Preparing for a Vulnerability Scan

5 Notions for Adding Value while Meeting SEC Regulatory Expectations Vulnerability Management is not the easiest concept to grasp, but, if you are attempting to define it, you are probably ahead of most of your peers in demonstrating IT security and corresponding program maturity. As Lyman Terni pointed out in a recent [...]

By |2018-01-17T16:01:29-04:00February 16th, 2016|Cyber Security|0 Comments

The Annual Review and Cybersecurity

The 206(4)-7 Annual Review and Cybersecurity. Steps for the CCO to Consider and Elements of the Compliance Rule Now is the perfect time to consider the incorporation of IT Security/Cybersecurity into the Annual Review process. While ownership of the Compliance and the IT functions may belong to management, there is no getting around [...]

By |2018-01-18T10:07:55-04:00February 2nd, 2016|Cyber Security|0 Comments