Insights

Home |  Insights |  Blog

5 Key Takeaways from the Proposed SEC Ruling on BCP

The 2016 proposed rule released by the Securities and Exchange Commission (SEC) represents significant change from the current SEC Rule 204-2 (“Advisers Act”). At this time, the rule currently states that Business Continuity Planning (BCP) is not a requirement for Registered Investment Advisors...

Read Post

Five Ways the CFTC is Shaping Cybersecurity in 2017

In mid-December 2015, the U.S. Commodity Futures Trading Commission (CFTC) unanimously passed changes to existing regulations which would require "all derivatives clearing organizations, designated contract markets, swap execution facilities, and swap data repositories to conduct five different...

Read Post

How Can Your CISO Benefit from Quantitative Risk Scoring?

Research has found that Chief Information Security Officers (CISO) spend over 75% of their time simply trying to protect their assets rather than acting strategically to manage risk in the environment.  So, what can be done to flip the script for security organizations to help them focus less on...

Read Post

In Good Company: M&A Cybersecurity Due Diligence

Mergers and Acquisitions (M&A) activities occur across industries of all sizes. Organizations move in this direction to remain competitive, achieve economies of scale, increase market share and remain a trusted brand to customers. Despite these benefits, there is growing concern surrounding the...

Read Post

Design Considerations for Data Privacy in the Cloud

In a previous post, we focused on security risk and controls to keep in mind when considering a cloud migration strategy, and how the choice of deployment and service model influence the security requirements therein. In this post, we will look at some privacy protection capabilities that can be...

Read Post

Protect Yourself from Ransomware

As antivirus vendors and cybersecurity professionals make headway against global malware and cyberattacks, hackers have evolved and become more advanced in order to profit from their exploits.

 

Read Post

Put Your Business Continuity Plan to the Test

Most organizations have a Business Continuity Plan (BCP) in place to address planned procedures in the wake of man-made or natural disasters.  But having a documented plan is only a piece of the overall puzzle.  

Read Post

Protecting Your Data in the Cloud

The appeal of cloud computing is undeniable. The cloud has eliminated traditional IT barriers to market entry, inspired innovative business models, and improved business efficiency.

Read Post

Social Engineering - A Top Threat that Requires a Sound Cybersecurity Strategy

As organizations attempt to stay ahead of cyber threats, Social Engineering tops the list of the most popular hacking methods. Social Engineering is the use of human interaction to obtain unauthorized access to information.

Read Post

Subscribe to Email Updates