SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
Gramm-Leach-Bliley
Act Safeguard Rule
Learn more about complete, secure
compliance from EAI.
1
David Hoelzer, “Understanding Security Regulations in the Financial Services Industry, “SANS Institute InfoSec
Reading Room, June 2016
2
Ibid.
3
Ibid.
4
FINRA
5
FDIC Financial Institution Letter, “Computer Software Due Diligence Guidance on Developing an Effective
Computer Software Evaluation Program to Assure Quality and Regulatory
6
US Securities and Exchange Commission, IM Guidance Update No. 2015-02, April 2015
©2017 EAI Information Systems. All rights reserved.
Financial institutions must explain
information-sharing practices with customers
and safeguard sensitive data1
“This year, expect regulators
to hold financial-services
companies accountable for
their cybersecurity failings.”
— CFO Magazine, February 24, 2016
“Management is
responsible for ensuring
that software complies
with all applicable laws.”5
— FDIC
Conduct a periodic assessment of:
The nature, sensitivity
and location of
information that the firm
collects, processes and/or
stores, and the technology
systems it uses
The effectiveness of the
governance structure
for the management of
cybersecurity risk6
Internal and external
cybersecurity threats to
and vulnerabilities of the
firm’s information and
technology systems
The impact should the
information or
technology systems
become compromised
Security controls and
processes currently in place
Assure a fully compliant and
secure SSAE 16 audit system
Integrate commission,
compliance, and data
aggregation tools to
minimize risk
Gain peace of mind with data
management solutions that
follow the Enterprise Data
Management (EDM) Council’s
Data Management Capability
Assessment Model (DCAM)™
Per the FDIC: Some financial
software does not comply
with applicable laws and
regulations—and that could
cause significant issues
Are you sure that your software’s up to
an audit?
“Cybersecurity practices are a key focus
for FINRA.”4
Email marketing@eaiinfosys.com
Dodd-Frank Requires that you be ready to prove your
security controls and document them2
Sarbanes-Oxley
Sections 302 and 404 indirectly charge
information systems to support accounting
and oversight for the accuracy of reporting3
Don’t let
trip you up in an audit
CYBERSECURITY
Integrate cybersecurity and compliance
with EAI:
Organizations forget that current financial
regulations include cybersecurity requirements
Measures you can take to ensure
cybersecurity compliance
Per regulations:

Mais conteúdo relacionado

Mais procurados

Mais procurados (19)

Check the Upward Trend in Compliance Costs
Check the Upward Trend in Compliance CostsCheck the Upward Trend in Compliance Costs
Check the Upward Trend in Compliance Costs
 
SECURITY
SECURITYSECURITY
SECURITY
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
DOL Fiduciary Rule Infographic
DOL Fiduciary Rule InfographicDOL Fiduciary Rule Infographic
DOL Fiduciary Rule Infographic
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
 
HIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesHIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business Associates
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
 
Key Points of FISMA Reforms of 2013
Key Points of FISMA Reforms of 2013Key Points of FISMA Reforms of 2013
Key Points of FISMA Reforms of 2013
 
Penetration testing 5 reasons Why Organizations Should Adopt it
Penetration testing   5 reasons Why Organizations Should Adopt itPenetration testing   5 reasons Why Organizations Should Adopt it
Penetration testing 5 reasons Why Organizations Should Adopt it
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection
 
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and Buts
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems
 
Privacy and Money Laundering Prof. Hernan Huwyler CPA MBA
Privacy and Money Laundering Prof. Hernan Huwyler CPA MBA Privacy and Money Laundering Prof. Hernan Huwyler CPA MBA
Privacy and Money Laundering Prof. Hernan Huwyler CPA MBA
 
State of Security
State of SecurityState of Security
State of Security
 

Semelhante a EAI Cybersecurity Infographic

Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
adampcarr67227
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
EstelaJeffery653
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
Steve Knapp
 
crucet1crucet2crucet
crucet1crucet2crucetcrucet1crucet2crucet
crucet1crucet2crucet
MargenePurnell14
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
ebonyman0007
 
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
IJNSA Journal
 

Semelhante a EAI Cybersecurity Infographic (20)

Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Equifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningEquifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability Scanning
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
365 infographic-compliance
365 infographic-compliance365 infographic-compliance
365 infographic-compliance
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
crucet1crucet2crucet
crucet1crucet2crucetcrucet1crucet2crucet
crucet1crucet2crucet
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure Sector
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
Rapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance GuideRapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance Guide
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
 
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 

Mais de Ideba

Mais de Ideba (20)

Kaufman Hall Healthcare Infographic
Kaufman Hall Healthcare InfographicKaufman Hall Healthcare Infographic
Kaufman Hall Healthcare Infographic
 
Kaufman Hall Finance Infographic
Kaufman Hall Finance InfographicKaufman Hall Finance Infographic
Kaufman Hall Finance Infographic
 
Kaufman Hall Education Infographic
Kaufman Hall Education InfographicKaufman Hall Education Infographic
Kaufman Hall Education Infographic
 
Kaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case StudyKaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case Study
 
Microsoft Teams Infographic
Microsoft Teams Infographic Microsoft Teams Infographic
Microsoft Teams Infographic
 
C4 Database Management Onboarding
C4 Database Management OnboardingC4 Database Management Onboarding
C4 Database Management Onboarding
 
C4 Database Management Website
C4 Database Management WebsiteC4 Database Management Website
C4 Database Management Website
 
FINEOS Booth
FINEOS BoothFINEOS Booth
FINEOS Booth
 
FINEOS Website
FINEOS WebsiteFINEOS Website
FINEOS Website
 
Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)
 
Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)
 
Greenway Health Amicus Case Study
Greenway Health Amicus Case StudyGreenway Health Amicus Case Study
Greenway Health Amicus Case Study
 
Greenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case StudyGreenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case Study
 
Cortez Health Case Study
Cortez Health Case StudyCortez Health Case Study
Cortez Health Case Study
 
Greenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case StudyGreenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case Study
 
Greenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction InfographicGreenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction Infographic
 
Greenway Health Cow Creek Case Study
Greenway Health Cow Creek Case StudyGreenway Health Cow Creek Case Study
Greenway Health Cow Creek Case Study
 
Greenway Health Case Study Infographic
Greenway Health Case Study InfographicGreenway Health Case Study Infographic
Greenway Health Case Study Infographic
 
Ideba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo OptionsIdeba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo Options
 
Ideba Creative Portfolio
Ideba Creative PortfolioIdeba Creative Portfolio
Ideba Creative Portfolio
 

Último

Brand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdfBrand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdf
tbatkhuu1
 
The 100x Factor Growth with AI - Susan Diaz
The 100x Factor  Growth with AI - Susan DiazThe 100x Factor  Growth with AI - Susan Diaz
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 

Último (20)

Enjoy Night⚡Call Girls Dlf City Phase 4 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 4 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 4 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 4 Gurgaon >༒8448380779 Escort Service
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptx
 
Major SEO Trends in 2024 - Banyanbrain Digital
Major SEO Trends in 2024 - Banyanbrain DigitalMajor SEO Trends in 2024 - Banyanbrain Digital
Major SEO Trends in 2024 - Banyanbrain Digital
 
The Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison KaltmanThe Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison Kaltman
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentation
 
Brand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdfBrand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdf
 
Social media, ppt. Features, characteristics
Social media, ppt. Features, characteristicsSocial media, ppt. Features, characteristics
Social media, ppt. Features, characteristics
 
The 100x Factor Growth with AI - Susan Diaz
The 100x Factor  Growth with AI - Susan DiazThe 100x Factor  Growth with AI - Susan Diaz
The 100x Factor Growth with AI - Susan Diaz
 
No Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found OnlineNo Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found Online
 
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesGoogle 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
 
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting GroupSEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
 
Cash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girl
 
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
 
Foundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David PisarekFoundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David Pisarek
 
What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?
 
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
 
Generative AI Content Creation - Andrew Jenkins
Generative AI Content Creation - Andrew JenkinsGenerative AI Content Creation - Andrew Jenkins
Generative AI Content Creation - Andrew Jenkins
 
Digital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew RupertDigital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew Rupert
 
Unraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptxUnraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptx
 

EAI Cybersecurity Infographic

  • 1. Gramm-Leach-Bliley Act Safeguard Rule Learn more about complete, secure compliance from EAI. 1 David Hoelzer, “Understanding Security Regulations in the Financial Services Industry, “SANS Institute InfoSec Reading Room, June 2016 2 Ibid. 3 Ibid. 4 FINRA 5 FDIC Financial Institution Letter, “Computer Software Due Diligence Guidance on Developing an Effective Computer Software Evaluation Program to Assure Quality and Regulatory 6 US Securities and Exchange Commission, IM Guidance Update No. 2015-02, April 2015 ©2017 EAI Information Systems. All rights reserved. Financial institutions must explain information-sharing practices with customers and safeguard sensitive data1 “This year, expect regulators to hold financial-services companies accountable for their cybersecurity failings.” — CFO Magazine, February 24, 2016 “Management is responsible for ensuring that software complies with all applicable laws.”5 — FDIC Conduct a periodic assessment of: The nature, sensitivity and location of information that the firm collects, processes and/or stores, and the technology systems it uses The effectiveness of the governance structure for the management of cybersecurity risk6 Internal and external cybersecurity threats to and vulnerabilities of the firm’s information and technology systems The impact should the information or technology systems become compromised Security controls and processes currently in place Assure a fully compliant and secure SSAE 16 audit system Integrate commission, compliance, and data aggregation tools to minimize risk Gain peace of mind with data management solutions that follow the Enterprise Data Management (EDM) Council’s Data Management Capability Assessment Model (DCAM)™ Per the FDIC: Some financial software does not comply with applicable laws and regulations—and that could cause significant issues Are you sure that your software’s up to an audit? “Cybersecurity practices are a key focus for FINRA.”4 Email marketing@eaiinfosys.com Dodd-Frank Requires that you be ready to prove your security controls and document them2 Sarbanes-Oxley Sections 302 and 404 indirectly charge information systems to support accounting and oversight for the accuracy of reporting3 Don’t let trip you up in an audit CYBERSECURITY Integrate cybersecurity and compliance with EAI: Organizations forget that current financial regulations include cybersecurity requirements Measures you can take to ensure cybersecurity compliance Per regulations: