Remove category
Remove Cybersecurity Remove Examples Remove Insurance Remove Meeting Remove Security
article thumbnail

Regulatory Update: NAIC Summer 2021 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2021 National Meeting (Summer Meeting) August 14-17, 2021. This post summarizes the highlights from this meeting in addition to interim meetings that were held during July in lieu of taking place during the Summer Meeting.

article thumbnail

SEC Chair: Sweeping New Cybersecurity Rules Are Coming Soon

Data Matters

On Monday, January 24, 2022, in a speech at the Northwestern University Pritzker School of Law annual Securities Regulation Institute conference, Gary Gensler, Chair of the U.S. These SEC rules could broadly affect cybersecurity requirements across the U.S. Public companies currently must disclose material cybersecurity incidents.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Decrypt Ransomware Files – And What to Do When That Fails

eSecurity Planet

First, call the cyber insurance company that issued the organization’s cybersecurity policy. Most insurance companies require specific incident response vendors, procedures, and reporting that must be met to meet the standards to be insured. Insured companies often will not have options.

article thumbnail

How to Find & Choose IT Outsourcing Services

eSecurity Planet

Even a robust IT or security department will find certain tasks or projects beyond their capabilities. But ignoring issues that you lack the time or expertise for can risk operational failure or security incidents. or cybersecurity-focused trade shows (RSA Conference, Black Hat, etc.)

IT 98
article thumbnail

How to Develop an Incident Response Plan

eSecurity Planet

We make IT, security, or any business decision by weighing the risks and the rewards. Or as is often the case with security, what costs can we skip and still escape big penalties later? For example, we might nominate: The IT security manager to handle a ransomware incident; Our external accountant to investigate financial fraud; or.

Insurance 124
article thumbnail

How to build a successful risk mitigation strategy

IBM Big Data Hub

You will also analyze the degree of negative impact the organization would face if the risk were to occur for risks such as cybersecurity or operational risks. A good practice might be setting up a weekly meeting time to discuss the risks or to use a statistics tool for tracking any changes in the risk profile.

Risk 70
article thumbnail

Cybersecurity: Managing Risks With Third Party Companies

Cyber Info Veritas

This is according to a recent survey conducted by Soha Systems, and according to one of the speeches delivered by the Superintendent of the New York State Department of Financial Services, Mr. Benjamin Lawsky, “ A company’s cybersecurity is only as strong as the cybersecurity of its third-party vendors ”.

Risk 40