About Lyman Terni

This author has not yet filled in any details.
So far Lyman Terni has created 56 blog entries.

Regulatory Compliance Drives IT Security in 2015

Cybersecurity is the CCO’s Monkey. A Lookback at a Landmark Year for Cybersecurity If 2013 represented a flashpoint for Cybersecurity, the year in which front-page breach, Advanced Persistent Threats, and the Presidential Executive Order (13636) ignited public awareness, 2015 is the year in which Regulatory response has fueled the fully engulfed fire. At [...]

By |2018-01-18T10:24:37-05:00December 14th, 2015|Cyber Security|Comments Off on Regulatory Compliance Drives IT Security in 2015

Information Governance Part 2: WHY You Need A Program

11 Key Reasons To Develop a Governance Plan For much of the Information Age, allowing information (even after its business function is fulfilled and there is no other obligation to keep it) to accumulate was relatively risk-free since storage devices were so cheap. But recently, three important developments have changed all this: [...]

By |2018-01-20T11:21:38-05:00December 1st, 2015|Governance, Information Security|Comments Off on Information Governance Part 2: WHY You Need A Program

Data Loss Prevention – The SEC’s Expansive View

Information Technology professionals typically view Data Loss Prevention in a rather narrow way: DLP is a set of tools, products, and/or practices that can be used to monitor for or restrict the transmission of sensitive data outside of a given organization. Operating under this assumption, Data Loss Prevention can be an excellent [...]

By |2018-01-20T11:27:54-05:00November 17th, 2015|Cyber Security|Comments Off on Data Loss Prevention – The SEC’s Expansive View

Employee Onboarding – Laying the Foundation for a Secure Workforce

EMPLOYEE ONBOARDING – LAYING THE FOUNDATION FOR A SECURE WORKFORCE Oftentimes, a company-wide shift in policy can seem a daunting task. Many of the people we speak to discuss their desire to promote cybersecurity and to meet newly-discovered regulatory obligations. “But,” they ask, “where do I begin? My staff have been doing [...]

By |2018-01-20T11:31:11-05:00November 10th, 2015|Cyber Security|Comments Off on Employee Onboarding – Laying the Foundation for a Secure Workforce

Reducing Your Attack Surface

Six Considerations for Investment Advisers and the CCO The concept of “Attack Surface” with respect to IT program exposure has become more relevant due to the advent of new technologies such as cloud-based services and applications, the proliferation of mobile devices for business use, and the acceleration of breach activities. As your [...]

By |2018-01-20T11:33:29-05:00November 3rd, 2015|Cyber Security|Comments Off on Reducing Your Attack Surface

Information Governance Part 1: “The Stakes”

Understanding the SEC's Focus on Governance “There is no such thing as bad publicity,” a notorious circus promoter allegedly once said.[1]  And cybersecurity sure has had its fair share lately.  Hardly a month, week or day goes by without another news flash that some company, government institution or law enforcement agency has [...]

By |2018-01-20T11:58:00-05:00October 21st, 2015|Cyber Security|Comments Off on Information Governance Part 1: “The Stakes”

Lessons From Cyber Enforcement for the CCO

5 Steps for Advisers and Broker-Dealers in the Wake of R.T. Jones The SEC’s Order referenced R.T. Jones’s failure “to adopt any written policies and procedures reasonably designed to safeguard its clients’ PII as required by the Safeguards Rule.”  This isn’t the first time the Commission has invoked Rule 30(a) of Regulation [...]

By |2018-01-20T12:00:24-05:00October 13th, 2015|Cyber Security|Comments Off on Lessons From Cyber Enforcement for the CCO

SEC Fires the Second Round on Cyber Exams

The Future of The SEC Exam is Here. How to Respond to the New Request. Last week the SEC Office of Compliance Inspections and Examinations (“OCIE”) released its second Cybersecurity Examination Initiative; the first shot was fired in April, 2014 and was more commonly referred to as the “Cybersecurity Sweep Document Request.” [...]

By |2018-01-20T12:02:14-05:00September 22nd, 2015|Cyber Security|Comments Off on SEC Fires the Second Round on Cyber Exams

Boards and C-Suites in Shareholders’ Legal Crosshairs for Data Breaches

Boards and C-Suites in Shareholders' Legal Crosshairs for Data Breaches As companies attempt to balance data security and privacy with data utility, security breaches have exploded in frequency.  Hardly a month passes without headlines of a business experiencing a data breach involving the unauthorized disclosure of consumers’ personal and financial information.  These [...]

By |2018-01-20T12:05:35-05:00September 16th, 2015|Data Protection|Comments Off on Boards and C-Suites in Shareholders’ Legal Crosshairs for Data Breaches

Logical Encryption For Your Firm

Logical Encryption Controls to Secure Your Firm Encryption is all the rage today. Regulators are asking firms about their encryption policies, and those who do not have well-executed strategies can find themselves at risk of examination deficiencies or enforcement. With NSA spying allegations, the general public has begun to understand that encryption [...]

By |2018-01-22T11:39:11-05:00September 8th, 2015|Cyber Security, Data Protection, Encryption|Comments Off on Logical Encryption For Your Firm
Go to Top