Home |  Insights |  Blog

11 Steps to Prepare for the Impending EU GDPR Regulation

Collaborating author: Kenneth Riley

Pay your taxes. Walk the dog. Submit that expense report. Each of us has that ever-growing catalogue of tasks to accomplish and slowly cross items off the list. Whether we are holding ourselves accountable or someone else is, it’s important for us to complete...

Read Post

How to Prepare for the NYDFS Cybersecurity Regulation

Collaborating Author: Kenneth Riley

Throughout 2018, senior leadership – and even the boards – of major financial institutions in New York will be discussing cybersecurity. This is something most security professionals have been hoping would happen for years, and the New York Department of...

Read Post

5 Key Takeaways from the Proposed SEC Ruling on BCP

The 2016 proposed rule released by the Securities and Exchange Commission (SEC) represents significant change from the current SEC Rule 204-2 (“Advisers Act”). At this time, the rule currently states that Business Continuity Planning (BCP) is not a requirement for Registered Investment Advisors...

Read Post

Five Ways the CFTC is Shaping Cybersecurity in 2017

In mid-December 2015, the U.S. Commodity Futures Trading Commission (CFTC) unanimously passed changes to existing regulations which would require "all derivatives clearing organizations, designated contract markets, swap execution facilities, and swap data repositories to conduct five different...

Read Post

How Can Your CISO Benefit from Quantitative Risk Scoring?

Research has found that Chief Information Security Officers (CISO) spend over 75% of their time simply trying to protect their assets rather than acting strategically to manage risk in the environment.  So, what can be done to flip the script for security organizations to help them focus less on...

Read Post

In Good Company: M&A Cybersecurity Due Diligence

Mergers and Acquisitions (M&A) activities occur across industries of all sizes. Organizations move in this direction to remain competitive, achieve economies of scale, increase market share and remain a trusted brand to customers. Despite these benefits, there is growing concern surrounding the...

Read Post

Design Considerations for Data Privacy in the Cloud

In a previous post, we focused on security risk and controls to keep in mind when considering a cloud migration strategy, and how the choice of deployment and service model influence the security requirements therein. In this post, we will look at some privacy protection capabilities that can be...

Read Post

Protect Yourself from Ransomware

As antivirus vendors and cybersecurity professionals make headway against global malware and cyberattacks, hackers have evolved and become more advanced in order to profit from their exploits.


Read Post

Put Your Business Continuity Plan to the Test

Most organizations have a Business Continuity Plan (BCP) in place to address planned procedures in the wake of man-made or natural disasters.  But having a documented plan is only a piece of the overall puzzle.  

Read Post

Protecting Your Data in the Cloud

The appeal of cloud computing is undeniable. The cloud has eliminated traditional IT barriers to market entry, inspired innovative business models, and improved business efficiency.

Read Post

Subscribe to Email Updates