Cyber Security - Systems Security Management

Going Back 2 Cali: The Golden State Passes Two New Data Privacy/Security Laws

by Sabine Zimmer | October 26, 2018 | California Consumer Privacy Act (CCPA), Cybersecurity, Data & Cybersecurity, Internet of Things (IoT), Privacy, Public Policy, Regulations, Regulatory Requirements

The California State Legislature recently completed a data privacy/data security two-step by passing two new laws with significant third party risk management implications for a broad collection of companies. In late September, California enacted what some are referring to as the country’s firs ....

bigstock Woman doctor using tablet comp 79388257

The Evolving Threat Landscape and New Challenges for Healthcare Security

June 7, 2017 | Cyberattacks, Cybersecurity, Data & Cybersecurity, Healthcare, Industry Verticals

  In this series, Shared Assessments Advisory Board Committee member Ken Peterson talks about managing cyber risk in the Healthcare space. We look forward to hearing more on this topic from Ken and the NH-ISAC at the 10th Annual Shared Assessments Summit. Q&A Series – Part 1As a sea ....

Setting a New Benchmark – New York State Cybersecurity Requirements

April 17, 2017 | Cybersecurity, Data & Cybersecurity

For financial services companies that fall under the New York State Department of Financial Services (DFS) cybersecurity requirements rule, the timeline for implementing 23 NYCRR500 has begun. The new rule became effective March 1st. Each section of the rule has a timeline relating to the developmen ....


The Shared Assessments Program 2017 Strategic Risk Management Initiative

April 11, 2017 | Best Practices, Business Resiliency, Certified Third Party Risk Professional (CTPRP), Cybersecurity, Education and Training, Framework, Outsourcing, Risk, Risk Management, Security, Third Party Risk, Third Party Risk Management, Vendor Risk Management

The Shared Assessments Program is the only organization that has uniquely positioned and developed standardized resources for managing the complete third party relationship lifecycle. Such standardization is critical to the advancement of effective, secure third party controls and risk management in ....


Shared Assessments Program Addresses Recommendations of Russian Hack Report for Improved Security

January 13, 2017 | Cyber Crime, Cyberattacks, Cybersecurity, Data & Cybersecurity, Hacking, Program Tools, Security, Third Party Risk Management, Tools & Templates

The Threat Horizon The December 29th joint analysis report (JAR) GRIZZLY STEPPE – Russian Malicious Cyber Activity, contains specific indicators of cyberattacks and steps organizations can take to mitigate the “the tools and infrastructure used by the Russian civilian and military intelligence ....


G-7 Financial Sector Fundamental Cybersecurity Guidance

October 14, 2016 | Banking and Financial Services, Cybersecurity, Guidance, Industry Verticals

This week the U.S. Department of the Treasury and the Board of Governors of the Federal Reserve System announced the publication of the G-7 Fundamental Elements of Cybersecurity for the Financial Sector. The document, released by central bank governors and finance ministers of the G-7 nations, delin ....

« Previous PageNext Page »