Remove Information Security Remove Insurance Remove Risk Remove Security awareness
article thumbnail

Data protection strategy: Key components and best practices

IBM Big Data Hub

Together, these comprehensive approaches not only deter threat actors but also standardize the management of sensitive data and corporate information security and limit any business operations lost to downtime. Data risk management To protect their data, organizations first need to know their risks.

article thumbnail

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

In the past two years, multiple state bills that have been introduced in the US to provide for cybersecurity requirements and standards to the insurance sector, with recent legislative activity taking place in particular within the States of Ohio, South Carolina, and Michigan. NYDFS: Setting a new bar for state cybersecurity regulation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Cybersecurity Pros Should Care About Governance

Getting Information Done

Ultimately, the chief information security officer (CISO) needs to understand the information footprint across systems, determine the value/risk of loss, and protect against cyberattacks through the deployment of control activities, which are commensurate with the value/risk of these information systems.

article thumbnail

OCR Settlement Emphasizes Importance of Implementing Safeguards to Protect PHI

Hunton Privacy

Department of Health and Human Services’ Office for Civil Rights (“OCR”) entered into a resolution agreement with MAPFRE Life Insurance Company of Puerto Rico (“MAPFRE”) relating to a breach of protected health information (“PHI”) contained on a portable storage device. On January 18, 2017, the U.S.

article thumbnail

A Chief Security Concern for Executive Teams

Krebs on Security

KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). This post explores some reasons why this is the case, and why it can’t change fast enough.

Security 226
article thumbnail

FTC Seeks Comment on Proposed Changes to GLBA Implementing Rules

HL Chronicle of Data Protection

Finally, the plan must require evaluation and revisions to it as necessary following a security event. Chief Information Security Officer (“CISO”). Periodic risk assessments. The Safeguards Rule allows FIs to take a risk-based approach to developing its ISP. Specific information security measures.

Privacy 40
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

More and more, directors are viewing cyber-risk under the broader umbrella of corporate strategy and searching for ways to help mitigate that risk. Despite the plethora of cyber-risk guidance that has surfaced in recent years, however, there is no “silver bullet” for cyber incident response and prevention.