Remove Blog Remove Encryption Remove Financial Services Remove Training
article thumbnail

NYDFS releases major update to Part 500 cybersecurity requirements for financial services companies

Data Protection Report

On November 1, 2023, the New York Department of Financial Services (“NYDFS”) released the finalized amendments of Part 500 of its cybersecurity regulations. Covered entities shall also provide at least annual training and cybersecurity awareness programs that anticipate social engineering attacks (500.14).

article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

On July 21, 2020, the New York State Department of Financial Services (NYDFS or the Department) issued a statement of charges and notice of hearing (the Statement) against First American Title Insurance Company (First American) for violations of the Department’s Cybersecurity Requirements for Financial Services Companies, 23 N.Y.C.R.R.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 things to know: Driving innovation with AI and hybrid cloud in the year ahead

IBM Big Data Hub

For organizations of all types—and especially those in highly regulated industries such as financial services, government, healthcare and telco—considerations including the rise of generative AI, evolving regulations and data sovereignty laws and ongoing security challenges must be top of mind.

Cloud 68
article thumbnail

5 things to know: IBM Cloud’s mission to accelerate innovation for clients

IBM Big Data Hub

We are bringing the power of foundation models with the availability of a GPU as a service on IBM Cloud offering to help organizations tap into artificial intelligence (AI) in a secured environment while aiming to mitigate third- and fourth-party risk.

article thumbnail

How Jamworks protects confidentiality while integrating AI advantages

IBM Big Data Hub

Robust encryption, granular access controls and privacy-preserving techniques become imperative to counter the risks of unauthorized data access and use. How to protect data with full authority at rest, in transit and in use Protecting sensitive data requires a holistic approach including computing, containers, databases and encryption.

Cloud 101
article thumbnail

Confidential Containers with Red Hat OpenShift Container Platform and IBM® Secure Execution for Linux

IBM Big Data Hub

Some example use cases to highlight: Confidential AI: leverage trustworthy AI and while ensuring the integrity of the models and confidentiality of data Organizations leveraging AI models often encounter challenges related to the privacy and security of the data used for training and the integrity of the AI models themselves.

article thumbnail

DOL Puts Plan Sponsors and Other Fiduciaries on Notice: ERISA Requires Appropriate Precautions to Mitigate Cybersecurity Threats

Data Matters

To the extent recordkeepers or other service providers already offer participants and beneficiaries training of this nature, they should review existing materials to confirm that they reflect all of the Online Security Tips. Obligations of Service Providers Responsible for Plan-Related IT Systems and Data.