SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Richard M. Borden
•  Cyber crime costs $400 billion annually – Lloyd’s
•  Global cyber insurance uptake growing 21% annually
•  $2.5 billion in written cyber premiums in 2016
•  Rating agencies now addressing cyber-maturity in credit ratings
•  Cybersecurity is dominant risk for CEOs
•  70% view it a major threat
•  $3 trillion market value destroyed in 2015
•  “Top 5” risk likelihood – 2017 World Economic Forum
•  Most companies remain unprepared:
•  Only 58% of companies have resources to comply with security regulations
•  1.5 million InfoSec job shortage by 2019
•  Only 21% of companies at “mature” stage
•  Only 1/3 of corporations have a data breach response plan
The Cybersecurity Backdrop
New York 23 NYCRR 500 - The Significance
•  Billed as a “first-in-the-nation”
regulation concerning
cybersecurity
•  Arguably the most stringent
broadly applicable cyber
regulation in existence
•  Goes beyond other data privacy
and cybersecurity regulations,
including the Graham Leach Bliley
Act
•  Covers information and systems
that do not include, store, process
or maintain PII
•  Requires new compliance
processes and is built around the
Risk Assessment
•  Likely modification and expansion
of existing protocols to meet
regulatory requirements
•  C-Suite must personally certify
compliance with the Regulation
on an annual basis
•  Each Covered Entity shall maintain a cybersecurity program designed
to protect the confidentiality, integrity and availability of the Covered
Entity’s Information Systems.
•  The cybersecurity program shall be based on the Covered Entity’s Risk
Assessment and designed to perform the following core cybersecurity
functions:
•  identifyandassessinternalandexternalcybersecurityrisksthatmaythreatenthesecurityor
integrityofNonpublicInformationstoredontheCoveredEntity’sInformationSystems
•  usedefensiveinfrastructureandtheimplementationofpoliciesandprocedurestoprotectthe
CoveredEntity’sInformationSystems,andtheNonpublicInformationstoredonthose
InformationSystems,fromunauthorizedaccess,useorothermaliciousacts
•  detectCybersecurityEvents
•  respondtoidentifiedordetectedCybersecurityEventstomitigateanynegativeeffects
•  recoverfromCybersecurityEventsandrestorenormaloperationsandservices
•  fulfillapplicableregulatoryreportingobligations
The Main Requirement – 500.02
•  InformationSystemmeansadiscretesetofelectronicinformationresources
organizedforthecollection,processing,maintenance,use,sharing,disseminationor
dispositionofelectronicinformation,aswellasanyspecializedsystemsuchas
industrial/processcontrolssystems,telephoneswitchingandprivatebranch
exchangesystems,andenvironmentalcontrolsystems.
The Main Requirement – 500.02 (cont.)
•  NonpublicInformationshallmeanallelectronicinformationthatisnotPublicly
AvailableInformationandis:
•  BusinessrelatedinformationofaCoveredEntitythetamperingwithwhich,orunauthorizeddisclosure,
accessoruseofwhich,wouldcauseamaterialadverseimpacttothebusiness,operationsorsecurityof
theCoveredEntity
•  anyinformationconcerninganindividualwhichbecauseofname,number,personalmark,orother
identifiercanbeusedtoidentifysuchindividual,incombinationwithanyoneormoreofthefollowingdata
elements:(i)socialsecuritynumber,(ii)drivers’licensenumberornon-driveridentificationcardnumber,(iii)
accountnumber,creditordebitcardnumber,(iv)anysecuritycode,accesscodeorpasswordthatwould
permitaccesstoanindividual’sfinancialaccount,or(v)biometricrecords
•  anyinformationordata,exceptageorgender,inanyformormediumcreatedbyorderivedfromahealth
careprovideroranindividualandthatrelatesto(i)thepast,presentorfuturephysical,mentalorbehavioral
healthorconditionofanyindividualoramemberoftheindividual'sfamily,(ii)theprovisionofhealthcareto
anyindividual,or(iii)paymentfortheprovisionofhealthcaretoanyindividual
The Main Requirement – 500.02 (cont.)
Information Governance Implications
•  What systems are considered
“Information Systems” that must be
protected under 500.02?
•  What is “Nonpublic Information” that
is not Personal Data/Personally
Identifiable Information?
•  The Regulation required new types
of system and data classification.
•  It is critical to know what systems
house, process and access
Nonpublic Information.
•  Written Data Governance Policies
and Procedures are required to be
part of the Cybersecurity Policy,
which must be approved by Senior
Officer(s). 500.03(b)
•  The Risk Assessment, which is the
basis of the Cybersecurity Program
and the related Policies and
Procedures, requires written criteria
for assessment of the Program
including adequacy of controls.
500.09
•  There are requirements to dispose
of Nonpublic Information. 500.13
•  Systems must be maintained that
“are designed to reconstruct
material financial transactions
sufficient to support normal
operations and obligations….”
500.06
•  The Regulation requires a Covered Entity to submit to DFS a
written Certification of Compliance by February 15, 2018
•  The written statement would require the signature of the
Chairperson of the Board of Directors of the entity or named
Senior Officer(s) (i.e. CEO or committee) certifying that such
person has reviewed documents, reports, certifications and
opinions of such officers, employees, representatives and
outside vendors
•  Similar to a Sarbanes-Oxley 404 certification
Annual Compliance Certification
EU Global Data Protection Regulation (GDPR)
•  The EU General Data Protection
Regulation (GDPR) replaces the Data
Protection Directive and was designed
to harmonize data privacy laws across
Europe, to protect and empower all EU
citizens data privacy and to reshape
the way organizations across the
region approach data privacy.
•  The GDPR not only applies to
organizations located within the EU but
it will also apply to organizations
located outside of the EU if they offer
goods or services to, or monitor the
behavior of, EU data subjects. It
applies to all companies processing
and holding the personal data of data
subjects residing in the European
Union, regardless of the company’s
location.
•  Organizations can be fined up to 4% of
annual global turnover for breaching
GDPR or €20 Million. This is the
maximum fine that can be imposed for
the most serious infringements e.g. not
having sufficient customer consent to
process data or violating the core of
Privacy by Design concepts. There is a
tiered approach to fines e.g. a
company can be fined 2% for not
having their records in order (article
28), not notifying the supervising
authority and data subject about a
breach or not conducting impact
assessment. It is important to note that
these rules apply to both controllers
and processors -- meaning 'clouds' will
not be exempt from GDPR
enforcement.
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cybersecurity & Privacy Regulations Now Require Information Governance

Weitere ähnliche Inhalte

Was ist angesagt?

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?Patrick Soenen
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Mark Honeyball
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.James Seville
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?Frederick Penaud
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution Google
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsJon Bosco
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for developmentTomppa Järvinen
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationIBM Security
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessOlivier BARROT
 
GDPR Webinar - feb
GDPR Webinar - febGDPR Webinar - feb
GDPR Webinar - febSophos Benelux
 
COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?TrustArc
 

Was ist angesagt? (20)

Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity Regulations
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
GDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your businessGDPR what you should know and how to minimize impact on your business
GDPR what you should know and how to minimize impact on your business
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
GDPR Webinar - feb
GDPR Webinar - febGDPR Webinar - feb
GDPR Webinar - feb
 
COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?COVID-19: What are the Potential Impacts on Data Privacy?
COVID-19: What are the Potential Impacts on Data Privacy?
 

Ă„hnlich wie Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cybersecurity & Privacy Regulations Now Require Information Governance

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesKrist Davood - Principal - CIO
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawSynopsys Software Integrity Group
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsAdrian Dumitrescu
 
New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management Black Duck by Synopsys
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M RizviGeneral Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M RizviSharique Rizvi
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...PECB
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...Vsevolod Shabad
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 

Ă„hnlich wie Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cybersecurity & Privacy Regulations Now Require Information Governance (20)

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M RizviGeneral Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 

Mehr von ARMA International

Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)ARMA International
 
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other DocumentsARMA International
 
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA International
 
Jocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherJocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherARMA International
 
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...ARMA International
 
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...ARMA International
 
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...ARMA International
 
Brent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackBrent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackARMA International
 
Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)ARMA International
 
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryKathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryARMA International
 
Steve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsSteve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsARMA International
 
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...ARMA International
 
Jim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceJim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceARMA International
 
Gene Stakhov - Taxonology
Gene Stakhov - TaxonologyGene Stakhov - Taxonology
Gene Stakhov - TaxonologyARMA International
 
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...ARMA International
 
Dr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesDr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesARMA International
 
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseMichael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseARMA International
 
Kevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyKevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyARMA International
 
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceAli Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceARMA International
 
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RINick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RIARMA International
 

Mehr von ARMA International (20)

Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)
 
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
 
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
 
Jocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherJocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines Together
 
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
 
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
 
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
 
Brent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackBrent Gatewood - Technologies Attack
Brent Gatewood - Technologies Attack
 
Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)
 
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryKathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
 
Steve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsSteve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information Investments
 
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
 
Jim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceJim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information Governance
 
Gene Stakhov - Taxonology
Gene Stakhov - TaxonologyGene Stakhov - Taxonology
Gene Stakhov - Taxonology
 
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
 
Dr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesDr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be Machines
 
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseMichael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
 
Kevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyKevin Parker - The Leadership Journey
Kevin Parker - The Leadership Journey
 
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceAli Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
 
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RINick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
 

KĂĽrzlich hochgeladen

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...amitlee9823
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangaloreamitlee9823
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 

KĂĽrzlich hochgeladen (20)

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 

Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cybersecurity & Privacy Regulations Now Require Information Governance

  • 1.
  • 3.
  • 4. •  Cyber crime costs $400 billion annually – Lloyd’s •  Global cyber insurance uptake growing 21% annually •  $2.5 billion in written cyber premiums in 2016 •  Rating agencies now addressing cyber-maturity in credit ratings •  Cybersecurity is dominant risk for CEOs •  70% view it a major threat •  $3 trillion market value destroyed in 2015 •  “Top 5” risk likelihood – 2017 World Economic Forum •  Most companies remain unprepared: •  Only 58% of companies have resources to comply with security regulations •  1.5 million InfoSec job shortage by 2019 •  Only 21% of companies at “mature” stage •  Only 1/3 of corporations have a data breach response plan The Cybersecurity Backdrop
  • 5. New York 23 NYCRR 500 - The Significance •  Billed as a “first-in-the-nation” regulation concerning cybersecurity •  Arguably the most stringent broadly applicable cyber regulation in existence •  Goes beyond other data privacy and cybersecurity regulations, including the Graham Leach Bliley Act •  Covers information and systems that do not include, store, process or maintain PII •  Requires new compliance processes and is built around the Risk Assessment •  Likely modification and expansion of existing protocols to meet regulatory requirements •  C-Suite must personally certify compliance with the Regulation on an annual basis
  • 6. •  Each Covered Entity shall maintain a cybersecurity program designed to protect the confidentiality, integrity and availability of the Covered Entity’s Information Systems. •  The cybersecurity program shall be based on the Covered Entity’s Risk Assessment and designed to perform the following core cybersecurity functions: •  identifyandassessinternalandexternalcybersecurityrisksthatmaythreatenthesecurityor integrityofNonpublicInformationstoredontheCoveredEntity’sInformationSystems •  usedefensiveinfrastructureandtheimplementationofpoliciesandprocedurestoprotectthe CoveredEntity’sInformationSystems,andtheNonpublicInformationstoredonthose InformationSystems,fromunauthorizedaccess,useorothermaliciousacts •  detectCybersecurityEvents •  respondtoidentifiedordetectedCybersecurityEventstomitigateanynegativeeffects •  recoverfromCybersecurityEventsandrestorenormaloperationsandservices •  fulfillapplicableregulatoryreportingobligations The Main Requirement – 500.02
  • 8. •  NonpublicInformationshallmeanallelectronicinformationthatisnotPublicly AvailableInformationandis: •  BusinessrelatedinformationofaCoveredEntitythetamperingwithwhich,orunauthorizeddisclosure, accessoruseofwhich,wouldcauseamaterialadverseimpacttothebusiness,operationsorsecurityof theCoveredEntity •  anyinformationconcerninganindividualwhichbecauseofname,number,personalmark,orother identifiercanbeusedtoidentifysuchindividual,incombinationwithanyoneormoreofthefollowingdata elements:(i)socialsecuritynumber,(ii)drivers’licensenumberornon-driveridentificationcardnumber,(iii) accountnumber,creditordebitcardnumber,(iv)anysecuritycode,accesscodeorpasswordthatwould permitaccesstoanindividual’sfinancialaccount,or(v)biometricrecords •  anyinformationordata,exceptageorgender,inanyformormediumcreatedbyorderivedfromahealth careprovideroranindividualandthatrelatesto(i)thepast,presentorfuturephysical,mentalorbehavioral healthorconditionofanyindividualoramemberoftheindividual'sfamily,(ii)theprovisionofhealthcareto anyindividual,or(iii)paymentfortheprovisionofhealthcaretoanyindividual The Main Requirement – 500.02 (cont.)
  • 9. Information Governance Implications •  What systems are considered “Information Systems” that must be protected under 500.02? •  What is “Nonpublic Information” that is not Personal Data/Personally Identifiable Information? •  The Regulation required new types of system and data classification. •  It is critical to know what systems house, process and access Nonpublic Information. •  Written Data Governance Policies and Procedures are required to be part of the Cybersecurity Policy, which must be approved by Senior Officer(s). 500.03(b) •  The Risk Assessment, which is the basis of the Cybersecurity Program and the related Policies and Procedures, requires written criteria for assessment of the Program including adequacy of controls. 500.09 •  There are requirements to dispose of Nonpublic Information. 500.13 •  Systems must be maintained that “are designed to reconstruct material financial transactions sufficient to support normal operations and obligations….” 500.06
  • 10. •  The Regulation requires a Covered Entity to submit to DFS a written Certification of Compliance by February 15, 2018 •  The written statement would require the signature of the Chairperson of the Board of Directors of the entity or named Senior Officer(s) (i.e. CEO or committee) certifying that such person has reviewed documents, reports, certifications and opinions of such officers, employees, representatives and outside vendors •  Similar to a Sarbanes-Oxley 404 certification Annual Compliance Certification
  • 11.
  • 12. EU Global Data Protection Regulation (GDPR) •  The EU General Data Protection Regulation (GDPR) replaces the Data Protection Directive and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy. •  The GDPR not only applies to organizations located within the EU but it will also apply to organizations located outside of the EU if they offer goods or services to, or monitor the behavior of, EU data subjects. It applies to all companies processing and holding the personal data of data subjects residing in the European Union, regardless of the company’s location. •  Organizations can be fined up to 4% of annual global turnover for breaching GDPR or €20 Million. This is the maximum fine that can be imposed for the most serious infringements e.g. not having sufficient customer consent to process data or violating the core of Privacy by Design concepts. There is a tiered approach to fines e.g. a company can be fined 2% for not having their records in order (article 28), not notifying the supervising authority and data subject about a breach or not conducting impact assessment. It is important to note that these rules apply to both controllers and processors -- meaning 'clouds' will not be exempt from GDPR enforcement.