article thumbnail

Improve your data relationships with third parties

Collibra

Regulators are focusing on the data relationships financial services organizations have with third parties, including how well personal information is being managed. For example, FinTech and RegTech companies are very interested in working with companies that have a strong framework for managing data, including personal data. .

article thumbnail

California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA

HL Chronicle of Data Protection

This is the second installment in Hogan Lovells’ series on the California Consumer Privacy Act. Legislative history can speak volumes about those word choices, and the unique legislative history of the California Consumer Privacy Act of 2018 (CCPA) only highlights the importance of understanding the terms used in the act.

Privacy 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FCA Publishes Wholesale Banks and Asset Management Cyber Multi-Firm Review Findings

Data Matters

For example, in both sectors, not all firms had considered the risk that attacks may be motivated by attempts to commit market abuse. Effectiveness of second line functions in overseeing and managing cyber risks – all relevant areas of the business must have the relevant expertise. A full copy of the FCA report can be found here.

article thumbnail

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

The DaaS Consumer - who needs not only to acquire data from somewhere (in a way that shields them from the underlying technology concerns), but also then may use it to develop information apps and services, or repackage the data to share further with others. The consumer assigns and realizes value from the service.

article thumbnail

Managed IT Service Providers (MSPs): A Fast Way to Secure IT

eSecurity Planet

While MSPs also provide a wide range of business services, here we’ll focus on managed IT and cybersecurity service providers. For IT services and infrastructure, some larger MSPs will provide generalist services and attempt to solve all problems. How Do MSPs Work? You can unsubscribe at any time.

IT 89
article thumbnail

Managed IT Service Providers (MSPs): A Fast Way to Secure IT

eSecurity Planet

While MSPs also provide a wide range of business services, here we’ll focus on managed IT and cybersecurity service providers. For IT services and infrastructure, some larger MSPs will provide generalist services and attempt to solve all problems. How Do MSPs Work? You can unsubscribe at any time.

IT 76
article thumbnail

Podcast Episode 123: HaveIBeenPwned’s Troy Hunt on Marriott’s Big Mess and GreatHorn on the Asymmetric Threat of Email

The Security Ledger

And: you’ve heard of Business Email Compromise attacks but what about Business Service Impersonation scams? In our second segment we speak with Kevin O’Brien the CEO and co-founder of GreatHorn about using machine learning to defend against asymmetric messaging threats.