by Zach Duke | Jul 23, 2024 | User Access, Authentication, Banking Technology, Banks, Compliance, Cybersecurity, FFIEC, Information Security, IT Security, Shadow IT
Are you confident that your bank has clear and thorough visibility to every employee’s physical and digital access to systems? If you’re like most banks we work with, the answer to this question is “no”. There are many challenges that make tracking employee access...
by Beth Sumner | Jul 2, 2024 | Community Banking, Financial Institutions, Information Security, IT, Risk, Shadow IT, User Access
In the world of community banking, the landscape of information security and cyber risk management has dramatically evolved. Gone are the days when all servers were in-house, and every application installation involved the IT department. Today, it’s easier than ever...
by Zach Duke | Jun 20, 2024 | AI, AI Governance, AI Information Security Assistant, AI Tools, Conversational AI, Cybersecurity, Exam, Information Security Governance, IT, Regi Ranger, Regulatory
For over a year now, every Tuesday, the Finosec team has been holding a meeting to discuss how we are leveraging AI personally, at work, and in our platform. These weekly meetings have consistently focused on sharing the impact of AI for each of us personally and the...
by Zach Duke | Jun 6, 2024 | AI, AI Governance, AI Policy, FDIC, Financial Institutions, Generative AI, Governance, Information Security, Information Security Governance, IT, Machine Learning, Regulatory, Technology
The integration of artificial intelligence (AI) in the financial services sector presents both transformative opportunities and significant challenges. As financial institutions increasingly evaluate AI technologies, it is crucial to ensure these innovations comply...
by Finosec | Jun 2, 2022 | Banking, Board, Board Training, Cybersecurity, Information Security, IT, IT Controls, Processess, Risk Assessment
Managing Risk Bankers are intrinsically good at managing risk. Credit quality, credit validation, and even loans all involve risk management. Cyber security and information security really aren’t all that different, but the processes can seem a bit more complicated....