How To Protect Your Cybersecurity From Cyber Incidents
|
|
|
- Colin Ball
- 5 years ago
- Views:
Transcription
1 SEC ENFORCEMENT The SEC s Two Primary Theories in Cybersecurity Enforcement Actions By Daniel F. Schubert, Jonathan G. Cedarbaum and Leah Schloss WilmerHale Cyber attacks are increasingly common and affect all sectors of the economy, from retail and financial services, to health care and education. The types of attackers and their goals are just as varied as the targets, with criminals, foreign governments and so-called hacktivists attacking companies to steal money or personal information, engage in corporate espionage and tarnish reputations. When a data security incident has been identified, a company s initial priorities include understanding, containing and remedying the vulnerabilities. In the aftermath of a data security incident, however, companies often have to focus nearly as quickly on responding to inquiries from an expanding array of federal, state, and local regulators and law enforcement agencies. State attorneys general have been active in this field for some time, bringing enforcement actions under various state consumer protection, data security and privacy laws. At the federal level, the Federal Trade Commission (FTC) has pursued more than 50 data security investigations over the last decade and a half, relying on the prohibition on unfair and deceptive trade practices in Section 5 of the FTC Act. The Securities and Exchange Commission (SEC) is a more recent entrant into the cybersecurity enforcement arena. It has dramatically increased its focus on these issues in the last four years, and it has signaled an intent to continue to expand its efforts. This is true not only for financial institutions subject to extensive SEC oversight such as broker-dealers and investment advisers but for all publicly-traded companies. The SEC s Initial Involvement: Encouraging Disclosures The SEC visibly entered the cybersecurity arena in 2011, initially in a non-enforcement context. Responding to concerns that public companies may not have been providing adequate disclosures about cyber incidents, the SEC s Division of Corporation Finance issued guidance in October 2011 about when disclosure could be required, both in the wake of a cybersecurity event and in general risk factor disclosures in securities filings. While the guidance was issued, at least in part, in response to the urging of Senator Rockefeller (D-WV), [1] the Division of Corporation Finance quickly made clear that it would take the issue of cybersecurity disclosures seriously. In the first year and half after the guidance was issued, the SEC sent comment letters to approximately 50 public companies, requesting information about cyber incidents and information security. [2] These comment letters effectively required companies to commit to disclosing the fact of past incidents, though disclosure of particular details and circumstances may not be required. In the wake of the SEC guidance and these comment letters, companies are increasingly including general discussions of cybersecurity risks in their corporate risk disclosures. From Comment Letters to Enforcement The SEC has quickly moved from comment letters to enforcement investigations and currently has multiple active enforcement investigations involving data breach events. The SEC s New York Regional Office has been 1
2 particularly active in this space, although other offices are also getting involved and have active enforcement investigations. In late February 2015 at the annual SEC Speaks conference, for example, David Glockner, the Director of the SEC s Chicago Regional Office, said that cybersecurity is high on [the SEC s] radar. [3] Glockner s comment is just the latest in a series of statements by high-ranking SEC officials signaling the SEC s increased focus on cybersecurity enforcement. SEC Chair Mary Jo White emphasized the importance of responding to threats posed by cybersecurity in the securities sector at a March 2014 Cybersecurity Roundtable, and described the SEC s role with regard to cybersecurity as focusing on disclosure of material information, and the protection of market-related systems, investors, and customer data. Commissioner Luis Aguilar made similar remarks during a June 2014 conference hosted by the New York Stock Exchange, expressing concern over the severe impact that the increasing frequency and cost of cyber attacks could have on the integrity of the capital markets, on public companies, and on investors. Although there have not yet been any publicly-resolved matters, consistent with these remarks, recent SEC cyberrelated enforcement actions appear to rely on two main theories: (1) disclosures and (2) controls. Enforcement Theory #1: Disclosures The SEC s interest in cyber-related disclosures falls broadly into two categories. Disclosures Following an Incident First, the SEC is actively examining corporate disclosures made in the wake of a cyber attack. The SEC is looking to understand how the issuer evaluated whether the incident was or should have been considered material and whether any disclosures that were made about the incident were timely, complete and accurate. A related theory, also within the scope of the SEC s authority, rests on Regulation FD, which, broadly speaking, prohibits issuers from selectively disclosing material non-public information to third parties, and instead generally requires simultaneous disclosure to the market at large. [4] Ongoing Disclosures Second, the SEC has expressed interest in whether issuers risk factor disclosures, located in their regular filings, contain sufficiently robust disclosures around the cyber risks facing the issuer. Among other things, the SEC is interested in whether the issuer has been subjected to prior cyber attacks, the detail and completeness of its disclosures in relation to those attacks and whether they accurately reflect the nature and severity of the cyber risks facing the issuer. Although, as noted, there have not yet been any publicly-resolved matters, these disclosure themes can be seen in the SEC s 2011 cybersecurity disclosure guidance itself, which noted (among other things) that: Although no existing disclosure requirement explicitly refers to cybersecurity risks and cyber incidents, a number of disclosure requirements may impose an obligation on registrants to disclose such risks and incidents.... In addition, material information regarding cybersecurity risks and cyber incidents is required to be disclosed when necessary in order to make other required disclosures, in light of the circumstances under which they are made, not misleading. The guidance thus stressed that registrants should review, on an ongoing basis, the adequacy of their disclosure relating to cybersecurity risks and cyber incidents. The guidance effectively put reporting companies on notice to pay closer attention to their cybersecurity disclosures, and many companies have, in the years since, revamped their standard risk factor disclosures to include cybersecurity risks. In light of this guidance and enforcement trends, companies experiencing a cybersecurity incident should carefully review the facts of the incident to 2
3 determine whether the event is material such as to require disclosure. Factors to consider in determining whether an incident is material include the magnitude of the incident, the type of data subject to the incident, and the potential impact of the incident on the company s business (including, for example, costs and other consequences arising from contractual obligations, remediation costs, litigation and damage to the company s business opportunities or relationships). Any statement about an incident must also be accurate. This means that substantive statements about an incident should either be avoided until information has been verified or otherwise appropriately caveated. That said, the significance of a breach should not be downplayed. Past disclosures, including cyber risk factors, should also be reviewed after an incident to determine whether updating is required. For example, the risk factors may discuss the risk of a cyber attack in hypothetical terms (i.e., attacks could happen), whereas post-attack the risk factors may more appropriately discuss such attacks in actual terms (i.e., attacks do happen) or identify the type of event that occurred if it is not covered under the prior disclosures. Enforcement Theory #2: Controls The second area of focus for the SEC is cyber-related controls. While, here too, no resolutions have been publicly disclosed, the SEC s interest appears to fall broadly into two categories. SEC-Registered Financial Institutions First, SEC-registered entities, such as broker-dealers and investment advisers, are subject to controls-related requirements under Regulation SP. [5] This regulation requires brokers, dealers, and investment companies, as well as registered investment advisers, to adopt written policies and procedures that address administrative, technical and physical safeguards for the protection of customer records and information. [6] These procedures must be reasonably designed to ensure the security and confidentiality of customer information, protect customer records from anticipated threats or hazards to their security or integrity and protect against unauthorized access to or use of customer records that could result in substantial harm or inconvenience. [7] Consistent with these requirements, the SEC has shown investigative interest in the impact of data breach incidents on customers of regulated entities and likely views this as a key jurisdictional hook for enforcement actions. In keeping with this interest, on February 3, 2015, the SEC s Office of Compliance, Inspections and Examinations released a Risk Alert summarizing the results of a cybersecurity examination sweep it had conducted since April [8] The sweep covered more than 100 registered broker-dealers and investment advisers, based on a long questionnaire addressing topics such as risk assessment, corporate governance, intrusion detection, vendor management and funds transfer fraud detection. [9] The questionnaire also asked registered entities for a detailed list of data security incidents they had experienced since 2013, ranging from incidents involving malware and network breaches to hardware/software malfunctions and other security incidents. [10] Speaking at the February 2015 SIFMA/FISMA Cybersecurity Conference the following day, Vincente Martinez, Chief of the Office of Market Intelligence in the SEC s Division of Enforcement, confirmed that, relying in part on the information in the Risk Alert, the SEC is actively examining both how its existing authorities can be used to bring more enforcement actions when firms fail to provide sufficient protection for the confidentiality and integrity of customer information and how those authorities might be broadened and strengthened. Martinez stressed that the Risk Alert is not intended as a best practices guide, but instead as a resource for the SEC to inform its enforcement efforts and development of policy. In a related development, the SEC has also recently adopted rules relating to the integrity and resilience of systems supporting securities trading, order routing, market regulation and certain other key market functions operated by or on behalf of certain 3
4 securities exchanges, clearing agencies and alternative trading systems. In November 2014, the SEC unanimously approved Regulation Systems Compliance and Integrity, or Regulation SCI. [11] This new regulation is intended to strengthen the technology infrastructure of the U.S. securities markets, to improve its resilience, and to enhance the [SEC s] ability to oversee it, [12] including by addressing the increased potential for technological problems with high-speed, automated trading on national securities exchanges and alternative trading systems. Regulation SCI places various obligations on covered entities, including requirements to (1) adopt standards that result in the design, development, testing, maintenance, operation and surveillance of covered systems to facilitate the successful collection, processing and dissemination of market data, [13] and (2) monitor relevant systems to identify potential SCI events, [14] including system intrusions (defined as an unauthorized entry into an SCI system). [15] In other words, the regulation places specific obligations to detect, and prevent covered systems from, unauthorized intrusions, such as cyber attacks. At the recent SIFMA/FISMA Cybersecurity Conference, Martinez pointed to the new Regulation SCI as an example of sources of authorities the SEC may rely upon to exercise a heightened data security enforcement role and suggested that the SEC is considering developing an analogue of the rule for broker-dealers. Finally, the Dodd-Frank Act transferred some of the FTC s authorities over the Red Flag identity-theft rules to the SEC. [16] These rules require covered entities (generally, broker-dealers, investment companies, and investment advisers) to adopt and implement an identity-theft program, designed to identify, detect and respond to signs of identity theft. [17] The SEC could perhaps use this authority as a jurisdictional hook for enforcement following a breach of a covered entity that failed to implement sufficient controls to detect and prevent identity theft. Thus, at least with respect to SEC-registered financial institutions and other key market players, the SEC has made clear that it is willing to use both its existing regulations and the adoption of new regulations as a basis for cybersecurity enforcement to protect customer data and market integrity. SEC Reporting Companies Generally In addition to the IT security practices of SEC-regulated financial institutions and key market players, the SEC has recently begun to explore its authority over the IT controls of publicly-traded companies in two areas. First, the SEC has expressed enforcement interest in controls around systems that contain financial reporting data. This theory appears to be based on Section 404 of the Sarbanes-Oxley Act of 2002 (SOX) and implementing regulations, which generally require publicly-traded companies to maintain a system of internal control over financial reporting (ICFR). [18] SEC guidance has stated that the [m]anagement s evaluation of the risk of misstatement should include consideration of the vulnerability of the entity to fraudulent activity (for example, fraudulent financial reporting, misappropriation of assets and corruption), and whether any such exposure could result in a material misstatement of the financial statements. [19] Placed in the context of a cyber breach, the SEC s theory appears to be that cybersecurity is relevant to ICFR insofar as security breaches could allow an intruder to tamper with the financial statements or underlying financial data or records. [20] That said, the language of SEC rules suggests that safeguarding of assets is relevant to ICFR only to the extent that control failures with respect to safeguarding could have a material impact on financial statements. [21] Second, the SEC has expressed interest in finding a broader controls-related theory, under which controls around additional systems could potentially be subject to jurisdiction. It is not clear that there is any legal 4
5 basis for such a theory, but it would perhaps rest on a combination of the SOX and Foreign Corrupt Practices Act s internal controls provisions. Another Possible Enforcement Theory? While disclosures and controls have been the two primary theories that the SEC has been exploring in recent enforcement actions, other theories are likely on the horizon as the SEC continues to seek to broaden its enforcement efforts. For example, a recent report by cybersecurity firm FireEye has highlighted a hacking group targeting information about mergers and acquisitions (and other sensitive non-public information) that could perhaps be used for insider-trading. [22] Pursuant to its authorities to protect market integrity and prevent insider trading, the SEC may try to use the breach of non-public deal information as a jurisdictional hook. Daniel Schubert is a partner in WilmerHale s Securities and Litigation/Controversy Departments. His practice focuses on securities litigation and enforcement matters, including advising clients on cybersecurity disclosures and investigations. Jonathan Cedarbaum is a partner in WilmerHale s Government and Regulatory Litigation and Cybersecurity, Privacy, and Communications Groups. He counsels clients and represents them before administrative agencies and congressional committees on a wide array of data security and privacy issues. Leah Schloss is an associate in WilmerHale s Defense, National Security, and Government Contracts Group. She focuses primarily on advising clients on data security and cybersecurity matters, including data breach preparedness, investigations and response. 5
6 [1] See Letter from Senator John D. Rockefeller IV, Chairman, Senate Commerce, Sci., & Transp. Comm., et al. to Mary Schapiro, Chairman, Sec. & Exch. Comm n (May 11, 2011). [2] See Letter from Mary Schapiro, Chairman, Sec. & Exch. Comm n, to Senator John D. Rockefeller IV, Chairman, Senate Commerce, Sci., & Transp. Comm. (May 1, 2013). [3] Sarah N. Lynch, SEC on the prowl for cyber security cases: official, Reuters (Feb. 20, 2015). [4] 17 C.F.R This regulation does not apply to SEC reporting companies that are foreign private issuers (as defined in SEC Rule 405 and under the Securities Act of 1933). [5] 17 C.F.R. Part 248 Subpart A. [6] Id (a). [7] Id. [8] SEC Office of Compliance Inspections and Examination, National Exam Program Risk Alert: Cybersecurity Examination Sweep Summary, Vol. IV, Iss. 4 (Feb. 3, 2015). [9] Id.; Office of Compliance Inspections and Examination, National Exam Program Risk Alert: OCIE Cybersecurity Initiative Appendix, Vol. IV, Iss. 2 (Apr. 15, 2014). [10] Id. [11] Regulation Systems Compliance and Integrity, 79 Fed. Reg (Dec. 5, 2014) (incorporated at 17 C.F.R et seq.). [12] Mary Jo White, Chairman, Sec. & Exch. Comm n, Statement at Open Meeting on Regulation SCI (Nov. 19, 2014). [13] 17 C.F.R (a)(2)(vi). [14] Id (a)(2)(vii). [15] Id [16] 15 U.S.C. 1681m(e)(1). [17] Id (d)(2), (d)(2). [18] 15 U.S.C. 7262; 17 C.F.R a-14, a-15, , (31)(i). [19] Commission Guidance Regarding Management s Report on Internal Control Over Financial Reporting Under Section 13(a) or 15(d) of the Securities Exchange Act of 1934, Release No at 14 (Jun. 27, 2007). [20] Auditors are also looking at this issue, such that shortcomings in controls with respect to cybersecurity could result in an auditor finding of a significant deficiency or material control weakness. [21] 17 C.F.R a-15(f) (defining internal control over financial reporting to include a process... to provide reasonable assurance regarding the reliability of financial reporting... that (3) provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use or disposition of issuer s assets that could have a material effect on the financial statements. (emphasis added)). [22] FireEye, Hacking the Street? FIN4 Likely Playing the Market (2014). 6
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
CYBERSECURITY EXAMINATION SWEEP SUMMARY
This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Client Update SEC Releases Updated Cybersecurity Examination Guidelines
Client Update September 18, 2015 1 Client Update SEC Releases Updated Cybersecurity Examination Guidelines NEW YORK Jeremy Feigelson [email protected] Jim Pastore [email protected] David Sarratt
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
Securities and Futures & Derivatives Alert
Securities and Futures & Derivatives Alert April 25, 2013 SECURITIES SEC and CFTC Issue Identity Theft Red Flags Rules I. Introduction On April 10, 2013, the Securities and Exchange Commission (SEC) and
Identity Theft Regulation: Are you under the SEC/CFTC microscope?
Regulatory September 2013 brief A publication of PwC s financial services regulatory practice Identity Theft Regulation: Are you under the SEC/CFTC microscope? Overview Easy access to information has made
Before the FEDERAL TRADE COMMISSION Washington, DC 20580. In re Maricopa Community College District
Before the FEDERAL TRADE COMMISSION Washington, DC 20580 In the Matter of ) ) Maricopa County Community College District ) ) ) Complaint, Request for Investigation, Injunction, and Other Relief Submitted
Cybersecurity For Brokers: 'Only The Paranoid Survive'
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Cybersecurity For Brokers: 'Only The Paranoid Survive'
Gus P. Coldebella (@g_co) Partner, Goodwin Procter LLP Former General Counsel, Dept. of Homeland Security. What are we going to talk about today?
Cyber Security Meets Corporate Securities: The SEC's Authority to Regulate Companies' Cyber Defenses and Corporate Directors' Fiduciary Responsibilities Gus P. Coldebella (@g_co) Partner, Goodwin Procter
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the
For Release Upon Delivery 10:00 a.m., December 10, 2014 TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY Before the COMMITTEE ON BANKING, HOUSING,
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel [email protected]
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Data Privacy and Gramm- Leach-Bliley Act Section 501(b)
Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 [email protected] (202) 661-3935 Why share information? Prevention
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
Interagency Guidelines Establishing Information Security Standards. Small-Entity Compliance Guide
Interagency Guidelines Establishing Information Security Standards Small-Entity Compliance Guide I. INTRODUCTION Purpose and Scope of the Guide This Small-Entity Compliance Guide (footnote 1) is intended
Cybersecurity and Insurance Companies
Cybersecurity and Insurance Companies ACLI Forum 500 CEO Leadership Retreat Timothy J. Nagle Vice President & Chief Privacy Counsel Prudential Financial 1 May 13, 2015 What is cybersecurity? Protecting
Subject: Safety and Soundness Standards for Information
OFHEO Director's Advisory Policy Guidance Issuance Date: December 19, 2001 Doc. #: PG-01-002 Subject: Safety and Soundness Standards for Information To: Chief Executive Officers of Fannie Mae and Freddie
INVESTMENT ADVISERS. Requirements and Costs Associated with the Custody Rule. Report to Congressional Committees
United States Government Accountability Office Report to Congressional Committees July 2013 INVESTMENT ADVISERS Requirements and Costs Associated with the Custody Rule GAO-13-569 July 2013 INVESTMENT ADVISERS
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
NATIONAL CYBERSECURITY PROTECTION ACT OF 2014
PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128
S T R O O C K SPECIAL BULLETIN
S T R O O C K SPECIAL BULLETIN May 8, 2013 EXECUTIVE SUMMARY The CFTC and SEC have issued jointly a release setting forth final rules and guidelines requiring certain business entities subject to their
EXAMINATION PRIORITIES FOR 2015
EXAMINATION PRIORITIES FOR 2015 I. Introduction This document identifies selected 2015 examination priorities of the Office of Compliance Inspections and Examinations ( OCIE, we or our ) of the Securities
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson [email protected] WASHINGTON, D.C. Satish M. Kini [email protected] Renee
Conference on Life Insurance Company Products Featuring Current SEC, FINRA, Insurance, Tax, and ERISA Regulatory and Compliance Issues
799 THE AMERICAN LAW INSTITUTE Continuing Legal Education Conference on Life Insurance Company Products Featuring Current SEC, FINRA, Insurance, Tax, and ERISA Regulatory and Compliance Issues November
Substantive Requirements for a Registered Investment Adviser under the U.S. Investment Advisers Act of 1940
Substantive Requirements for a Registered Investment Adviser under the U.S. Investment Advisers Act of 1940 Alternative investment fund managers and other investment advisory firms that are registered
FS Regulatory Brief. How the SEC s Custody Rule Impacts Private Fund Advisers. Introduction. The Custody Rule: An overview
How the SEC s Custody Rule Impacts Private Fund Advisers Introduction Under the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank, or the Act ) and rules recently adopted by the Securities
The Problems With SEC s Cybersecurity Approach
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] The Problems With SEC s Cybersecurity Approach Law360,
Re: Big Data Request for Information
March 31, 2014 Attn: Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue NW Washington, D.C. 20502 Ladies and Gentlemen: Re: Big Data Request
UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION
UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION SECURITIES EXCHANGE ACT OF 1934 Release No. 60733 / September 29, 2009 INVESTMENT ADVISERS ACT OF 1940 Release No. 2929 / September
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
Privacy Law Basics and Best Practices
Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff [email protected] What Is Information Privacy? Your name? Your phone number or home address? Your email address?
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
Defining the Gap: The Cybersecurity Governance Study
Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining
[RELEASE NOS. 33-8810; 34-55929; FR-77; File No. S7-24-06]
SECURITIES AND EXCHANGE COMMISSION 17 CFR PART 241 [RELEASE NOS. 33-8810; 34-55929; FR-77; File No. S7-24-06] Commission Guidance Regarding Management s Report on Internal Control Over Financial Reporting
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
FINRA-Broker Dealer Investment Banking Due Diligence
FINRA-Broker Dealer Investment Banking Due Diligence On April 20, 2010, the Financial Industry Regulatory Authority ( FINRA ) issued Regulatory Notice 10-22 (the Notice ) reminding broker-dealers of their
UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION
UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION INVESTMENT ADVISERS ACT OF 1940 Release No. 4204 / September 22, 2015 ADMINISTRATIVE PROCEEDING File No. 3-16827 In the Matter of
DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
FINRA Publishes its 2015 Report on Cybersecurity Practices
Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February
M E M O R A N D U M. The Policy provides for blackout periods during which you are prohibited from buying or selling Company securities.
M E M O R A N D U M TO: FROM: All Directors, Officers and Covered Persons of Power Solutions International, Inc. and its Subsidiaries Catherine Andrews General Counsel and Insider Trading Compliance Officer
Lincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program
Lincoln Financial Group FTC/SEC Red Flags Identity Theft Prevention Program Program Summary For Internal Use Only Table of Contents Page The Red Flags Rule 3 Key Points of the Program 4 Covered Accounts
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
Cybersecurity Awareness. Part 1
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
J.H. ELLWOOD & ASSOCIATES, INC. 33 West Monroe, Suite 1850 Chicago, IL 60603 (312) 782-5432 www.ellwoodassociates.com.
J.H. ELLWOOD & ASSOCIATES, INC. 33 West Monroe, Suite 1850 Chicago, IL 60603 (312) 782-5432 www.ellwoodassociates.com March 31, 2015 This brochure provides information about the qualifications and business
Regulatory focus on cybersecurity is intensifying.
The Investment Lawyer Covering Legal and Regulatory Issues of Asset Management VOL. 21, NO. 8 AUGUST 2014 Developments in Cybersecurity Law Governing the Investment Industry By Luke T. Cadigan and Sean
If some evil genius were sitting down to devise ways
The Investment Lawyer Covering Legal and Regulatory Issues of Asset Management VOL. 22, NO. 2 FEBRUARY 2015 Cybersecurity: Could Investment Company Directors Be Liable for a Breach? By Arthur C. Delibert,
Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Submitted via email: [email protected] April 8, 2013 Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Developing a Framework
IT Security to Combat Today s Cyber Fraud
IT Security to Combat Today s Cyber Fraud Thomas J. DeMayo, CISSP, CIPP, CEH, CPT, MCSE Director, IT Audit and Consulting - O Connor Davies, LLP Timothy M. Simons, CPA, CFA, CIPM, CSCP, CFP Senior Managing
Complying with the GLBA Privacy and Safeguards Rules. By Robert J. Scott and Adam W. Vanek
Complying with the GLBA Privacy and Safeguards Rules By Robert J. Scott and Adam W. Vanek Complying with the GLBA Privacy and Safeguards Rules By Robert J. Scott and Adam W. Vanek It is the policy of Congress
DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? FREEMAN WOOD HEAD OF MERCER SENTINEL NORTH AMERICA GREGG SOMMER HEAD OF OPERATIONAL RISK ASSESSMENTS MERCER
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on
Governance, Risk & Compliance Management. Julian Hunn, Operations Manager Professional Standards
Governance, Risk & Compliance Management Julian Hunn, Operations Manager Professional Standards Session Plan GRC Governance, Risk & Compliance Management What is corporate governance? Directors duties
What are you trying to secure against Cyber Attack?
Cybersecurity Legal Landscape Bonnie Harrington Executive Counsel EHS and Product Safety & Cybersecurity GE Energy Management Imagination at work. What are you trying to secure against Cyber Attack? Personally
Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response
Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary
