| || Information Security Updates|
Top Pen Tester-Identified Vulnerabilities | Questions a Judge Asks You After A Data Breach |
Third-Party Service Provider Deadline | Love at First (web)Site?
| || || ||THIS VALENTINE'S DAY ...|| || || ||TOP PEN TESTER-IDENTIFIED VULNERABILITIES YOU SHOULD ADDRESS THIS YEAR || || || |
| || || ||Keep your data and heart safe from bad actors. |
Help your colleagues remember your security policies with posters they’ll love.
| || || ||Our Pen Testers have seen quite a few security environments and can identify typical vulnerabilities in organizations of all sizes and industries. This list includes 8 of the most common cybersecurity weaknesses our team looks and tests for on a regular basis. || || || |
| || || ||THE QUESTIONS A JUDGE WILL ASK YOU AFTER A DATA BREACH || || || ||THE NEW YORK STATE DEPARTMENT of FINANCIAL SERVICES (DFS) CYBERSECURITY REGULATION 23 NYCRR 500 SECTION 11|| || || |
| || || ||1 CPE Credit | Complimentary WebcastOver 450 registered to attend|
If you are breached and your case goes to litigation, you will likely be asked to demonstrate “due care” and that your controls were “reasonable.” Judges will ask a set of questions that help them determine whether your controls were reasonable.
This presentation will explain judicial balancing tests, how they relate to regulatory definitions of “reasonable” risk, and how to conduct risk assessments that prepare you to answer the tough questions before you need to be asked.
WHEN: Thu, Mar 21, 2019 2:00 PM EDT (1:00 PM CDT)
| || || |
All Covered Entities, which include all licensees regulated by the DFS, must have written policies and procedures designed to ensure the security of Information Systems and Nonpublic Information accessible to or held by Third Party Service
The policies and procedures must include relevant guidelines for due diligence and/or contractual protections relating to TPSPs
Third-Party Risk Management & Vendor Assessment.
HALOCK can quickly prepare and implement.
| || || |