SlideShare a Scribd company logo
1 of 47
Download to read offline
 How To Survive In A Risky CyberWorld
 2016 IFG Wealth Management Forum
 Scottsdale, AZ
 April 2016
 Mitch Tanenbaum
 www. CyberCecurity . com
 Mitch @ CyberCecurity.com
 720-891-1663
GEEK ALERT!
Ransomware
What can you do?
1. Backups, backups and more backups
2. Business continuity plan
3. Disaster recovery plan
4. Incident response plan
• Rowlett incident
Test repeatedly!
Law Firms
 (and financial advisors)
1500 x the size of the WikiLeaks State Department cable leak
And Financial Advisors
Ask your law firms and advisors for a copy
of their written cyber security plan
As a law firm or advisor have a written plan
Same goes for family offices – have a plan,
ask for a plan
NASDAQ Study
1500+ CxOs and Directors
 90% of respondents have a medium to high
cybersecurity vulnerability
 91% of NEDs cannot read a cybersecurity
report, preventing them from asking the
intelligent questions (executive coaching)
 40% don’t feel responsible for the
repercussions of a cyber attack.
Spear Phishing
Targeted Emails–often to execs and finance
Drop malware
Asks employees to wire money
Conduct phishing tests
• At one client, they sent 350 emails
 139 were opened, 35 clicked on the malware
 Including one C-Suite member
What Does The FBI Think?
 “I am convinced that there are only two types
of companies: those that have been hacked
and those that will be. And even they are
converging into one category: companies that
have been hacked and will be hacked again “
 - Robert S Mueller III,
 Director, Federal Bureau of Investigation
 RSA Cyber Security Conference,
 San Francisco, CA. , March 1, 2012
NewYork DFS Proposed Regulations
(Post Ben Lawsky)
 Shared proposal with every state, federal and
local regulator in the country
 1. 12 written cyber security policies and
procedures
 2.Third party service provider management
 3. Multi factor authentication
 4. Chief Information Security Officer
 http://mtanenbaum.us/ny-regulator-unveils-proposed-new-cyber-security-regulations/
 http://www.dfs.ny.gov/about/letters/pr151109_letter_cyber_security.pdf
5. Application security
6. Cyber security personnel and
intelligence
7. Annual cyber security audits
8. Notice Of cyber security incidents
 http://mtanenbaum.us/ny-regulator-unveils-proposed-new-cyber-security-regulations/
http://www.dfs.ny.gov/about/letters/pr151109_letter_cyber_security.pdf
If you are required to comply, it will require
outside expertise
 http://mtanenbaum.us/ny-regulator-unveils-proposed-new-cyber-security-regulations/
http://www.dfs.ny.gov/about/letters/pr151109_letter_cyber_security.pdf
SEC Risk Alert To Investment Advisors
and Broker Dealers
 Issued Last September
 1. Governance – manage the cyber risk process
 2. Access rights – who can see what
 3. Data Loss Prevention – PII in emails
 4.Vendor Management – who do you share data with?
 5.Training
 6. Incident response plan
 Cyber security exam initiative to improve compliance
 http://mtanenbaum.us/sec-issues-risk-alert-to-advisors-and-brokers/
What To Do
California – Bellwether for the rest of the
country
CA AG Kamala Harris released a breach
report in February
As part of that, she defined
REASONABLE SECURITY PROCEDURES as
referred to in CA AB 1950
Implement all CIS 20 controls which are
appropriate
Implement multi factor authentication for
consumer facing web sites containing
sensitive personal information
Consistently use strong encryption on
portable devices and maybe desktops
AG Harris Says:
The failure to implement all the controls
that apply to an organization’s environment
constitutes a lack of reasonable security.
What Is The CIS 20
Center For Internet Security:

1. Inventory devices
2. Inventory software
3. Secure configurations for user devices
4. Continuous vulnerability assessment
5. Control admin privileges
6. Manage audit logs
What Is The CIS 20
7. Email and web protection
8. Malware defenses
9. Control of ports, protocols and services
10. Data recovery capability
11. Secure configuration For network devices
12. Boundary defense
13. Data protection
What Is The CIS 20
14. Control access based on need to know
15.Wireless control
16. Account monitoring
17. Security skills assessment and training
18. Application software security
19. Incident response and management
20. Penetration testing and red team exercises
What Does The CFPB Say?
CFPB entered consent decree with fintech
firm Dwolla in February
Specifies what CFPB expects Dwolla to do
$100k fine, 5 years of monitoring
NO BREACH INVOLVED!
1. Establish, implement and maintain a
comprehensive data security plan
2. Adopt and implement reasonable and appropriate
data security policies and procedures
3. Designate a qualified person to be accountable for
the data security program
4. Conduct data security risk assessments twice a
year
5. Evaluate and adjust the data security program in
light of the results
6. Conduct regular, mandatory employee security
training
7. Develop, update and implement security patches
8. Develop, implement and maintain an appropriate
method of customer identity authentication at
registration time.
9. Develop, implement and maintain reasonable
procedure for third party risk (service providers).
10. Obtain an annual data security audit from an
independent, qualified, third party, using generally
accepted professional procedures and standards
The Board must review all submissions
The Board is ultimately responsible for
ensuring compliance with the consent
order
Mobile
More and more sensitive data on mobile
Encrypt devices
Restrict what applications are installed
Use encrypted text (WhatsApp, Signal)
Use encrypted email (Absio)
• Both directions
• With clients and internally
Mobile Device Management (MDM)
software
Use current OS version
• Android Ver 6 – Marshmallow
• iPhone iOS 9
PATCH
Cyber Insurance
 It is not a silver bullet
We are seeing insurance carriers claiming
the insured “failed to follow minimum
required practices”
You need to verify that coverages and
practices are aligned
Education
 To get our free weekly cyber security
email newsletter, please send an email to
Mitch @ CyberCecurity.com and we will
add you to the list.

More Related Content

What's hot

The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boardsPaul McGillicuddy
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uaeRishalHalid1
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...Citrin Cooperman
 
Why Startups Need to Strengthen Application Security
Why Startups Need to Strengthen Application SecurityWhy Startups Need to Strengthen Application Security
Why Startups Need to Strengthen Application SecurityIndusfacePvtLtd
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Lancope, Inc.
 
Eliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceInternetwork Engineering (IE)
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Citrin Cooperman
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceValery Yelanin
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
Cyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCheffley White
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Asia Pte Ltd
 

What's hot (20)

SME Cyber Insurance
SME Cyber Insurance SME Cyber Insurance
SME Cyber Insurance
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uae
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
 
Why Startups Need to Strengthen Application Security
Why Startups Need to Strengthen Application SecurityWhy Startups Need to Strengthen Application Security
Why Startups Need to Strengthen Application Security
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
 
Eliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber Insurance
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Cyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate Boards
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service
 

Viewers also liked

Mujeres maltratadas hecho por henar palacios 1º c
Mujeres maltratadas hecho por henar palacios 1º cMujeres maltratadas hecho por henar palacios 1º c
Mujeres maltratadas hecho por henar palacios 1º chenarpalacios
 
Unlock dependency between client teams and API team with API mock and proxy
Unlock dependency between client teams and API team with API mock and proxyUnlock dependency between client teams and API team with API mock and proxy
Unlock dependency between client teams and API team with API mock and proxyBruce Li
 
Multipanel
MultipanelMultipanel
MultipanelPlantaHD
 
Presentation hallie
Presentation halliePresentation hallie
Presentation halliehalliehay05
 
Mosh pit music presentation
Mosh pit music presentationMosh pit music presentation
Mosh pit music presentationbillyboiv1
 
Intermedia Torino Italy Presentation
Intermedia Torino Italy PresentationIntermedia Torino Italy Presentation
Intermedia Torino Italy Presentationguest5bbff0
 
ПРОПОЛИС: СОСТАВ, СВОЙСТВА, ДЕЙСТВИЕ
ПРОПОЛИС: СОСТАВ, СВОЙСТВА, ДЕЙСТВИЕПРОПОЛИС: СОСТАВ, СВОЙСТВА, ДЕЙСТВИЕ
ПРОПОЛИС: СОСТАВ, СВОЙСТВА, ДЕЙСТВИЕgillesruolia
 

Viewers also liked (16)

Mujeres maltratadas hecho por henar palacios 1º c
Mujeres maltratadas hecho por henar palacios 1º cMujeres maltratadas hecho por henar palacios 1º c
Mujeres maltratadas hecho por henar palacios 1º c
 
Drag racing
Drag racingDrag racing
Drag racing
 
Grigliata
GrigliataGrigliata
Grigliata
 
Cisco Letter
Cisco LetterCisco Letter
Cisco Letter
 
Up carpark
Up carparkUp carpark
Up carpark
 
vishal DTS &OPTIMIZATION
vishal DTS &OPTIMIZATIONvishal DTS &OPTIMIZATION
vishal DTS &OPTIMIZATION
 
Unlock dependency between client teams and API team with API mock and proxy
Unlock dependency between client teams and API team with API mock and proxyUnlock dependency between client teams and API team with API mock and proxy
Unlock dependency between client teams and API team with API mock and proxy
 
ใบงานที่ 7
ใบงานที่ 7 ใบงานที่ 7
ใบงานที่ 7
 
Multipanel
MultipanelMultipanel
Multipanel
 
Video ingles
Video inglesVideo ingles
Video ingles
 
Presentation hallie
Presentation halliePresentation hallie
Presentation hallie
 
Mosh pit music presentation
Mosh pit music presentationMosh pit music presentation
Mosh pit music presentation
 
Intermedia Torino Italy Presentation
Intermedia Torino Italy PresentationIntermedia Torino Italy Presentation
Intermedia Torino Italy Presentation
 
Motor 4 temps otto
Motor 4 temps ottoMotor 4 temps otto
Motor 4 temps otto
 
ПРОПОЛИС: СОСТАВ, СВОЙСТВА, ДЕЙСТВИЕ
ПРОПОЛИС: СОСТАВ, СВОЙСТВА, ДЕЙСТВИЕПРОПОЛИС: СОСТАВ, СВОЙСТВА, ДЕЙСТВИЕ
ПРОПОЛИС: СОСТАВ, СВОЙСТВА, ДЕЙСТВИЕ
 
Como se hace un trabajo academico
Como se hace un trabajo academicoComo se hace un trabajo academico
Como se hace un trabajo academico
 

Similar to PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Tanenbaum, INFORMATION RISK STRATEGY CONSULTING

Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016John T. Araneo
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Rochester Security Summit
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfHumphrey Humphrey
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitThe Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitShawn Tuma
 
RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™CPaschal
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...Shawn Tuma
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Citrin Cooperman
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...TraintechTde
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsSkoda Minotti
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsKen M. Shaurette
 

Similar to PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Tanenbaum, INFORMATION RISK STRATEGY CONSULTING (20)

Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitThe Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
 
RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
IASA ey deck presentation
IASA ey deck presentationIASA ey deck presentation
IASA ey deck presentation
 
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
 
Data breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundationData breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundation
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 

More from IFG Network marcus evans

ASSET ALLOCATION AND DIVERSIFICATION STRATEGIES:KEY FACTORS TO CONSIDER - Ste...
ASSET ALLOCATION AND DIVERSIFICATION STRATEGIES:KEY FACTORS TO CONSIDER - Ste...ASSET ALLOCATION AND DIVERSIFICATION STRATEGIES:KEY FACTORS TO CONSIDER - Ste...
ASSET ALLOCATION AND DIVERSIFICATION STRATEGIES:KEY FACTORS TO CONSIDER - Ste...IFG Network marcus evans
 
DELVING FURTHER INTO ALTERNATIVE INVESTMENT OPTIONS: HOW CAN ADVISORS EFFECTI...
DELVING FURTHER INTO ALTERNATIVE INVESTMENT OPTIONS: HOW CAN ADVISORS EFFECTI...DELVING FURTHER INTO ALTERNATIVE INVESTMENT OPTIONS: HOW CAN ADVISORS EFFECTI...
DELVING FURTHER INTO ALTERNATIVE INVESTMENT OPTIONS: HOW CAN ADVISORS EFFECTI...IFG Network marcus evans
 
HOW TO SURVIVE A ZOMBIE ATTACK: PRACTICAL ASSET PROTECTION STRATEGIES - John ...
HOW TO SURVIVE A ZOMBIE ATTACK: PRACTICAL ASSET PROTECTION STRATEGIES - John ...HOW TO SURVIVE A ZOMBIE ATTACK: PRACTICAL ASSET PROTECTION STRATEGIES - John ...
HOW TO SURVIVE A ZOMBIE ATTACK: PRACTICAL ASSET PROTECTION STRATEGIES - John ...IFG Network marcus evans
 
GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...
GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...
GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...IFG Network marcus evans
 
DELIVERING A TRULY DIFFERENT EXPERIENCE TO UHNW FAMILIES: THE FAMILY OFFICE E...
DELIVERING A TRULY DIFFERENT EXPERIENCE TO UHNW FAMILIES: THE FAMILY OFFICE E...DELIVERING A TRULY DIFFERENT EXPERIENCE TO UHNW FAMILIES: THE FAMILY OFFICE E...
DELIVERING A TRULY DIFFERENT EXPERIENCE TO UHNW FAMILIES: THE FAMILY OFFICE E...IFG Network marcus evans
 
CUT THROUGH THE CLUTTER: UNDERSTANDING THE FAMILY OFFICE LANDSCAPE - Michael ...
CUT THROUGH THE CLUTTER: UNDERSTANDING THE FAMILY OFFICE LANDSCAPE - Michael ...CUT THROUGH THE CLUTTER: UNDERSTANDING THE FAMILY OFFICE LANDSCAPE - Michael ...
CUT THROUGH THE CLUTTER: UNDERSTANDING THE FAMILY OFFICE LANDSCAPE - Michael ...IFG Network marcus evans
 
FAMILY OFFICE MOTIVES IN REAL ESTATE INVESTING - Jeff Hall & Corbin Rich, MAN...
FAMILY OFFICE MOTIVES IN REAL ESTATE INVESTING - Jeff Hall & Corbin Rich, MAN...FAMILY OFFICE MOTIVES IN REAL ESTATE INVESTING - Jeff Hall & Corbin Rich, MAN...
FAMILY OFFICE MOTIVES IN REAL ESTATE INVESTING - Jeff Hall & Corbin Rich, MAN...IFG Network marcus evans
 
THE WIGMORE ASSOCIATION – A NEW AGE OF GLOBAL INTERDEPENDENCE-Harold Pitcairn...
THE WIGMORE ASSOCIATION – A NEW AGE OF GLOBAL INTERDEPENDENCE-Harold Pitcairn...THE WIGMORE ASSOCIATION – A NEW AGE OF GLOBAL INTERDEPENDENCE-Harold Pitcairn...
THE WIGMORE ASSOCIATION – A NEW AGE OF GLOBAL INTERDEPENDENCE-Harold Pitcairn...IFG Network marcus evans
 
How Wealthy Families Should Invest in Real Estate - Ted Cronin, Manchester Ca...
How Wealthy Families Should Invest in Real Estate - Ted Cronin, Manchester Ca...How Wealthy Families Should Invest in Real Estate - Ted Cronin, Manchester Ca...
How Wealthy Families Should Invest in Real Estate - Ted Cronin, Manchester Ca...IFG Network marcus evans
 
Engaging the Next Generation of Family Wealth Advisor - Howard M. Weiss
Engaging the Next Generation of Family Wealth Advisor - Howard M. WeissEngaging the Next Generation of Family Wealth Advisor - Howard M. Weiss
Engaging the Next Generation of Family Wealth Advisor - Howard M. WeissIFG Network marcus evans
 
POSITIONING YOUR OFFICE FOR GROWTH THROUGH REPUTATION - Robert C. Elliott, Se...
POSITIONING YOUR OFFICE FOR GROWTH THROUGH REPUTATION - Robert C. Elliott, Se...POSITIONING YOUR OFFICE FOR GROWTH THROUGH REPUTATION - Robert C. Elliott, Se...
POSITIONING YOUR OFFICE FOR GROWTH THROUGH REPUTATION - Robert C. Elliott, Se...IFG Network marcus evans
 
Redefining family office investment practices through International Forum Group
Redefining family office investment practices through International Forum GroupRedefining family office investment practices through International Forum Group
Redefining family office investment practices through International Forum GroupIFG Network marcus evans
 
BRINGING FAMILY OFFICE SERVICES TO THE MASS AFFLUENT - Will Carter, MCKINLEY ...
BRINGING FAMILY OFFICE SERVICES TO THE MASS AFFLUENT - Will Carter, MCKINLEY ...BRINGING FAMILY OFFICE SERVICES TO THE MASS AFFLUENT - Will Carter, MCKINLEY ...
BRINGING FAMILY OFFICE SERVICES TO THE MASS AFFLUENT - Will Carter, MCKINLEY ...IFG Network marcus evans
 
SUSTAINABLE INVESTING STRATEGIES: WHY INVESTOR INTEREST CONTINUES - Michael L...
SUSTAINABLE INVESTING STRATEGIES: WHY INVESTOR INTEREST CONTINUES - Michael L...SUSTAINABLE INVESTING STRATEGIES: WHY INVESTOR INTEREST CONTINUES - Michael L...
SUSTAINABLE INVESTING STRATEGIES: WHY INVESTOR INTEREST CONTINUES - Michael L...IFG Network marcus evans
 
Mirroring the Performance of Top Investment Managers - Asheesh Advani, Covestor
Mirroring the Performance of Top Investment Managers - Asheesh Advani, CovestorMirroring the Performance of Top Investment Managers - Asheesh Advani, Covestor
Mirroring the Performance of Top Investment Managers - Asheesh Advani, CovestorIFG Network marcus evans
 
Bay City Capital – How to Profit from the Life Sciences Industry
Bay City Capital – How to Profit from the Life Sciences IndustryBay City Capital – How to Profit from the Life Sciences Industry
Bay City Capital – How to Profit from the Life Sciences IndustryIFG Network marcus evans
 
Risk Management: Combining Strategic and Tactical Aprpoaches to Investment Ma...
Risk Management: Combining Strategic and Tactical Aprpoaches to Investment Ma...Risk Management: Combining Strategic and Tactical Aprpoaches to Investment Ma...
Risk Management: Combining Strategic and Tactical Aprpoaches to Investment Ma...IFG Network marcus evans
 
The Economy and Financial Markets: Crawling Out of Recession - David Wyss, Br...
The Economy and Financial Markets: Crawling Out of Recession - David Wyss, Br...The Economy and Financial Markets: Crawling Out of Recession - David Wyss, Br...
The Economy and Financial Markets: Crawling Out of Recession - David Wyss, Br...IFG Network marcus evans
 

More from IFG Network marcus evans (18)

ASSET ALLOCATION AND DIVERSIFICATION STRATEGIES:KEY FACTORS TO CONSIDER - Ste...
ASSET ALLOCATION AND DIVERSIFICATION STRATEGIES:KEY FACTORS TO CONSIDER - Ste...ASSET ALLOCATION AND DIVERSIFICATION STRATEGIES:KEY FACTORS TO CONSIDER - Ste...
ASSET ALLOCATION AND DIVERSIFICATION STRATEGIES:KEY FACTORS TO CONSIDER - Ste...
 
DELVING FURTHER INTO ALTERNATIVE INVESTMENT OPTIONS: HOW CAN ADVISORS EFFECTI...
DELVING FURTHER INTO ALTERNATIVE INVESTMENT OPTIONS: HOW CAN ADVISORS EFFECTI...DELVING FURTHER INTO ALTERNATIVE INVESTMENT OPTIONS: HOW CAN ADVISORS EFFECTI...
DELVING FURTHER INTO ALTERNATIVE INVESTMENT OPTIONS: HOW CAN ADVISORS EFFECTI...
 
HOW TO SURVIVE A ZOMBIE ATTACK: PRACTICAL ASSET PROTECTION STRATEGIES - John ...
HOW TO SURVIVE A ZOMBIE ATTACK: PRACTICAL ASSET PROTECTION STRATEGIES - John ...HOW TO SURVIVE A ZOMBIE ATTACK: PRACTICAL ASSET PROTECTION STRATEGIES - John ...
HOW TO SURVIVE A ZOMBIE ATTACK: PRACTICAL ASSET PROTECTION STRATEGIES - John ...
 
GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...
GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...
GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...
 
DELIVERING A TRULY DIFFERENT EXPERIENCE TO UHNW FAMILIES: THE FAMILY OFFICE E...
DELIVERING A TRULY DIFFERENT EXPERIENCE TO UHNW FAMILIES: THE FAMILY OFFICE E...DELIVERING A TRULY DIFFERENT EXPERIENCE TO UHNW FAMILIES: THE FAMILY OFFICE E...
DELIVERING A TRULY DIFFERENT EXPERIENCE TO UHNW FAMILIES: THE FAMILY OFFICE E...
 
CUT THROUGH THE CLUTTER: UNDERSTANDING THE FAMILY OFFICE LANDSCAPE - Michael ...
CUT THROUGH THE CLUTTER: UNDERSTANDING THE FAMILY OFFICE LANDSCAPE - Michael ...CUT THROUGH THE CLUTTER: UNDERSTANDING THE FAMILY OFFICE LANDSCAPE - Michael ...
CUT THROUGH THE CLUTTER: UNDERSTANDING THE FAMILY OFFICE LANDSCAPE - Michael ...
 
FAMILY OFFICE MOTIVES IN REAL ESTATE INVESTING - Jeff Hall & Corbin Rich, MAN...
FAMILY OFFICE MOTIVES IN REAL ESTATE INVESTING - Jeff Hall & Corbin Rich, MAN...FAMILY OFFICE MOTIVES IN REAL ESTATE INVESTING - Jeff Hall & Corbin Rich, MAN...
FAMILY OFFICE MOTIVES IN REAL ESTATE INVESTING - Jeff Hall & Corbin Rich, MAN...
 
THE WIGMORE ASSOCIATION – A NEW AGE OF GLOBAL INTERDEPENDENCE-Harold Pitcairn...
THE WIGMORE ASSOCIATION – A NEW AGE OF GLOBAL INTERDEPENDENCE-Harold Pitcairn...THE WIGMORE ASSOCIATION – A NEW AGE OF GLOBAL INTERDEPENDENCE-Harold Pitcairn...
THE WIGMORE ASSOCIATION – A NEW AGE OF GLOBAL INTERDEPENDENCE-Harold Pitcairn...
 
How Wealthy Families Should Invest in Real Estate - Ted Cronin, Manchester Ca...
How Wealthy Families Should Invest in Real Estate - Ted Cronin, Manchester Ca...How Wealthy Families Should Invest in Real Estate - Ted Cronin, Manchester Ca...
How Wealthy Families Should Invest in Real Estate - Ted Cronin, Manchester Ca...
 
Engaging the Next Generation of Family Wealth Advisor - Howard M. Weiss
Engaging the Next Generation of Family Wealth Advisor - Howard M. WeissEngaging the Next Generation of Family Wealth Advisor - Howard M. Weiss
Engaging the Next Generation of Family Wealth Advisor - Howard M. Weiss
 
POSITIONING YOUR OFFICE FOR GROWTH THROUGH REPUTATION - Robert C. Elliott, Se...
POSITIONING YOUR OFFICE FOR GROWTH THROUGH REPUTATION - Robert C. Elliott, Se...POSITIONING YOUR OFFICE FOR GROWTH THROUGH REPUTATION - Robert C. Elliott, Se...
POSITIONING YOUR OFFICE FOR GROWTH THROUGH REPUTATION - Robert C. Elliott, Se...
 
Redefining family office investment practices through International Forum Group
Redefining family office investment practices through International Forum GroupRedefining family office investment practices through International Forum Group
Redefining family office investment practices through International Forum Group
 
BRINGING FAMILY OFFICE SERVICES TO THE MASS AFFLUENT - Will Carter, MCKINLEY ...
BRINGING FAMILY OFFICE SERVICES TO THE MASS AFFLUENT - Will Carter, MCKINLEY ...BRINGING FAMILY OFFICE SERVICES TO THE MASS AFFLUENT - Will Carter, MCKINLEY ...
BRINGING FAMILY OFFICE SERVICES TO THE MASS AFFLUENT - Will Carter, MCKINLEY ...
 
SUSTAINABLE INVESTING STRATEGIES: WHY INVESTOR INTEREST CONTINUES - Michael L...
SUSTAINABLE INVESTING STRATEGIES: WHY INVESTOR INTEREST CONTINUES - Michael L...SUSTAINABLE INVESTING STRATEGIES: WHY INVESTOR INTEREST CONTINUES - Michael L...
SUSTAINABLE INVESTING STRATEGIES: WHY INVESTOR INTEREST CONTINUES - Michael L...
 
Mirroring the Performance of Top Investment Managers - Asheesh Advani, Covestor
Mirroring the Performance of Top Investment Managers - Asheesh Advani, CovestorMirroring the Performance of Top Investment Managers - Asheesh Advani, Covestor
Mirroring the Performance of Top Investment Managers - Asheesh Advani, Covestor
 
Bay City Capital – How to Profit from the Life Sciences Industry
Bay City Capital – How to Profit from the Life Sciences IndustryBay City Capital – How to Profit from the Life Sciences Industry
Bay City Capital – How to Profit from the Life Sciences Industry
 
Risk Management: Combining Strategic and Tactical Aprpoaches to Investment Ma...
Risk Management: Combining Strategic and Tactical Aprpoaches to Investment Ma...Risk Management: Combining Strategic and Tactical Aprpoaches to Investment Ma...
Risk Management: Combining Strategic and Tactical Aprpoaches to Investment Ma...
 
The Economy and Financial Markets: Crawling Out of Recession - David Wyss, Br...
The Economy and Financial Markets: Crawling Out of Recession - David Wyss, Br...The Economy and Financial Markets: Crawling Out of Recession - David Wyss, Br...
The Economy and Financial Markets: Crawling Out of Recession - David Wyss, Br...
 

Recently uploaded

Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified Binance Account
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfDerekIwanaka1
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance managementVaishnaviGunji
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 

Recently uploaded (20)

Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 

PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Tanenbaum, INFORMATION RISK STRATEGY CONSULTING

  • 1.  How To Survive In A Risky CyberWorld  2016 IFG Wealth Management Forum  Scottsdale, AZ  April 2016  Mitch Tanenbaum  www. CyberCecurity . com  Mitch @ CyberCecurity.com  720-891-1663
  • 4.
  • 5.
  • 6.
  • 7. What can you do? 1. Backups, backups and more backups 2. Business continuity plan 3. Disaster recovery plan 4. Incident response plan • Rowlett incident Test repeatedly!
  • 8. Law Firms  (and financial advisors)
  • 9.
  • 10. 1500 x the size of the WikiLeaks State Department cable leak
  • 11. And Financial Advisors Ask your law firms and advisors for a copy of their written cyber security plan As a law firm or advisor have a written plan Same goes for family offices – have a plan, ask for a plan
  • 13. 1500+ CxOs and Directors  90% of respondents have a medium to high cybersecurity vulnerability  91% of NEDs cannot read a cybersecurity report, preventing them from asking the intelligent questions (executive coaching)  40% don’t feel responsible for the repercussions of a cyber attack.
  • 15. Targeted Emails–often to execs and finance Drop malware Asks employees to wire money Conduct phishing tests • At one client, they sent 350 emails  139 were opened, 35 clicked on the malware  Including one C-Suite member
  • 16. What Does The FBI Think?
  • 17.  “I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again “  - Robert S Mueller III,  Director, Federal Bureau of Investigation  RSA Cyber Security Conference,  San Francisco, CA. , March 1, 2012
  • 18. NewYork DFS Proposed Regulations (Post Ben Lawsky)
  • 19.  Shared proposal with every state, federal and local regulator in the country  1. 12 written cyber security policies and procedures  2.Third party service provider management  3. Multi factor authentication  4. Chief Information Security Officer  http://mtanenbaum.us/ny-regulator-unveils-proposed-new-cyber-security-regulations/  http://www.dfs.ny.gov/about/letters/pr151109_letter_cyber_security.pdf
  • 20. 5. Application security 6. Cyber security personnel and intelligence 7. Annual cyber security audits 8. Notice Of cyber security incidents  http://mtanenbaum.us/ny-regulator-unveils-proposed-new-cyber-security-regulations/ http://www.dfs.ny.gov/about/letters/pr151109_letter_cyber_security.pdf
  • 21. If you are required to comply, it will require outside expertise  http://mtanenbaum.us/ny-regulator-unveils-proposed-new-cyber-security-regulations/ http://www.dfs.ny.gov/about/letters/pr151109_letter_cyber_security.pdf
  • 22. SEC Risk Alert To Investment Advisors and Broker Dealers
  • 23.  Issued Last September  1. Governance – manage the cyber risk process  2. Access rights – who can see what  3. Data Loss Prevention – PII in emails  4.Vendor Management – who do you share data with?  5.Training  6. Incident response plan  Cyber security exam initiative to improve compliance  http://mtanenbaum.us/sec-issues-risk-alert-to-advisors-and-brokers/
  • 25.
  • 26. California – Bellwether for the rest of the country
  • 27. CA AG Kamala Harris released a breach report in February As part of that, she defined REASONABLE SECURITY PROCEDURES as referred to in CA AB 1950
  • 28. Implement all CIS 20 controls which are appropriate Implement multi factor authentication for consumer facing web sites containing sensitive personal information Consistently use strong encryption on portable devices and maybe desktops
  • 29. AG Harris Says: The failure to implement all the controls that apply to an organization’s environment constitutes a lack of reasonable security.
  • 30. What Is The CIS 20 Center For Internet Security:  1. Inventory devices 2. Inventory software 3. Secure configurations for user devices 4. Continuous vulnerability assessment 5. Control admin privileges 6. Manage audit logs
  • 31. What Is The CIS 20 7. Email and web protection 8. Malware defenses 9. Control of ports, protocols and services 10. Data recovery capability 11. Secure configuration For network devices 12. Boundary defense 13. Data protection
  • 32. What Is The CIS 20 14. Control access based on need to know 15.Wireless control 16. Account monitoring 17. Security skills assessment and training 18. Application software security 19. Incident response and management 20. Penetration testing and red team exercises
  • 33. What Does The CFPB Say?
  • 34. CFPB entered consent decree with fintech firm Dwolla in February Specifies what CFPB expects Dwolla to do $100k fine, 5 years of monitoring NO BREACH INVOLVED!
  • 35. 1. Establish, implement and maintain a comprehensive data security plan 2. Adopt and implement reasonable and appropriate data security policies and procedures 3. Designate a qualified person to be accountable for the data security program 4. Conduct data security risk assessments twice a year 5. Evaluate and adjust the data security program in light of the results
  • 36. 6. Conduct regular, mandatory employee security training 7. Develop, update and implement security patches 8. Develop, implement and maintain an appropriate method of customer identity authentication at registration time. 9. Develop, implement and maintain reasonable procedure for third party risk (service providers). 10. Obtain an annual data security audit from an independent, qualified, third party, using generally accepted professional procedures and standards
  • 37. The Board must review all submissions The Board is ultimately responsible for ensuring compliance with the consent order
  • 39. More and more sensitive data on mobile Encrypt devices Restrict what applications are installed Use encrypted text (WhatsApp, Signal) Use encrypted email (Absio) • Both directions • With clients and internally
  • 40. Mobile Device Management (MDM) software Use current OS version • Android Ver 6 – Marshmallow • iPhone iOS 9 PATCH
  • 42.  It is not a silver bullet We are seeing insurance carriers claiming the insured “failed to follow minimum required practices” You need to verify that coverages and practices are aligned
  • 44.
  • 45.
  • 46.
  • 47.  To get our free weekly cyber security email newsletter, please send an email to Mitch @ CyberCecurity.com and we will add you to the list.