Remove category
Remove Analysis Remove Cybersecurity Remove Insurance Remove Training
article thumbnail

ROUNDTABLE: What happened in privacy and cybersecurity in 2021 — and what’s coming in 2022

The Last Watchdog

Meanwhile, President Biden issued a cybersecurity executive order finally putting the federal government’s regulatory stamp on foundational cyber hygiene practices many organizations should have already been doing, yet continue to gift short shrift. Security teams are realizing that training isn’t enough. Tony Pepper , CEO, Egress.

Privacy 235
article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Next-generation firewalls (NGFWs): Improve the general security of a firewall with advanced packet analysis capabilities to block malware and known-malicious sites. Endpoint detection and response (EDR): Provides more advanced security than AV with more intelligent analysis of endpoint activity and automated remediation.

Security 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Relatedly, PIPL outlines some categories of sensitive information that do not receive additional protection under GDPR. Also, health and financial data, among other categories of more sensitive data, is often treated as a more protected category of data under general data-privacy laws – subject to stricter protection requirements.

article thumbnail

Regulatory Update: NAIC Summer 2021 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2021 National Meeting (Summer Meeting) August 14-17, 2021. Highlights include, among others, adoption of revised risk-based capital bond factors for life insurers, amendments to SSAP No. NAIC Adopts Revised Risk-Based Capital Bond Factors for Life Insurers.

article thumbnail

What Is Integrated Risk Management? Definition & Implementation

eSecurity Planet

The 911 call center needs a robust phone system, trained staff, and a decision-tree process to understand how to route issues to the appropriate emergency or non-emergency agencies to address a caller’s needs. In the examples above, the clothing brand will use traditional and computer-aided design prototyping and marketing research.

Risk 64
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

Risk 147
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Recent guidance from the Securities and Exchange Commission (SEC) on disclosure and enforcement actions by the Federal Trade Commission (FTC) make clear that cybersecurity is no longer a niche topic, but a concern significant enough to warrant the oversight of corporate boards of directors. Adopting the NIST Cybersecurity Framework.