meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Risk and regulation in the financial sector. [CyberWire-X]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 21 December 2018

⏱️ 29 minutes

🧾️ Download transcript

Summary

In the third episode of our four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we take at risk and regulation in the financial sector, specifically how it intersects with cyber security. How do organizations operate in a heavily regulated global financial environment, while protecting their employees, their customers, and the integrity of a system largely built on trust? Joining us are Valerie Abend from Accenture and Josh Magri from the Bank Policy Institute. Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

CyberWirex.

0:22.0

Hello everyone and welcome to CyberWire X, a series of specials designed to highlight important security topics affecting organizations around the world.

0:22.6

This is part three of a four-part series called Ground Truth or Consequences,

0:27.4

the challenges and opportunities of regulation in cyberspace.

0:31.6

Today we look at risk and regulation in the financial sector,

0:35.5

specifically how it intersects with cyber security. We'll examine how organizations

0:40.8

operate in a heavily regulated global financial

0:43.8

environment all while protecting their employees, their customers,

0:47.8

and the integrity of a system largely built on trust.

0:51.4

A program note, each CyberWire X special features two segments.

0:56.6

In the first part of the show we'll hear from industry experts on the topic at hand, and

1:00.8

in the second part we'll hear from our show sponsor for their point of view.

1:04.8

And speaking of show sponsors, a word from our sponsor, Jemalto. Your enterprise is rich with sensitive data at rest and in motion throughout the network.

1:19.0

But what happens if that sensitive data isn't secure or if it's improperly accessed.

1:24.8

We're guessing that regardless of what defenses you have currently implemented, the thought of

1:29.4

your data being stolen or manipulated keeps you up at night.

1:33.4

Jamalto tackles the two main causes of cyber attacks,

1:37.0

identity theft and data breaches.

1:39.6

They do this by providing next generation digital security built from two technologies, secure

1:45.8

digital identification and data encryption.

1:49.0

Jamalto already operates these solutions for many well-known businesses and governments protecting trillions

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.