The auditors come!

4:10 PM
The auditors come! -

There is no doubt that security and compliance are top-of-mind for financial institutions, and for good reason.

The escalating security threat landscape with actors, from malicious and unknowingly insiders hacktivists who gather behind a social thing, well funded and sponsored industrial espionage and national governmental actors. Prolific and sophisticated criminal organizations trafficking and exchange of malware and exploits monetize customer data.

This includes new and evolving malware hybrids like GozNym are designed to steal credentials account consumer banking. Older malware platforms such Dridex expand into ransomware. When combined with phishing, social engineering and credential harvest thrown financial institutions on the defensive.

Let's have a look at what credit unions and banks have left, as well as investments, loans and insurance so vulnerable and what to underpin defense carried

  • Security is a challenge . There are just too many attack vectors; both internal and external threats and risks: unmanaged BYO, default browser implementations mixed admin access third-party network access and shadow IT to name a few. Even after follow best practices and keep up to date on patches, estimates and Compliance, Legal 99% of the time is still lets to attack openly of highly skilled and persistent attackers.
  • Technological innovation : Innovative and disruptive technologies such as mobile and cloud, have created a hybrid matrix of different solutions coupling legacy systems with bleeding edge solutions and have expanded the field of security, while to make more porous. With the imminent growth of IoT, the scope will continue to expand and erode
  • Business Trends . Employees have led to a proliferation of devices mobilization targets as a flexwork, Workshifting and remote working, and endpoints no longer under IT control. Endpoints are too insecure to move from the traditional trusted network home, cafe and airport networks.

. For financial institutions, the, safety assessments, auditing, and regulatory compliance for the course are the target of criminal enterprise and Malware years par A recent addition has been the FFIEC examination. There is a formal examination, which occurs every three to 12 months at any financial institution in the United States average. Audits vary slightly for banks to credit unions and De Novo (<5 years) institutions are audited more frequently. Audits include grueling reviews the current infrastructure and extensive documentation.

The FFIEC is an interagency council that awareness drives and points to consider guidelines and to help financial institutions make less vulnerable and less vulnerable to cyber attacks. It shares information on preparation and cyberattacks respond that use, for example, to blackmail, compromising user data and malware. It also publishes the Information Technology Examination Handbook and Assessment Tool Cyber ​​used in testing

The auditing guidelines require security controls for multiple domains, including :. Authentication, network access, OS access, remote access, security monitoring and access rights management. good to improve these security controls map to the Citrix philosophy of secure delivery of applications and data with the goal of IT and security measures to reduce risk.

#EveryoneUsesCitrix

More than 400,000 organizations depend on Citrix to operate their businesses. Many of them even those with highly sensitive information-lever to deliver Citrix dealing comprehensive and secure access to applications and data.

These thousands of financial institutions around the world includes rely on Citrix technology solutions for banks and financial services IT efficiency and compliance with safety to drive, as well as the top 10 largest global banks, global investment companies , global property and casualty insurance companies and life insurance companies worldwide.

Citrix supports best practices for risk management in five key pillars of corporate security:

  • Identity and Access : Win the checks required appropriate levels to ensure each inside and outside of your company
  • Network Security .: to access based on the user, endpoint, network and security profile encrypted delivery of applications and desktops employees and third pass, enforce network access control and segment networks for compliance and security, and provide the highest service availability and performance
  • Application Security .: centralize application and OS patches and configuration management , provide secure access to organizational resources and of employee-owned devices prevent and protect against zero-day and denial of service attacks
  • data Security .: that data on settled endpoints by keeping it in the data center, address unsafe mobile data storage with containerization and data encryption and secure file sharing guarantee
  • surveillance and response .: Win the opportunity triage users performance degradation and quickly identify the source, quickly identify misconfigurations and attacks, better reduce accordance with the rules and the scope of the audit, while ensuring availability and performance.

more information on the Citrix solutions and applications, see Citrix.com/secure and watch our call FFIEC and Citrix Webinar: Register

Synergy Banner

Previous
Next Post »
0 Komentar