Remove Course Remove Examples Remove Government Remove Insurance
article thumbnail

New York Regulators Call on Insurers to Strengthen the Cyber Underwriting Process

Hunton Privacy

As reported on the Hunton Insurance Recovery blog , on February 4, 2021, the New York Department of Financial Services (“NYDFS”), which regulates the business of insurance in New York, has issued guidelines, in the Insurance Circular Letter No.

article thumbnail

What Is Integrated Risk Management? Definition & Implementation

eSecurity Planet

For example, a clothing brand might select a business objective such as to develop unique and appealing designs. In the examples above, the clothing brand will use traditional and computer-aided design prototyping and marketing research. What objectives deliver maximum value to shareholders?

Risk 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Governance, Technology, and Capitalism.

John Battelle's Searchblog

Our lives are now driven in large part by data, code, and processing, and by the governance of algorithms. I’ve always marveled at libertarians who think the best regulatory framework for government is none at all. Do they think that means there’s no governance ? We call these systems government. Whose will?

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

In the first week of January, the pharmaceutical giant Merck quietly settled its years-long lawsuit over whether or not its property and casualty insurers would cover a $700 million claim filed after the devastating NotPetya cyberattack in 2017. The 9/11 attacks cost insurers and reinsurers $47 billion. 11, 2001, terrorist attacks.

article thumbnail

$10,000,000 civil penalty for disclosing personal data without consent

Data Protection Report

For example, the government alleged that the company placed personal information “in a shared electronic folder, which unauthorized persons whom Cerebral has been unable to identify accessed multiple times” In addition, “former employees and contractors accessed 266 patient files using access credentials Cerebral failed to revoke.”

article thumbnail

From the CTO: From Information Governance to Information Asset Management

Everteam

We need to change our thinking from a pure information governance perspective – which today is very much about risk mitigation – to one that is more focused on the value side of the coin and on helping corporate users understand the quality and business value of the corporate information assets they try to use.

article thumbnail

How can organisations close the cyber security skills gap?

IT Governance

A UK government report published last year found that 48% of organisations lacked the expertise to complete routine cyber security practices. The alternative is to build an internal security team and encourage employees in security-adjacent roles, such as IT, to take cyber security training courses.

Security 122