- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
By Joe Mont2019-05-06T18:34:00
The cost breakdown of cyber-security for financial institutions is just one of the challenges facing firms.
2025-06-10T15:26:00Z By Aaron Nicodemus
There are stories we tell ourselves in third-party risk management (TPRM) to make ourselves feel better about the corners we cut.
2025-06-07T01:41:00Z By Oscar Gonzalez
The Securities and Exchange Commission Chair Paul Atkins explained his agency’s shift on cryptocurrency regulation to a Senate committee as legislators bargain over President Donald Trump’s “One Big Beautiful Bill” and the GENIUS Act, which would have the federal government invest heavily in cryptocurrency.
2025-06-04T20:56:00Z By Ian Sherr
Compliance is increasingly in the spotlight as companies are tackling everything from artificial intelligence and other new technologies to risk management and mitigation. But it’s soft skills of communication and relationship building that are becoming the most critical tools for success.
2025-04-08T16:47:00Z By Aaron Nicodemus
The U.K. government wants directors and boards of directors to become more actively involved in cybersecurity risks facing public and private companies, as the world faces “alarming” threats from criminal gangs and malicious nation-states. Though many organizations take cybersecurity seriously, the U.K. government says they do not place management of ...
2025-03-28T14:22:00Z By Thomas Graham, CW guest columnist
Many small organizations within the Defense Industrial Base are struggling to meet the rigorous requirements validated through the Cybersecurity Maturity Model Certification, writes Thomas Graham, CISO at Redspin. If you haven’t been tracking it closely, CMMC was finalized in October, with an effective date of December 16, 2024.
2025-02-10T15:27:00Z By Rezaul Karim, CW guest columnist
The dark web has been depicted as a long-standing hub for crimes, where illegal activities such as drug dealing, financial fraud, weapon sales, murder for hire, stolen credit cards, and ransomware gags are easily accessible to the public.
Site powered by Webvision Cloud