Wealth IT Director

  • Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    According to IDG’s 2018 Cloud Computing Survey, 89% of companies use Software as a Service (SaaS). With the use of cloud computing increasing every year, challenges have arisen that are unique to...

    Read
  • Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...

    Read
  • Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond46:24

    Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond

    Are insider threats lurking in your financial organization? You might be surprised. This webinar will show you how to identify and mitigate risks in Salesforce and beyond.

    Watch
  • 5 Types of Insider Threats in Financial Organizations – and How to Mitigate Them

    5 Types of Insider Threats in Financial Organizations – and How to Mitigate Them

    Cybersecurity threats are a continuous concern for financial organizations – in fact, financial service firms face 300 times more security incidents than other industries.

    Read
  • Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s exposed passwords and more.

    Read
  • The 6 Elements Every Financial Institution Needs for Defense-in-Depth Security

    The 6 Elements Every Financial Institution Needs for Defense-in-Depth Security

    In the same way that medieval castles were designed with multiple security layers for protection, today’s organizations require a multifaceted approach to safeguarding highly sensitive data....

    Read
  • Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    In an increasingly digital world, personal information is becoming harder to protect. In response, many countries have developed and enacted privacy laws to strike a balance between information...

    Read
  • 4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    One of the biggest challenges customers face when they want to leverage and maximize the value of Salesforce Shield’s Event Monitoring is understanding the basic controls. In order to use the...

    Read
  • Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    In order to build trust and meet compliance standards, it’s essential for financial services firms to protect and secure sensitive data. But it’s not always simple to implement a security...

    Read
  • California Consumer Privacy Act of 2018: Everything You Need to Know About the New California Data Protection Law

    California Consumer Privacy Act of 2018: Everything You Need to Know About the New California Data Protection Law

    The California Consumer Privacy Act of 2018 (CaCPA) seemed to appear out of nowhere as it passed the desk of Gov. Jerry Brown. Since we’d be hard pressed to find a business that doesn’t somehow...

    Read
  • 3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    A key component of the Salesforce Shield security suite, Event Monitoring allows organizations to boost data security and improve forensic investigations within their Salesforce orgs. Thousands of...

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Balancing an organization’s immediate needs while considering long-term growth can be challenging, especially when deciding whether to build vs. buy cloud security software. Cloud solutions can...

    Read
  • Inspired by Our Customers: FairWarning Year in Review for 2018 — and Vision for 2019

    Inspired by Our Customers: FairWarning Year in Review for 2018 — and Vision for 2019

    Customer success is a huge focus for us at FairWarning. Because of that, we are excited to continue making major, 10x improvements in 2019, aimed at delivering more value than ever before for our...

    Read
  • Why Financial Services Companies Are Monitoring for Changes to Salesforce Permission Sets, Profiles

    Why Financial Services Companies Are Monitoring for Changes to Salesforce Permission Sets, Profiles

    Salesforce’s flexible, layered data sharing model means you can dictate which data, objects, and fields users see, through Salesforce permission sets and profiles. Some companies take a blanket...

    Read
  • 2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    GDPR, data breaches, a surprise California data privacy law, social engineering, and more: 2018 was a year of growing awareness of cloud data security threats, privacy considerations, and the...

    Read
  • 5 Business Benefits of Monitoring Salesforce Login Activity

    5 Business Benefits of Monitoring Salesforce Login Activity

    There are many situations where your business can benefit from greater insight into how users interact with mission-critical cloud applications, particularly Salesforce. By monitoring Salesforce...

    Read
  • 4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    By monitoring Salesforce data exports and reports run, you can quickly learn a great deal about how users are interacting with Salesforce -- and use those insights to strengthen your security and...

    Read
  • The Top 13 Signs Your Employee Is About to Quit

    The Top 13 Signs Your Employee Is About to Quit

    Departing employees can create a lot of challenges for an organization. First and foremost is the loss of knowledge and the extra burden placed on remaining staff as you search for a replacement....

    Read
  • Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce

    Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce

    Securing personal data is at the core of the EU's General Data Protection Regulation (GDPR). Cloud applications, and Salesforce in particular, are rife with personal data. And while Articles 25...

    Read
  • FINRA Cybersecurity: Where Should Financial Services Firms Focus on Cloud Compliance?

    FINRA Cybersecurity: Where Should Financial Services Firms Focus on Cloud Compliance?

    What do the FINRA cybersecurity rules mean for financial services firms using Salesforce and other mission-critical cloud applications? Financial services firms and broker-dealers are no strangers...

    Read
  • loading
    Loading More...