Vulnerability Assessments

News & Analysis as of

FTC Releases Data Breach Response Guide

On October 25, the Federal Trade Commission (FTC) released new guidance for businesses that outlines recommended actions to take when facing a data breach. This data breach response guide (Guide) follows the FTC's prior...more

Data Privacy Considerations for Starting or Evaluating a Bounty Program

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

Privacy Tip #31 – Landlines still a safe way to communicate but telephone companies want to drop them

I am pretty up to date on data privacy and security and technology, but the 60 Minutes episode this past Sunday night floored even me. If you didn’t see it, it is worth streaming. Basically, 60 Minutes showed Karsten...more

Preparing Your Organization Today to Win Its Future (Possibly Inevitable) Cyber Lawsuit: Making Crown Jewels Out of Paper

One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more

FAA calls for contractors to assess airplane cyber threats and vulnerabilities

The Federal Aviation Administration (FAA) is now reaching out to contractors to help assess cyber-attack threats and vulnerabilities to communications systems on airplanes. This new effort is part of the Aircraft Systems...more

The CFTC’s Proposed Standards Identify Cybersecurity Best Practices

The Commodity Futures Trading Commission (CFTC) offered several reasons for proposing five new cybersecurity testing requirements for the commodity trading platforms it regulates in its December 23, 2015, Notice of Proposed...more

Recent Government Cyber Alert and Draft Guide for Financial Institutions: Lessons for All Organizations

All organizations, including financial institutions, continue to face significant security threats across their wide ranging IT systems. Such organizations are particularly vulnerable if they cannot track networked devices...more

“Bug Bounty” Programs Grow In Popularity

In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more

ESAs report on risks in the EU financial system

The European Supervisory Authorities (ESMA, EBA and EIOPA jointly) have issued their August 2015 report on risks and vulnerabilities in the EU financial system. The report informs on risks in the banking, securities and...more

OPM data breach update: OPM shuts down background check system

The OPM announced this week that it is temporarily shutting down its background security clearance system, e-QIP, as vulnerabilities were found during a review of systems. Presently, according to OPM, the vulnerabilities did...more

EBA Report on Risks and Vulnerabilities of the EU Banking System

On July 17, the European Banking Authority (EBA) published a report on risks and vulnerabilities of the EU banking system. The report considered EBA key risk indicators and EBA risk assessment questionnaires for banks and...more

In Response To Sea Level Rising At Double The Global Rate, Delaware Debates Whether To Accommodate, Avoid, Protect Or Retreat

On February 19, 2013, the Delaware Sea Level Rise Advisory Committee ("DSLRAC") held the second of three "public engagement sessions" to solicit public comment on a list of 61 "Options for Preparing Delaware for Sea Level...more

12 Results
|
View per page
Page: of 1
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×