PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
November 2008

Layoffs, Mergers Put Focus on Data Protection

Security managers are sweating the current financial crisis, in particular how the wave of layoffs and mergers in the financial services sector could weaken data security. In particular, institutions need to be vigilant about flicking the switch on user access once a person is let go. User provisioning, password management and configuration management are primary areas of concern, experts say. In recent weeks, not only have world markets plunged, but major institutions have either folded or been acquired. The bankruptcy of Lehman Brothers was followed quickly by JP Morgan's acquisition of Bear Stearns. JP Morgan then acquired Washington Mutual. And Citigroup gobbled up Wachovia's banking operations--more deals are expected. While larger institutions have solid processes in place to address the integration of new business, the question of disgruntled, unemployed former workers is a serious threat. Steven Katz, often regarded as the first CISO and who once held that position at Citigroup, JP Morgan and Merrill Lynch, says larger ...

Access this PRO+ Content for Free!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

Safe Harbor

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Product Review: Symark PowerADvantage 1.5

    Symark's Symark PowerADvantage allows Unix hosts to become member servers of an AD forest and leverage AD's centralized user management and authentication capabilities.

  • Product Review: Shavlik's NetChk Compliance

    Shavlik's NetChk Compliance automates compliance and provides control by actively managing system and security settings and allows the IT manager to identify and mitigate risks.

Columns in this issue