Regulatory and Compliance
New York State Department of Financial Services (DFS) first-in-the-nation cybersecurity regulation to protect New York State from the ever-growing threat of cyber-attacks is now in effect. DFS Cybersecurity requires banks, insurance companies, and other financial services institutions regulated by DFS to establish and maintain a cybersecurity program designed to protect consumers and ensure the safety and soundness of New York State’s financial services industry.
We just got our daily update from JDSupra (still LOVE THEM!) titled "California's Shine the Light Law: Latest Class Action Threat for Online Retailers and Electronic Commerce Companies", under the topic of Retail Industry Alert. Here's a link to get you started, because it's important business compliance reading, but that's not why I'm sending you all this letter.
How old is your facebook picture? (No, don't tell me, I don't care.) How much of our privacy obsession is related to truth? For example, the weight on your driver's license was absolutely true, twenty-five years ago. Is misrepresenting ourselves part of privacy or an American obsession with creating an illusion of identity.
In an honest society, what harm can really come of truth?
History of controls harmonization is really the history of managing conversations about risk. Cyber Risk Recap: What could go wrong?
Making Process Real, a seminar in preparing to meet new regulations for controls as proposed by the Sarbanes-Oxley Law was presented by Robin Basham, in Boston, MA 2003, while participating on the board of the Association for Women in Computing. This marked the first use of "Maturity Through Process", and was the basis for preparing ISO 9000 compliant companies to map to their needed SOX CobiT controls. The work was implemented through SamePage Software, which would later be branded "Facilitated Compliance Management". The model would be donated to open source and to this day would remain free.
HIPAA – HITECH, Aligning Secure Host Baselines According to Common Security Framework CSF
- Written by Robin Basham
- Parent Category: Regulatory and Compliance
- Category: HIPAA & HITRUST - Health Insurance Portability and Accountability Act
- Hits: 594
There are Six Steps to Achieving PCI Compliance, seven if you add Appendix for Hosted Environments
- Build and Maintain a Secure Network
- Protect Cardholder Data
- Implement Strong Access Control Measures
- Regularly Monitor and Test Networks
- Maintain a Vulnerability Management Program
- Maintain an Information Security Policy
The New Auditing Paradigm - IAM and SOX Controls Automation
Workday Rising presentation showed an industry use case where Workday, RemedyForce, ADManager (Zoho), Salesforce and various IT Monitoring tools were used in combination to eliminate more than 90% of evidence gathering activities needed to satisfy a SOX compliance program.
FFIEC Article Count: 0
FedRamp Article Count: 0
GDPR European Union Data Protection Directive Article Count: 4
Gramm-Leach-Bliley Act Security Aspects of GLBA Article Count: 0
ISO 27002:2013 ISMS Article Count: 3
NERC CIP Article Count: 0
PCI Compliance Article Count: 2
SOC 2 v2016 AICPA SSAE16 and GAPP Article Count: 1
Sarbanes-Oxley Act SOX-ITGCC Article Count: 1
Unified Compliance Framework & Harmonization Article Count: 2
Thank you for your interest in EnterpriseGRC Solutions.
We look forward to serving your needs.