Remove 12
Remove 2017 Remove Data Remove Insurance Remove Sales
article thumbnail

Regulatory Update: NAIC Summer 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2018 National Meeting in Boston, Massachusetts, from August 4 to 7, 2018. NAIC Continues its Evaluation of Insurers’ Use of Big Data . The NAIC is also considering insurers’ use of big data in underwriting life insurance products.

article thumbnail

US Senators introduce IoT cybersecurity bill

Data Protection Report

On August 1, 2017, US Senators unveiled a bipartisan bill to mandate baseline cybersecurity requirements for internet connected devices purchased by the federal government. Norton Rose Fulbright has been shortlisted for ‘Cyber law firm of the year’ at the Insurance Insider Cyber Ranking Awards 2017.

IoT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK: How real is the threat of data protection group litigation in the UK?

DLA Piper Privacy Matters

In the run up to the implementation of the EU General Data Protection Regulation 2016/679, there were various dystopian predictions of huge fines and the rise of US style class action. Some of these claims have rightly been criticised as sales patter and scaremongering. These make for a potentially toxic mix.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Investments in cybersecurity more than doubled from $12 billion to $29.5 billion in 2021, and growing concerns over data security , software supply chains , and ransomware suggest the market will remain strong through economic ups and downs. How to Land a Round of Funding Securing Data and Infrastructure is Hot. EEP Investments.

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

Without a comprehensive network segmentation or microsegmentation policy, malicious actors can also move laterally within your organization’s network, infect endpoints and servers, and demand a ransom for access to your data. Attackers will inform the victim that their data is encrypted. How ransomware works. Screenshot example.

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

A royal baby, a fire at Notre-Dame, the highest grossing film of all time and more than 12 billion breached data records: 2019 has been quite a year. Among other news: B&Q breached the personal data of 70,000 people who had been caught stealing products from its stores.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

A high-profile cyber incident may cause substantial financial and reputational losses to an organization, including the disruption of corporate business processes, destruction or theft of critical data assets, loss of goodwill, and shareholder and consumer litigation. Encrypting critical data assets. Using appropriate access controls.