Remove Information Security Remove Insurance Remove IT Remove Security awareness
article thumbnail

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

In the past two years, multiple state bills that have been introduced in the US to provide for cybersecurity requirements and standards to the insurance sector, with recent legislative activity taking place in particular within the States of Ohio, South Carolina, and Michigan. NYDFS: Setting a new bar for state cybersecurity regulation.

article thumbnail

Data protection strategy: Key components and best practices

IBM Big Data Hub

A data protection strategy is a set of measures and processes to safeguard an organization’s sensitive information from data loss and corruption. Data protection’s emphasis on accessibility and availability is one of the main reasons it differs from data security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Know your enemy – understanding the 7 different types of data breaches

IT Governance

We’re all guilty of making mistakes – it’s human nature – but employees need to understand the most important elements of information security, and non-technical staff need to be made familiar with security awareness policies and procedures. Cyber attack/criminal hacker. Insider threat. Are you prepared for a data breach?

article thumbnail

Why Cybersecurity Pros Should Care About Governance

Getting Information Done

Ultimately, the chief information security officer (CISO) needs to understand the information footprint across systems, determine the value/risk of loss, and protect against cyberattacks through the deployment of control activities, which are commensurate with the value/risk of these information systems.

article thumbnail

A Chief Security Concern for Executive Teams

Krebs on Security

Virtually all companies like to say they take their customers’ privacy and security seriously, make it a top priority, blah blah. That’s because very few of the world’s biggest companies list any security executives in their highest ranks. Nor is the average pay hugely different among all three roles.

Security 226
article thumbnail

OCR Settlement Emphasizes Importance of Implementing Safeguards to Protect PHI

Hunton Privacy

Department of Health and Human Services’ Office for Civil Rights (“OCR”) entered into a resolution agreement with MAPFRE Life Insurance Company of Puerto Rico (“MAPFRE”) relating to a breach of protected health information (“PHI”) contained on a portable storage device. On January 18, 2017, the U.S.

article thumbnail

FTC Seeks Comment on Proposed Changes to GLBA Implementing Rules

HL Chronicle of Data Protection

It includes general, high level elements of a security program, but lacks detailed security steps. The plan must enable FIs to promptly respond to and recover from security events affecting customer information. Finally, the plan must require evaluation and revisions to it as necessary following a security event.

Privacy 40