Cyber Security

Every company in the world now sits on a trove of customer data that would’ve been unimaginable mere years ago, but that data comes with tremendous responsibility: lax data security is essentially inviting hackers to take advantage of your customers. Ethical companies know they owe it to their clients and customers to protect them, and our contributors will discuss how.

Cybersecurity Dos and Don’ts for Remote Workers

By |2020-05-12T20:35:43+00:00April 20th, 2020|COVID-19, Cyber Security|

Ethisphere Executive Vice President Craig Moss is also Director - Content and Tools for the Cyber Readiness Institute, of which Ethisphere is a champion. Given the sudden shift of many companies around the world to remote and work-from-home setups for employees who are able, and that shift's significant impacts on ...

Making Your Remote Workforce Cyber Ready

By |2020-04-08T16:37:36+00:00March 25th, 2020|COVID-19, Cyber Security|

Ethisphere Executive Vice President Craig Moss is also Director - Content and Tools for the Cyber Readiness Institute, of which Ethisphere is a champion. Given the sudden shift of many companies around the world to remote and work-from-home setups for employees who are able, and that shift's significant impacts on legal and compliance professionals, ...

The CCPA Is Here. Watch Out!

By |2020-03-06T21:41:04+00:00March 6th, 2020|Cyber Security|

Of the endless possibilities that this new decade may bring, one thing remains certain: California’s continuously evolving, increasingly complex, and ever-growing regulatory environment. A new addition to that regulatory labyrinth is the California Consumer Privacy Act (CCPA), Cal. Civ. Code § 1798.100 et seq. Navigating the complexities of the CCPA creates new compliance risks for ...

Special Edition Magazine: BELA Asia Pacific

By |2020-03-06T21:05:19+00:00March 6th, 2020|Asia-Pacific, Cyber Security, Employee Engagement, Risk and Reputation|

At its core, the BELA Asia Pacific community, in partnership with William E. Connor & Associates is about promoting integrity through shared experiences, enabling companies to improve business performance and transform in accordance with the challenges that ethics and compliance leaders overcome each day—and our latest magazine is a testament to the ...

[WATCH] Evaluating Cybersecurity Gaps Across the Value Chain

By |2019-12-31T22:40:46+00:00November 20th, 2019|Cyber Security, Value Chain and Third Party|

Moderator: Pamela Passman, Vice Chair, Ethisphere Panel: Rachel Armstrong, Global Legal Lead -Security Services, Accenture Mark Bannon, Head of Cyber, UK, AIG Paul Ryan, Chief Security Officer, Dell Financial Services

Integrating Risks & Adding Value: A Conversation with Best Buy Executives

By |2019-12-03T18:18:27+00:00November 3rd, 2018|Compliance and Ethics, Cyber Security|

In this wide-ranging discussion, Best Buy’s current Chief Risk and Compliance Officer Todd Hartman, along with the company’s former Chief Information Security Officer Deb Dixson, chat with Ethisphere Magazine about Best Buy’s evolution on cyber security, compliance, and risk over the last decade, which culminated in the integration of all three into a single, ...

Cyber Enforcement Picks Up…And New Risks Emerge

By |2019-12-03T15:23:35+00:00November 3rd, 2018|Corporate Purpose, Cyber Security, Legal and Regulatory|

You know your company’s data is a valuable asset and that you have to protect it. But how well do you know what your company actually does with its data and where it stores it? And how well do you know how data-protection regulators around the world would view your company—and the adequacy of ...

Lost in a Cyber Second: Protecting Information and Mitigating Cyber Risk

By |2020-01-01T00:14:02+00:00March 14th, 2018|Compliance and Ethics, Cyber Security, Digital Innovation, Legal and Regulatory, Risk and Reputation|

Imagine this scenario: A Wall Street Journal reporter is on the phone and wants to know how a trove of your company’s confidential data—including customer credit card information, employee social security numbers, confidential emails, and future product plans—ended up on the dark web. What steps do you take? What notifications need to be made? ...

RSM US: Aligning Your Board, Your Strategy and Your Technology

By |2017-08-24T21:03:49+00:00March 21st, 2017|Cyber Security|

Editor's note: This article was originally published on RSM US LLP. Click here to view to the original.  In the following article, Brad Steppig, Director, Technology and Management Consulting at RSM explores how a 3-year technology plan helps control risk and drives growth.  Regulators have required financial institutions to develop technology plans for several years. ...

EU Watchdog Probes Facebook-WhatsApp Data Policies

By |2017-01-15T20:42:58+00:00September 11th, 2016|Cyber Security|

Margrethe Vestager EU Competition Commissioner is placing a renewed focus on Facebook’s privacy-policy in light of new changes announced last month that will enable the social network and Instagram photo-sharing site to pull data from WhatsApp, Bloomberg reported. In October 2014, the social network giant won approval from the EU competition authority to move forward with ...