Whether we’re offering fully engaged Mobile Banking solutions, dipping our toes in the water with text-based notifications, or are simply waiting proudly to be safe, late majority adapters . . . . we all know that the many technologies under the umbrella called “Mobile” present interesting and new risks. How are we going to respond when our customers blame US for their lost smart phones? What new attack vectors come with the rise of scary ideas like Consumer Capture or websites like Mint? What quick and cost-effective steps can banks take now, regardless of where we are in adoption, to identify and respond to this risk? In this presentation, Dan will walk us through the top five controls . . . . and illustrate the risks they are intended to mitigate.
Here are some FREE boilerplates that can be used to customize a wireless banking security program to any size financial institution.
- Wireless Banking Vendor Due Diligence Kit
- Alternative Vendor List
- Threshold Analysis
- Vendor Due Diligence Checklist