Premium Content

Access "McGraw: Financial services develop a proactive posture"

Published: 29 May 2013

Security has evolved in the 15 or so years I have been doing it, from a reactive chain of events built around “security mess response,” to a more predictive game with proactive defense based on risk management and forward-looking intelligence. Nowhere is this more evident than in the financial services industry. There, the stakes are high because bits are money; and the notion of adjusting technical infrastructure by weaving controls into the fabric of the organization is de rigueur. Increasingly in the financial sector, security is about looking forward instead of picking up the pieces in a forensic, mop-up operation. This approach is growing in popularity and gaining relevance in other verticals. I just moderated a panel on this issue at the FS-ISAC Conference in Florida. Panelists included Chauncey Holden, chief information security officer of Fidelity; Keith Gordon, vice president of information security at Capital One; and Jim Routh, the global head of application security at JP Morgan Chase. Just for the record, the idea for the panel was Keith’s, but ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Unlock new pathways to network security architecture
    ISM_august_2013.png
    E-Zine

    Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...

  • Emerging threat detection techniques and products
    threat_detection_technologies_cover.png
    E-Handbook

    Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...

  • Enterprise network security visibility: Beyond traditional defenses
    sSecurity_network_security_visibility_cover.jpg
    E-Handbook

    Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security ...