouble Even with an extended deadline for Sarbox compliance, questions about offshoring have companies on edge.  |
Insurance & Technology September 14, 2004 Peggy Bresnick Kendler |
Framework for Security Insurers need effective security infrastructures to withstand online threats from hackers and cyber criminals, as well as lapses by unaware internal users.  |
OCC Bulletin May 10, 2004 |
Risk Management of New, Expanded, or Modified Bank Products and Services The risk management principles in this bulletin outline the expectations of the Office of the Comptroller of the Currency and apply to the introduction of traditional and non-traditional bank products and services, as well as modifications to existing products and services.  |
OCC Bulletin October 2, 2003 |
FFIEC Information Technology Examination Handbook The Federal Financial Institutions Examination Council has issued updated guidance in three booklets on electronic banking, information technology audit, and the FedLine electronic funds transfer application.  |
CIO April 15, 2003 Geoffrey James |
The Auditors Are Coming, the Auditors Are Coming... and That Could Be Good News for You Corporate accountability has Washington's attention, and now the auditors have their pencils sharpened for IT processes and projects. Here are nine strategies for working with auditors before, during and after an accounting exam.  |
Wall Street & Technology October 23, 2007 Melanie Rodier |
Financial Firms Continue to Struggle to Plug Security Loopholes New technologies, such as pattern analysis, as well as awareness and training can help financial services firms keep hackers at bay.  |
Bank Systems & Technology June 1, 2005 Deena M. Amato-McCoy |
Virtual Lock-Down Although executives are well aware of the risks surrounding the security of their internal information, companies around the globe still fail to safeguard themselves from potential threats.  |
CFO September 1, 2010 David McCann |
The Truth About SAS 70 CFOs who put too much trust in this high-profile report may be putting their companies at risk.  |
CFO July 1, 2003 Kris Frieswick |
How Audits Must Change Auditors face more pressure to find fraud.  |
HBS Working Knowledge June 30, 2003 Austin & Darby |
Computer Security is For Managers, Too Computer security isn't just an IT headache, say two Harvard professors. Here are eight to-do items for managers to protect their digital assets.  |
Wall Street & Technology March 22, 2005 Jim Middlemiss |
Internal Auditors Traditionally, internal auditors have been feared by IT organizations. But, rather than view auditors as foes, technology executives must learn to embrace auditors' expertise. After all, auditors' advice can help IT departments deliver better results.  |
OCC Bulletin December 20, 2004 |
Automated Clearing House Description: NACHA Rule Changes The purpose of this bulletin is to advise national banks and examiners of three amendments to National Automated Clearing House Association Operating Rules that became effective in 2004. The most important changes introduced by the amendments are described here.  |
IndustryWeek March 1, 2006 Doug Bartholomew |
Responding To Risk: Invisible Enemies Manufacturers must find ways to prevent electronic threats to their networks and data.  |
D-Lib August 2006 Ross & McHugh |
The Role of Evidence in Establishing Trust in Repositories Evidence will play a crucial role in the process of repository certification.  |
Bank Technology News October 2009 Michael Sisk |
Wire Fraud's Growing Threat Just how big a problem wire fraud has become is a matter of some debate -- confusion fueled in part by banks' and businesses' reluctance to speak openly about it.  |
Bank Systems & Technology March 5, 2010 Penny Crosman |
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas.  |
Bank Systems & Technology May 7, 2007 Peggy Bresnick Kendler |
Bank Tech Experts Discuss Vendor Relationships Here, these industry experts talk about outsourcing and offshoring along with other areas of bank tech concerns.  |
CFO August 1, 2004 |
The Enforcer If audit firms don't voluntarily improve their processes, Public Company Accounting Oversight Board (PCAOB) chairman William McDonough promises he'll make them.  |
Bank Technology News September 2008 Tom Kellermann |
The Cyber Security Quagmire It's becoming essential that on a quarterly basis financial institutions conduct penetration tests on service providers. These tests should assess their network security posture, and verify whether they have layered security beyond firewalls, virus scanners and encryption.  |
Foundation News & Commentary Jul/Aug 2005 Andras Kosaras |
Thinking About an Audit? Read This First What kinds of grantmakers get audits and how should a foundation choose an auditor if it opts for this process?  |
OCC Bulletin May 30, 2000 |
Risk Modeling This bulletin provides guidance to help financial institutions mitigate potential risks arising from reliance on computer-based financial models that are improperly validated or tested...  |
CFO March 1, 2011 Laton McCartney |
Where There's Smoke, There's Fraud Sarbanes-Oxley has done little to curb corporate malfeasance. Therefore, CFOs should implement a range of fraud-prevention measures.  |
Investment Advisor June 2008 Irace & Mehta |
Security in a New Age How to protect your firm from 21st century online criminals  |
Bank Technology News August 2006 Michael Sisk |
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever.  |
OCC Bulletin October 7, 1999 |
Interagency Policy Statement On External Auditing Programs This statement provides unified interagency guidance regarding independent external auditing programs of community banks and savings associations...  |
CFO October 1, 2011 Sarah Johnson |
Making Audits More Audible New rules would require auditors to speak up about possible problems, and describe in more detail what they do and don't look at.  |
OCC Bulletin March 17, 2003 |
Interagency Policy Statement on Internal Audit and Internal Audit Outsourcing Revised guidance on internal audit and its outsourcing  |
CIO June 29, 2009 Kim S. Nash |
System Security: 5 Ways to Improve Your Defenses Against Attack A former Air Force CIO highlights practical ways to improve system and network security.  |
CFO May 1, 2004 Lori Calabro |
Looking Under the Hood New attestation standards for internal controls put more power in the hands of auditors.  |
Bank Systems & Technology December 21, 2009 Nathan Conz |
Fraud: Social Media Heightens New Threats As fraudsters increasingly seek to exploit weaknesses in consumers' defenses through social engineering schemes rather than hack vulnerabilities in banks' security systems, the need for enterprisewide solutions to detect fraud across channels is greater than ever.  |
U.S. Banker September 2007 John Bingham |
Data Breaches' Sophistication Prompt 'Digital Dozen' Standards Taking measures to prevent and deter data breaches is the best approach to avoiding the high cost of fraud. Collaborations among Visa, MasterCard, American Express, Discover Card and JCB created a common industry security requirement known as the Payment Card Industry Data Security Standard.  |
U.S. Banker December 2009 Glen Fest |
It's a Jungle in There Financially distressed workers are becoming a prime fraud worry for banks. But is it enough to prompt more investment in prevention?  |
Bank Director 4th Quarter 2010 Chris Costanzo |
Don't Compromise Your Card Business Third parties can create a panoply of security challenges for card-issuing banks and the stakes today are higher than ever.  |
CFO September 1, 2002 Andrew Osterland |
No More Mr. Nice Guy A new CFO survey suggests why new rules for auditors may be a wise idea.  |
PC Magazine December 30, 2003 Matthew D. Sarrel |
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back?  |
Real Estate Portfolio Mar/Apr 2002 Ray Milnes |
Audit Committees -- A Perspective on Utilizing Internal Audit Resources A brisk current of regulatory change is sweeping through America's corporate boardrooms aimed at strengthening the independence and effectiveness of corporate audit committees, including those of REITs and other publicly traded real estate companies...  |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks.  |
Bank Systems & Technology July 29, 2008 Maria Bruno-Britz |
Banks Increasingly Are Creating Vendor Management Offices When one considers that large banks can have thousands of vendor relationships, it's no wonder vendor management is a growing trend in the industry.  |
Managed Care November 2006 Ed Silverman |
Loss of Protected Patient Information Real Danger for Health Care Plans There are plenty of ways that confidential data can escape managed care organizations, and the consequences can be major. Can you trust your employees?  |
Bank Systems & Technology May 5, 2007 Maria Bruno-Britz |
Fraud Techniques Evolve in Parallel with Bank Products and Defenses As fraudsters' techniques evolve alongside the products and services offered by financial institutions, new steps must be introduced to stop them.  |
Bank Director 3rd Quarter 2010 Charles Keenan |
Front-burner Issues for the Audit Committee The audit committee's roles and responsibilities continue to broaden as evolving regulation and increasing demands for risk oversight turn up the heat on bank boards.  |
OCC Bulletin March 11, 2002 |
Country Risk A recently issued statement describes the elements of an effective country risk management process. These principles will guide examiners when they evaluate the management of country risk in internationally active banks...  |
Bank Systems & Technology June 26, 2006 Deena M. Amato-McCoy |
Closing the Door on Criminals Banks need a consistent approach to fraud assessment and prevention, otherwise they will never truly get ahead of the problem.  |
Bank Technology News September 2006 |
Homeland Insecurity One of the toughest battles for bankers may be in combating online security breaches and sophisticated money laundering schemes.  |
CFO May 1, 2008 Alix Stuart |
Auditor Angst Want faster, cheaper audits? Your auditor humbly suggests you avoid last-minute data dumps and other less-than-helpful practices.  |