Categories
Daily Compliance News

January 12, 2022 the Farewell to Michael Lang Edition


In today’s edition of Daily Compliance News:
·      Cyber issues for PE.  (WSJ)
·      Woodstock organizer dies.  (NYT)
·      RCMP looking a Canadian company corruption overseas. (NationalPost)
·      Journalist who exposed FIFA corruption dies. (SI.com)

Categories
From the Editor's Desk

November in Compliance Week

Welcome to From the Editor’s Desk, a podcast where co-hosts Tom Fox and Dave Lefort, Editor in Chief at Compliance Week unpack some of the top stories which have appeared in Compliance Week over the past month, look at top compliance stories, talk some sports and generally try to solve the world’s problems.

 In this month’s episode, we look back at top stories in CW from November including the final results from the CW survey ‘Inside the Mind of the CCO’. It includes a discussion of the gender gap in pay for compliance professionals, the role of compliance in ESG and the role of compliance in fighting cyber breaches. We discuss the Compliance Week 2022 Conference scheduled for May in DC and upcoming CW event on best practices to prevent a ransomware attack. We conclude with a look at some of the top sports stories including the MLB lock out by management, Michigan beating Ohio State and the storyline of a potential Brady v. Belichick Super Bowl.

Check out the CW articles on Inside the Mind of the CCO, herehere and here.

Early register for CW 2022 Conference here.

Categories
Coffee and Regs

What’s Next for Cybersecurity in 2022?

Categories
Daily Compliance News

November 22, 2021 the Why Corruption edition


In today’s edition of Daily Compliance News:

  • Will Activism CEO resign?(WSJ)
  • Office reopening gets trickier. (WSJ)
  • Banks must promptly report cyber breaches. (Reuters)
  • Why do some become corrupt? (Foreign Policy)
Categories
Compliance Into the Weeds

Retreat on DoD Cybersecurity for Contractors

Compliance into the Weeds is the only weekly podcast which takes a deep dive into a compliance related topic, literally going into the weeds to more fully explore a subject. Today, Matt and Tom take a look at the Department of Defense retreat on its cybersecurity initiative for contractors, CMMC to the new standard of CMMC 2.0.

Some of the issues we consider are:

·      What is CMMC and what morphed into CMMC 2.0?
·      Who led the charge to make these changes?
·      Do these changes help or hurt federal government overall cybersecurity?
·      Will self-assessments work?
·      New FCA claims coming?
·      What about compliance?
Resources
Matt in Radical Compliance, Pentagon Sounds Retreat on CMMC Compliance

Categories
Coffee and Regs

Cybersecurity Training, Talent and Diversity

Categories
Coffee and Regs

Digital Assets: Trading & Compliance for Cryptocurrency

Categories
Coffee and Regs

Cybersecurity Awareness Month – Reducing Cyber Incidents Through Vendor Due Diligence

Categories
Coffee and Regs

The Mood of Compliance

Categories
ComTech

Towards a Cyber-Secure Future with Jenna Waters


 
Jenna Water’s time in the US Navy equipped her with sophisticated skills she now finds invaluable in her work as Cybersecurity Consultant at True Digital Security. She joins Tom Fox and Valerie Charles on this episode of ComTech to talk about how the cybersecurity industry is evolving, her vision to end security breaches, and what she thinks about President Biden’s executive order on cybersecurity.
 

 
Putting Corporate America on Notice
“I think businesses – particularly those that work in industries regarded as critical infrastructure, obviously because of the Colonial Pipeline hack – …a lot of them know now that they’re on notice,” Jenna tells Tom and Valerie. Recent cybersecurity attacks as well as the rise in ransomware, have driven home the need for good cybersecurity. These attacks not only impact businesses but are now tangibly affecting the lives of everyday citizens. Jenna believes this is sparking change in the industry, as the government, companies, and even the general public are taking cybersecurity more seriously. 
 
End Security Breaches
Tom comments that his clients are now asking about their information security program, something they weren’t concerned about before. He asks Jenna how she would advise a company to start thinking about this issue. She outlines the steps her company takes to help their clients create a customized cybersecurity program. “…By prioritizing your risk, that’s how you can develop a more tailored cybersecurity program,” she points out. She and Tom discuss her vision of ending security breaches overall. She remarks, “For me, ending security breaches is a vision of the future in which a security breach can be detected, identified, and contained effectively… It’s not allowing a security incident to go to the point of a security breach… and it doesn’t affect or impact the organization or public in any significant way other than maybe the time it takes to contain it.”
 
Improving Cybersecurity with Data
“When you’re trying to combat this kind of breach, how do you use data?” Valerie asks Jenna. “Cybersecurity is actually one of the best areas in technology where it can be very data-driven,” Jenna responds. Data can help you build a threat profile and come up with an action plan to combat threats. Analyzing recent and past data can help you establish an operational baseline, and in turn recognize deviations from the norm. It can also help you identify gaps and vulnerabilities in your organization. There’s also the global perspective: gathering and analyzing data on threat groups helps you recognize their patterns before they attack. However, don’t focus only on data and ignore basic psychology. Hackers are still just human beings and are “subservient to human behaviors and motivation,” Jenna reminds listeners. 
 
Cyber Risk Assessment is for Everyone
“I think everybody could benefit from a risk assessment in terms of cybersecurity,” Jenna tells Valerie; businesses in critical industries should prioritize it. Generally, she recommends an annual assessment. However, it should also be done when there is a significant change in operations or in the direction of the business. She argues that leadership buy-in is imperative: “Leadership buy-in for an organization is paramount to the success of the cybersecurity team.” 
 
Thoughts on Biden’s Executive Order
“Do you have any urgent or immediate thoughts on President Biden’s executive order on cybersecurity?” Valerie asks. Jenna responds that she is excited and on board with the order. “As cybersecurity professionals, we like to take advantage of every emergency,” she quips. It’s a positive step signaling that cybersecurity is seen as important at the highest levels of government. On the other hand, however, the executive order may not last after Biden’s term of office as it can be revoked by the next President. Additionally, only certain federal bodies are bound by the order.
 
Resources
Jenna Waters on LinkedIn 
True Digital Security