Blog2018-01-17T11:35:04-05:00

Information Governance Part 2: WHY You Need A Program

11 Key Reasons To Develop a Governance Plan For much of the Information Age, allowing information (even after its business function is fulfilled and there is no other obligation to keep it) to accumulate was relatively risk-free since storage devices were so cheap. But recently, three important developments have changed all [...]

By |December 1st, 2015|Categories: Governance, Information Security|Comments Off on Information Governance Part 2: WHY You Need A Program

Data Loss Prevention – The SEC’s Expansive View

Information Technology professionals typically view Data Loss Prevention in a rather narrow way: DLP is a set of tools, products, and/or practices that can be used to monitor for or restrict the transmission of sensitive data outside of a given organization. Operating under this assumption, Data Loss Prevention can be an [...]

By |November 17th, 2015|Categories: Cyber Security|Comments Off on Data Loss Prevention – The SEC’s Expansive View

Employee Onboarding – Laying the Foundation for a Secure Workforce

EMPLOYEE ONBOARDING – LAYING THE FOUNDATION FOR A SECURE WORKFORCE Oftentimes, a company-wide shift in policy can seem a daunting task. Many of the people we speak to discuss their desire to promote cybersecurity and to meet newly-discovered regulatory obligations. “But,” they ask, “where do I begin? My staff have been [...]

By |November 10th, 2015|Categories: Cyber Security|Comments Off on Employee Onboarding – Laying the Foundation for a Secure Workforce

Reducing Your Attack Surface

Six Considerations for Investment Advisers and the CCO The concept of “Attack Surface” with respect to IT program exposure has become more relevant due to the advent of new technologies such as cloud-based services and applications, the proliferation of mobile devices for business use, and the acceleration of breach activities. As [...]

By |November 3rd, 2015|Categories: Cyber Security|Comments Off on Reducing Your Attack Surface

Information Governance Part 1: “The Stakes”

Understanding the SEC's Focus on Governance “There is no such thing as bad publicity,” a notorious circus promoter allegedly once said.[1]  And cybersecurity sure has had its fair share lately.  Hardly a month, week or day goes by without another news flash that some company, government institution or law enforcement agency [...]

By |October 21st, 2015|Categories: Cyber Security|Comments Off on Information Governance Part 1: “The Stakes”

Lessons From Cyber Enforcement for the CCO

5 Steps for Advisers and Broker-Dealers in the Wake of R.T. Jones The SEC’s Order referenced R.T. Jones’s failure “to adopt any written policies and procedures reasonably designed to safeguard its clients’ PII as required by the Safeguards Rule.”  This isn’t the first time the Commission has invoked Rule 30(a) of [...]

By |October 13th, 2015|Categories: Cyber Security|Comments Off on Lessons From Cyber Enforcement for the CCO

Secure your business with Artemis – starting today!

Go to Top