Highlights Areas of High Risk and Examination Priorities for Financial Industry Firms -
On September 15, the U.S. Securities and Exchange Commission’s (SEC’s) Office of Compliance, Inspections and Examinations (OCIE),...more
10/8/2015
/ Broker-Dealer ,
Cease and Desist Orders ,
Corporate Governance ,
Cyber Crimes ,
Cyber Incident Reporting ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Data Breach Plans ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
Encryption ,
Enforcement Actions ,
Hackers ,
Identity Theft ,
Neither Admit Nor Deny Settlements ,
OCIE ,
Personally Identifiable Information ,
Policies and Procedures ,
Registered Investment Advisors ,
Risk Alert ,
Sanctions ,
SEC Examination Priorities ,
Securities and Exchange Commission (SEC) ,
Security Risk Assessments ,
Training ,
Unauthorized Access ,
Vendors
Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more
7/24/2015
/ Automotive Industry ,
Cloud Computing ,
Cyber Attacks ,
Cybersecurity ,
Dashboard ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Retention ,
Data Security ,
Federal Trade Commission (FTC) ,
Hackers ,
Internet of Things ,
NHTSA ,
Personally Identifiable Information ,
Proposed Legislation ,
Safety Standards ,
Transparency ,
Wireless Technology
Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more
Major cybersecurity attacks of increased sophistication — and calculated to maximize the reputational and financial damage caused to the corporate targets — are now commonplace. These attacks have catapulted cybersecurity to...more
Given the exponential rise in security breaches and hacking activity in past few years and the almost constant headlines in the press of yet another major security breach, information security should be a front burner issue...more
Door locks, cameras, fitness bracelets, home security, thermostats, refrigerators, utility meters, light bulbs, and cars. The list of the things and devices that can collect information about you and send it into the big...more
“If we’re going to be connected, we’ve got to be protected.” With those words President Barack Obama unveiled new consumer privacy legislation and new cybersecurity and privacy partnerships between the federal government and...more
On June 20, 2014 Governor Rick Scott approved the Florida Information Protection Act of 2014, overhauling the requirements and steps companies must follow when faced with a potential or actual security breach resulting in the...more
On Wednesday, February 12, the White House released the Framework for Improving Critical Infrastructure Cybersecurity. The Framework represents the culmination of a year-long private-sector led effort to create voluntary...more