Reasonable Threat Intelligence

Managed Service Providers Under Attack In the past month, a Managed Service Provider (MSP), or what many registered investment advisers might utilize as their outsourced IT Provider, was breached, exposing up to 2000 user endpoints to issues of disruption and perhaps worse.  The IT Vendor was subsequently urged to pay ransom of [...]

By |2019-02-28T15:01:13-05:00February 28th, 2019|Best Practices, Cyber Security, Data Protection, Governance, Information Security, SEC, Uncategorized|Comments Off on Reasonable Threat Intelligence

Training – Are You Doing Enough To Meet Regulatory Expectations?

The Division of Investment Management’s recent cybersecurity guidance suggested that firms consider implementing training to provide guidance to officers and employees “concerning applicable threats and measures to prevent, detect, and respond to… threats and that monitor compliance with cybersecurity policies and procedures.” In addition, the Division suggested that firms “may wish to [...]

By |2018-01-25T21:28:17-05:00June 17th, 2015|Best Practices, Cyber Security|Comments Off on Training – Are You Doing Enough To Meet Regulatory Expectations?

Is Risk Assessment Mandatory Via Recent SEC and FINRA Guidance?

This may be one of those cases where regulatory expectation is just as important as the written Rule.  The Division of Investment Management's April 28 guidance used the following language: “In the staff’s view, there are a number of measures that funds and advisers may wish to consider in addressing cybersecurity risk.”  [...]

By |2018-01-25T21:35:45-05:00June 10th, 2015|Best Practices, Cyber Security|Comments Off on Is Risk Assessment Mandatory Via Recent SEC and FINRA Guidance?

Security Through Data Classification Part III – Administration

The regulatory expectation from both the SEC and the DOJ is that your firm will implement some form of a data classification system that will allow you to adequately protect your business’s sensitive information. We have previously discussed the creation and implementation of such a program.  In this post we will take [...]

By |2018-01-25T21:37:21-05:00June 1st, 2015|Best Practices|Comments Off on Security Through Data Classification Part III – Administration

Security Through Data Classification Part II – Defining a Schema

As we discussed in Part I of our data classification series, the regulatory expectation from both the SEC and the DOJ is that your firm will implement some form of a data classification system that will allow you to adequately protect your business’s sensitive information. In addition, a thoughtfully executed data classification system will [...]

By |2018-01-25T21:39:51-05:00May 26th, 2015|Best Practices, Data Classification|Comments Off on Security Through Data Classification Part II – Defining a Schema

Fraud, Breach, and Insider Activity

Just weeks ago, SEC Commissioner Aguilar’s Chief of Staff noted that the SEC is about to enter “a time of great change” regarding regulation for breach disclosure. Just weeks later, the guidance from the Division of Investment Management reinforced this notion by commenting that “in the staff’s view, funds and advisers should [...]

By |2018-01-25T21:41:16-05:00May 14th, 2015|Best Practices, Cyber Security|Comments Off on Fraud, Breach, and Insider Activity

DOJ Follows the SEC With Guidance on Breach Practices

Legal and Financial firms should be aware of and understand the guidance offered by the U.S. Department of Justice, Criminal Division, Cybersecurity Unit, titled “Best Practices for Victim Response and Reporting of Cyber Incidents” which was issued last Friday, April 29, 2015. We sit up and pay attention when Executive Departments with [...]

By |2018-01-25T21:44:43-05:00May 7th, 2015|Best Practices, Cyber Security, Data Protection|Comments Off on DOJ Follows the SEC With Guidance on Breach Practices

SEC Offers Cybersecurity Guidance

The SEC has offered definitive guidance on Cybersecurity, tying failures or shortcomings in practices to specific Rules and Regulations and paving the way for potential enforcement. While we have been discussing the path the SEC was implying for some months in the wake of the Cybersecurity Sweep results of February 3, 2015, [...]

By |2018-01-25T21:46:09-05:00May 4th, 2015|Best Practices, Cyber Security, Data Protection|Comments Off on SEC Offers Cybersecurity Guidance

Incident Recovery: Getting Things Back To Normal

A cybersecurity event has occurred at your firm. Your team is deep into its incident response plan. Procedures that you put in place and have tested and improved over the years are flowing relatively smoothly to their conclusion. Forensics staff have been brought in to determine how the incident occurred, law enforcement [...]

By |2018-01-26T17:33:06-05:00April 21st, 2015|Best Practices, Cyber Security|Comments Off on Incident Recovery: Getting Things Back To Normal

Incident Response Planning – Are You Ready?

Most companies have a cybersecurity plan of sorts in place already. When we speak, in general terms, about the first three key functions in the NIST Cybersecurity Framework, “Identify”, “Detect”, and “Protect”, we are met with understanding. After all, these categories make sense to all of us. Identifying those assets that need [...]

By |2018-01-26T17:36:56-05:00April 14th, 2015|Best Practices, Cyber Security|Comments Off on Incident Response Planning – Are You Ready?
Go to Top