- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
By Matt Kelly2015-09-14T15:30:00
Image: Title: KellyCyber-security risk might seem overwhelming these days; compliance, audit, and risk professionals are all reeling from the speed and diversity of attacks. This week, editor Matt Kelly explores how to get closer to an effective cyber-security process by remembering the basics—such as behind every cyber-attack is someone committing ...
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2015-11-10T09:45:00Z By Joe Mont
Regulators often say they want “reasonable” precautions when spelling out expectations on cyber-security. But with a plethora of guidance and frameworks to consider, what does that mean—and does “reasonable” depend on industry and company size? A small summit meeting of cyber-security voices debated that question in Boston recently; we have ...
2015-10-27T15:15:00Z By Joe Mont
An investment adviser firm in St. Louis has become the (painful) test subject for the SEC’s attitude on cyber-security matters. The case, observers say, is a warning that the agency is moving away from guidance and toward enforcement. So what will the SEC consider to be “reasonable” security efforts? Will ...
2015-10-06T11:00:00Z By Tammy Whitehouse
Image: As cyber-security and IT controls rise up the priority list in corporate audits, a new wrinkle is emerging: numerous frameworks (COSO, NIST, CoBIT) used by numerous parties, all trying to build effective control systems. That could lead to painful detours in mapping controls, if compliance executives don’t plan carefully. ...
Site powered by Webvision Cloud