All Data Privacy articles – Page 43

  • Article

    Liability Protections Included in New Cyber-Security Law

    2016-01-20T14:30:00Z

    You may have not even noticed it, but discreetly tucked into the massive omnibus spending bill signed into law last month is a provision that effectively makes it safer for companies to share cyber-threat information with one another—but critics argue the bill doesn’t go far enough to ease privacy concerns.

  • Blog

    RMS Launches New Data Standard for Managing Cyber Insurance

    2016-01-19T09:15:00Z

    Ahead of the February launch of its new suite of cyber-risk management tools, RMS today released its recently developed Cyber Exposure Data Schema. The ‘open standard’ data schema will provide the insurance industry with a systematic and uniform way to capture cyber exposure data and manage cyber accumulation risk.

  • Blog

    PwC’s Cyber-Security Practice Adds New Principal

    2016-01-19T09:00:00Z

    PwC US has named Patrick Hynes as a principal in the advisory cyber-security practice, focused on cyber-crime and breach response. He is based in PwC’s Los Angeles office.

  • Blog

    The SEC’s Newly Proclaimed Search Warrant Authority

    2016-01-12T10:30:00Z

    The Securities and Exchange Commission has broad subpoena powers that this dedicated corps of highly credentialed professionals—inspired by a noble sense of mission, and rich with a long history of investor advocacy—tries to use in the best way possible. But when it comes to issuing subpoenas for electronic storage devices, ...

  • Article

    Mitigating Cyber-Threats From the Inside Out

    2016-01-12T09:30:00Z

    As attacks on corporate networks become more common, companies are getting more adept at protecting their most valuable assets against cyber-threats outside the company, but it’s the insider threats that continue to elude many. Inside, we walk through the difficult part of insider-threat programs: not just creating the program and ...

  • Blog

    PwC’s Cybersecurity Practice Adds New Principal

    2016-01-08T11:45:00Z

    PwC US has appointed Patrick Hynes as a principal in the advisory cybersecurity practice, focused on cybercrime and breach response. He is based in PwC’s Los Angeles office. Hynes joins PwC with a strong background in cyber-security.

  • Blog

    Finance Teams Play Growing Role in Cyber-Risk Mitigation

    2015-12-18T11:15:00Z

    According to a survey of 389 financial executives conducted by the American Institute of CPAs, 73 percent said they are being asked to take on a larger role in defending their companies from emerging cyber-risks, while another six percent said cyber-risk mitigation has become the primary responsibility of the finance ...

  • Blog

    The Big Challenge in New EU Data Protection Law: Values

    2015-12-17T13:15:00Z

    Image: This week European officials agreed to a final text for a sweeping new data protection law. Compliance officers in the United States should brace themselves: not only does the legislation threaten huge fines and complicate corporate marketing efforts enormously; it underlines the fundamentally differing views Europeans and Americans have ...

  • Blog

    Cordium Launches New Cyber-Security Training Video

    2015-12-11T14:30:00Z

    Cordium, a global provider of compliance consulting, accounting, tax and software to the financial services industry, has launched a cyber-security training video to help firms protect against breaches.

  • Blog

    What Makes a Good ‘Pen Tester’

    2015-12-08T09:00:00Z

    Penetration testing is the exercise of testing a company’s cyber-security defenses, and finding the right “pen tester” to do that can be difficult. Learn how to find the right blend of capable, trustworthy, and innovative cyber-security professionals. More inside.

  • Resource

    e-Book: Keeping Your Corporate Data Safe Under Lock and Key

    2015-11-30T11:00:00Z Provided by

    Around the world, governments and regulators are responding to the massive trove of personal data companies are amassing and a rash of data security breaches with new strict guidelines, regulations, and laws. In response, privacy and compliance programs are increasingly at an intersection. In recent times, however, many companies have ...

  • Article

    Cloud Security Is a Challenge for Users and Providers

    2015-11-24T13:30:00Z

    As more cloud storage providers evolve from consumer-based products to enterprise-grade services, compliance challenges are evolving along with them. Before entering into a service contract, companies must determine whether their data will be safe and all is in compliance with a growing list of regulations and security frameworks. The added ...

  • Article

    The Key Cyber-Security Question: What Is ‘Reasonable’?

    2015-11-10T09:45:00Z

    Regulators often say they want “reasonable” precautions when spelling out expectations on cyber-security. But with a plethora of guidance and frameworks to consider, what does that mean—and does “reasonable” depend on industry and company size? A small summit meeting of cyber-security voices debated that question in Boston recently; we have ...

  • Blog

    SAS Launches New Stress-Testing; Cyber-Security Solutions

    2015-11-06T10:30:00Z

    At its business leaders conference last month, SAS announced the launch of two new products: SAS Stress Testing solution suite and SAS CyberSecurity. Details inside.

  • Blog

    BrandProtect Unveils threatSMART Cyber-Security Solution

    2015-10-30T10:30:00Z

    BrandProtect, a provider of cyber-threat detection and risk mitigation solutions, this week unveiled threatSMART, the latest generation of its comprehensive suite of enterprise cyber-security services. threatSMART combines comprehensive, automated external cyber-threat monitoring, advanced analysis by the BrandProtect team of military-grade threat analysts, powerful new reporting, and numerous other usability and ...

  • Article

    Enforcement Action May Be Omen of SEC’s Cyber-Security Plans

    2015-10-27T15:15:00Z

    An investment adviser firm in St. Louis has become the (painful) test subject for the SEC’s attitude on cyber-security matters. The case, observers say, is a warning that the agency is moving away from guidance and toward enforcement. So what will the SEC consider to be “reasonable” security efforts? Will ...

  • Article

    Mending the Data Privacy Gaps of the EU Safe Harbor Ruling

    2015-10-27T14:15:00Z

    Image: Three weeks after Europe’s top court demolished the 15-year-old Safe Harbor Program to transfer personal data from Europe to the United States, thousands of U.S. companies that used the program are still scrambling to fill data privacy gaps. “To lean back and see how things play out is not ...

  • Blog

    Ridge Global Partners With NAVEX Global to Address Gaps in Cyber-Security Programs

    2015-10-23T10:30:00Z

    Ethics and compliance software and services provider NAVEX Global and risk management company Ridge Global recently announced a partnership that will initially focus on delivering online training courseware to help companies educate their workforces on the growing risks associated with cyber-security and arm them with the tools they need to ...

  • Blog

    Recall Simplifies Information Governance With CommandIG

    2015-10-19T10:15:00Z

    Recall Holdings Limited, an information management solutions provider, recently announced the general availability of Recall CommandIG, a secure cloud-based or on-premise information governance solution that enables companies to easily govern paper records and digital information wherever it resides and address the challenges of secure collaboration. More inside.

  • Blog

    Transforming the Cyber-Security Paradigm

    2015-10-14T10:15:00Z

    Though data breaches are inevitable, companies still remain too focused on fortification rather than response, failing to adopt to the harsh realities of rapidly emerging international and multifarious cyber-security threats. Inside, columnist John Reed Stark recommends a three-step cyber-security transformation for companies to undertake to combat recent rapidly evolving cyber-dangers.