Online Safety Community

Navigating the Financial Regulations of Cyber Security

Event Details

Navigating the Financial Regulations of Cyber Security

Time: October 19, 2017 from 1pm to 2pm
Location: 26468 E Walker Dr, Aurora, Colorado 80016-6104
Street: 26468 E Walker Dr, Aurora, Colorado 80016-6104
City/Town: Aurora
Website or Map: http://bit.ly/2fAdkdg
Phone: 7209961616
Event Type: online, webinar
Organized By: Training Doyens
Latest Activity: Sep 22

Export to Outlook or iCal (.ics)

Event Description

OVERVIEW

Russians Hacking the Elections, Activist Hacking for Political Reasons, Competitors Hacking each other.  Fraudsters hacking for Profit, Hackers for Hire.

Know why you are a target; learn how to incorporate policies and procedures and to test for the effectiveness of those policies and procedures.

Learn what you may be liable for even if you have a cyber plan.

The regulators are constantly issuing alerts, and enforcements in the area of cyber-security in the financial industry.  They do this as a way to help protect the investor and maintain capital formation.  Advisors, Custodians, and Third Parties all work together to offer services to the Investor and each has a responsibility to keep the clients personal identifiable information safe as well as to defend and remediate in the case of an incident.  This session will review the cyber security landscape in the financial services industry.

WHY SHOULD YOU ATTEND

Computer Intrusions are the cyber actor’s portal to invade and burglarize homes and business across the nation and the threat will only continue to grow.  The Financial Industry is faced with increasingly complex threats almost daily. These threats challenge traditional models of law enforcement, IT Management and Regulations.   Education, awareness and communication will help defend against the criminal element and protect our clients and our firms. The ongoing impact to financial firms is of critical importance to all.  We hope this session will help educate you on your role in the defense process as well as review the regulatory landscape surrounding this topic.

AREAS COVERED

  • The defensive role and Obligation of the Financial Firm as protector of client data
  • Effective Communication between team members of a Financial Firm
  • Basic everyday tools to keep the Cyber Criminal at bay
  • Learn how to use the SEC Cyber Security Sweep exam to design the in house Cyber Defense Plan
  • How to effectively perform due diligence on Outsourced Vendors
  • Ways to stay educated on Cyber Defense

WHO WILL BENEFIT

  • Financial Industry
  • Compliance Industry
  • Technology Industry
  • Operations Managers/Directors
  • CEO – COO CCO
  • IT
  • Portfolio Mangers
  • Financial Planners
  • Investment Managers/Advisors

LEARNING OBJECTIVES

The Securities and Exchange Commission has conducted focused exams relating to cyber security and released risk alerts on the subject.  All firms no matter their size need to understand the risks they face in order to protect their firms and their clients personal identifiable information. Firms and individuals must also understand their obligations and duties to follow the regulations.

 

For more detail please click on this below link:

http://bit.ly/2fAdkdg

 

Email: support@trainingdoyens.com

Toll Free: +1-888-300-8494

Tel: +1-720-996-1616

Fax: +1-888-909-1882

Comment Wall

Comment

RSVP for Navigating the Financial Regulations of Cyber Security to add comments!

Join Online Safety Community

Attending (1)

Take our poll!

Take our poll!

Latest Activity

Roger Steven posted a blog post

Working with Physician Extenders to increase efficiency and profitability

A Physician Extender is one who is not a physician, but is of a lesser qualification, who helps physicians by carrying out many activities usually carried out by physicians. As the name suggests, Physician Extenders work to supplement the functions of a physician and could take a considerable load off her shoulders. In…See More
5 hours ago
John Robinson posted a blog post

‘Synthetic lethality’ targets cancer cells by damaging vulnerable DNA

By designing small molecules that can “turn off” kinase enzymes stuck in the “on” position, they have managed to ward off cancer’s attack. More recently, scientists have focused on ways to help the body’s own immune cells seek and destroy cancer cells.Enter the concept known as synthetic lethality. Researchers have long known that a cancer cell hobbling along with one broken gene is vulnerable. Knock out another key gene, they have discovered, and the cell will topple.The notion of killing…See More
6 hours ago
Adam Fleaming posted blog posts
7 hours ago
Training Doyens posted events
7 hours ago

Forum

Risk Management Solutions

Risk is defined as the potential hazard, harm or side effect of an activity. Almost all activities come with some or another form of risk, which needs to be mitigated or eliminated. Risk management…Continue

Tags: risk, Banking, management, healthcare, Process

Started by John Robinson yesterday.

Occupational Health and Safety 4 Replies

Health and safety are important aspects of an organisation’s smooth and effective functioning.  Did you know that workplace health & safety injuries cost Australian businesses over $60 billion…Continue

Tags: Safety, and, Health, Occupational

Started by WHS Solutions. Last reply by John Robinson on Monday.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Badge

Loading…

© 2017   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service