TITLE

TECHIES

PUB. DATE
December 2004
SOURCE
Bank Technology News;Dec2004, Vol. 17 Issue 12, p18
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents information on some people in the field of information technology that provides services to the banking industry. Martin Doyle was named president of the electronic security futures exchange OneChicago. Bridge Capital Holdings, parent company to Bridge Bank, appointed technology industry veteran Owen Brown to its board. Ken Sexton was named chairman and CEO of Axentis, a supplier of risk and compliance software. Abhishek Gami as a senior analyst covering the computer and IT services sector.
ACCESSION #
15491506

 

Related Articles

  • Security Vital to Information Access. D'Aversa-Williams, Tina // Security: Solutions for Enterprise Security Leaders;Aug99, Vol. 36 Issue 8, p6 

    Comments on the importance of having security systems in electronic information networks. Significance for security and information technology managers to consider security very early in network development; Analysis of each network to determine risks and appropriate balance of access and security.

  • New online services standards will alleviate businesses' security fears. Doyle, Peter // Computer Weekly;7/11/2002, p23 

    Comments on the standardization of the Web services security specifications in Great Britain. Operation of multiple authentication and authorization mechanisms in corporate level; Process to manage and enforce security credentials; Benefits of server-centric model for security infrastructure.

  • What 2 CU IT Officers Are Doing To Boost Security. Jepson, Kevin // Credit Union Journal;2/18/2002, Vol. 6 Issue 7, p10 

    Reports on the security measures adopted by credit union information technology managers in California. Protection of member-initiated Internet transactions; Growth of Internet banking; Prevention of causal thief from committing fraud.

  • Safer locks. Hodgson, Karyn // Security: Solutions for Enterprise Security Leaders;Jun99, Vol. 36 Issue 6, p16 

    Highlights the project of the Central Bank of Nicholasville, Kentucky, to integrate electronic safe locks into their security plan. Improvement of safety management and overall security; Remodeling of building purchased from another bank; Time delay feature of safes; Non-opening of locks if...

  • Lebanon.  // MEED: Middle East Economic Digest;10/8/1999, Vol. 43 Issue 40, p31 

    Cites business developments in Lebanon as of October 8, 1999. Beirut Chamber of Commerce and Industry's cooperation with GlobalSign to enable local firms to access electronic security systems; Emirates Bank International's increased stake in Bank of Beirut.

  • Making data security an IT priority. Booker, Robert // Electric Light & Power;Apr2003, Vol. 81 Issue 4, p24 

    Focuses on data security systems for corporate information technology. Failure of utility companies to prioritize security measures; Inclination of the utility industry to focus on cost containment and corporate competition; Need for utilities to change their perception of security initiatives...

  • Asset management, Tracking Are Access Issues.  // Security: Solutions for Enterprise Security Leaders;Jul2000, Vol. 37 Issue 7, p27 

    Focuses on the growth of interest in asset management and tracking systems. Different forms and approaches to the integration of asset tracking and access control; Convergence of information technology and security management; Increase in the rise of laptop thefts; Three top drivers for asset...

  • Control System Security In The Age of Cyber Terrorism. Ahern, Brian M. // Pipeline & Gas Journal;Sep2003, Vol. 230 Issue 9, p12 

    Discusses the concept of control system security in the age of cyber terroris. Security issues facing the gas and pipeline industries; Practices exercised by companies and business entrepreneurs in the use of cyber technology systems; Impact of the September 11, 2001 terrorist attack in the U.S....

  • Getting IT Right.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p23 

    Discusses the collaboration between security and information technology (IT) executives. Purchasing of software and hardware; Mission to secure an organization's computer and information assets; Security directors' responsibility for information protection and traditional physical security;...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics