article thumbnail

President Biden Signs Two Bills Aimed at Enhancing Government Cybersecurity

Hunton Privacy

On June 21, 2022, President Biden signed into law, the State and Local Government Cybersecurity Act of 2021 (S. 1097) (the “Cyber Workforce Program Act”), two bipartisan bills aimed at enhancing the cybersecurity postures of the federal, state and local governments.

article thumbnail

Transition to Electronic Government: Signs of the Time

Preservica

In 2002, I accepted the position of Statewide Records and Forms Coordinator for the Wisconsin Department of Electronic Government (DEG). Today, digital information and communications technologies are ubiquitous in the public sector and every agency is engaged in e-government. Playing Catch Up.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Announces Significant Updates to GLB Safeguards Rule

Hunton Privacy

Promulgated in 2002 pursuant to the Gramm-Leach-Bliley Act, the Safeguards Rule obligates covered financial institutions to develop, implement and maintain a comprehensive information security program that complies with the Rule’s requirements. Key Terms and Examples. Security Programs.

article thumbnail

The history of ESG: A journey towards sustainable investing

IBM Big Data Hub

The term ESG, or environmental, social and governance , is well-known in the investor community. In 1997, the Global Reporting Initiative (GRI) was founded with the aim of addressing environmental concerns, though it soon broadened its scope to also focus on social and governance issues.

article thumbnail

Why you should keep data observability separate from data cleansing

Collibra

Consider the examples from our peer industries: Operational Risk. For financial services, data governance found its roots in risk. Basel II lists seven risk categories with clear reference to data governance given “data entry” and “data maintenance” (Event Type 7). Cyber Security. Audit & Professional Services.

Risk 91
article thumbnail

A Cyber Insurance Backstop

Schneier on Security

After Merck filed its $700 million claim, the pharmaceutical giant’s insurers argued that they were not required to cover the malware’s damage because the cyberattack was widely attributed to the Russian government and therefore was excluded from standard property and casualty insurance coverage as a “hostile or warlike act.”

article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

Programs like iDefense Labs Vulnerability Contributor Program (VCP) (launched in 2002) and TippingPoint’s Zero Day Initiative (2005) were accused -at the time- of incentivizing the work of criminals and bad actors. . When the first bugs for cash programs emerged almost two decades ago, they were controversial.

IoT 98