1 min read
Outsourcing IT
It’s common practice for financial institutions to outsource some or all of their Information Technology (IT) functions to a Managed Service Provider...
1 min read
It’s common practice for financial institutions to outsource some or all of their Information Technology (IT) functions to a Managed Service Provider...
3 min read
We have many institutions either going through or coming out of a large amount of change. It seems like there’s always some new guidance, product, or...
2 min read
A few weeks ago, in my life outside of cybersecurity, a person said to me: “You are always thinking three steps ahead of the rest of us”. I am not...
2 min read
While the definition of a partner is fairly broad, its principles apply to a very broad spectrum of relationships. In the cybersecurity realm, this...
2 min read
It’s easy to use the terms “Information Technology (IT)” and “Information Security (IS)” interchangeably. They are equally important but serve...
2 min read
Most information security professionals understand the compliance and business requirements of keeping management informed of the Information...
2 min read
We often run into situations where different staff in an institution have different understandings of the goals and operations of their backup...
6 min read
This article is the second of a 2-part series on building an effective outsourcing strategy for the various components of IT for financial...
4 min read
It sounds like a total oxymoron: Independent Collaboration. On the Predictive Index, those two words are on opposing ends of the spectrum when it...
2 min read
When the Gramm-Leach-Bliley Act was implemented, each regulatory agency adopted a set of interagency guidelines and regulations required for...