On December 12, over 200 New York banks will take an anonymous, public quiz about their cybersecurity policies and procedures during a live webcast. One of the webcast’s organizers hopes the quiz will ignite a sense of competition between the banks and “foster a race to the top on these measures.”
Will this quiz have a lasting impact on cybersecurity in the financial sector?
Listen to episode 112 of our Security Slice podcast and hear Dwayne Melancon and Tim Erlin discuss why the most insightful cybersecurity questions don’t have “yes or no” answers, why bank security tests should include essay questions, and why the real learning opportunity was in the conversations that preceded the quiz.
Click Here to Listen to the Podcast
- Security Slice: Can We Resuscitate Healthcare.gov?
- Security Slice: Peer Review for Code and Bug Bounties
- Security Slice: How Bad is badBIOS?
- Security Slice: Me, You and the EU Cyber Security Directive
Tripwire has also compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
This publication is designed to assist executives by providing guidance for implementing broad baseline technical controls that are required to ensure a robust network security posture.
The author, a security and compliance architect, examined each of the Controls and has distilled key takeaways and areas of improvement. At the end of each section in the e-book, you’ll find a link to the fully annotated complete text of the Control.
Download your free copy of The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities today.
Also: Pre-register today for a complimentary hardcopy or e-copy of the forthcoming Definitive Guide™ to Attack Surface Analytics. You will also gain access to exclusive, unpublished content as it becomes available.
* Show how security activities are enabling the business
* Balance security risk with business needs
* Continuously improve your extended enterprise security posture
Title image courtesy of ShutterStock