Posted inData Privacy

Avoiding Vanguard’s cyber-security stumble

Image: A recent incident at Vanguard in which the company unintentionally sent 71 e-mails pertaining to different customer transactions to a random Vanguard customer triggered a flawed response from the company that demonstrates how SEC-registered entities can underestimate just how difficult it is to manage customer data-related predicaments. CW’s John Reed Stark shares some imperatives for surviving a customer data crisis, while emerging stronger, healthier, and more successful.

Posted inData Privacy

The SEC’s Newly Proclaimed Search Warrant Authority

The Securities and Exchange Commission has broad subpoena powers that this dedicated corps of highly credentialed professionals—inspired by a noble sense of mission, and rich with a long history of investor advocacy—tries to use in the best way possible. But when it comes to issuing subpoenas for electronic storage devices, the SEC needs a reality check against asking too much of its witnesses with overly broad requests that might actually do more harm than good.

Posted inData Privacy

Transforming the Cyber-Security Paradigm

Though data breaches are inevitable, companies still remain too focused on fortification rather than response, failing to adopt to the harsh realities of rapidly emerging international and multifarious cyber-security threats. Inside, columnist John Reed Stark recommends a three-step cyber-security transformation for companies to undertake to combat recent rapidly evolving cyber-dangers.

Posted inData Privacy

SEC Pushes New Limits on Cyber-Security, Securities Fraud

Another byproduct of life in the cyber-security age: The SEC is redefining insider trading to focus more on improper trading, even if you are a thief mining a company for inside information without actually working there. The misconduct—called, yes, “outsider trading”—seems to be an SEC-enforceable offense so far, and it has numerous implications for IT security systems. Inside, guest columnist John Reed Stark takes a closer look at the phenomenon.

Posted inData Privacy

Preparing Your Board for Cyber-Security Oversight

Every board knows its company will fall victim to a cyber-attack and, worse, that the board will need to clean up the mess and superintend the fallout. This week, guest columnist John Stark, a long-time student of cyber-security risks, breaks down the fundamentals any board must establish for cyber-security, and how you can prepare your board to understand those elements and put them in place.

Gift this article