WHAT’S NEW
This Valentine’s Day
Keep your data and heart safe from bad actors.
Help your colleagues remember your security policies with posters they’ll love.
EVENTS
TOP PEN TESTER-IDENTIFIED VULNERABILITIES YOU SHOULD ADDRESS THIS YEAR
Our Pen Testers have seen quite a few security environments and can identify typical vulnerabilities in organizations of all sizes and industries. This list includes 8 of the most common cybersecurity weaknesses our team looks and tests for on a regular basis.
WEBINARS
THE QUESTIONS A JUDGE WILL ASK YOU AFTER A DATA BREACH
1 CPE Credit | Complimentary Webcast Over 450 registered to attend
If you are breached and your case goes to litigation, you will likely be asked to demonstrate “due care” and that your controls were “reasonable.” Judges will ask a set of questions that help them determine whether your controls were reasonable.
This presentation will explain judicial balancing tests, how they relate to regulatory definitions of “reasonable” risk, and how to conduct risk assessments that prepare you to answer the tough questions before you need to be asked.
WHEN:Thu, Mar 21, 2019 2:00 PM EDT (1:00 PM CDT)
CYBER BEST PRACTICE
THE NEW YORK STATE DEPARTMENT of FINANCIAL SERVICES (DFS) CYBERSECURITY REGULATION 23 NYCRR 500 SECTION 11
All Covered Entities, which include all licensees regulated by the DFS, must have written policies and procedures designed to ensure the security of Information Systems and Nonpublic Information accessible to or held by Third Party Service Providers (TPSPs).
The policies and procedures must include relevant guidelines for due diligence and/or contractual protections relating to TPSPs
Third-Party Risk Management & Vendor Assessment.
HALOCK can quickly prepare and implement. Contact us for a Scope & Quote