Insight Search

Sort by:
  • Whitepaper

    December 7, 2021
    L’11 novembre 2021 Banca d’Italia ha rilasciato la comunicazione “Servicers in operazioni di cartolarizzazione. Profili di rischiosità e linee di vigilanza” che integra e in alcuni casi specifica il quadro previsionale rinnovato con il recente (quarto) aggiornamento (luglio 2021) delle Disposizioni di vigilanza per gli intermediari finanziari (Circolare n. 288 del 3 aprile 2015, Titolo III, Cap.…
  • Whitepaper

    October 25, 2021
    Dalle Raccomandazioni del Comitato Europeo per la protezione dei dati alle Clausole Contrattuali Standard della Commissione Europea quali sono le regole e come applicarle Secondo le raccomandazioni emanate il 18 giugno 2021 dall’European Data Protection Board (EDPB), le aziende devono dotarsi di una nuova metodologia per gestire i trasferimenti di dati personali all’estero ed essere in grado di…
  • Whitepaper

    September 29, 2021
    Come gestire i rischi cyber connessi alle esternalizzazioni di processi e servizi Il Governo ha di recente portato a 223 i soggetti inclusi nel Perimetro di Sicurezza Nazionale Cibernetico con il DPCM n. 81 del 14 aprile 2021, che integra un precedente DPCM (n. 131 del 30 luglio 2020) sugli obblighi per le imprese che nella catena di approvvigionamento utilizzano servizi/beni ICT di terze parti…
  • Newsletter

    May 10, 2022
    A Decade of Testing and Resilience Over the past 10 years, the Securities Industry and Financial Markets Association (SIFMA) has coordinated a series of industrywide resilience exercises known as Quantum Dawn. These exercises provide a forum for financial firms, regulatory bodies, central banks, law enforcement, government agencies, trade associations and information-sharing organisations to…
  • Whitepaper

    June 1, 2022
    A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based conditional…
  • Whitepaper

    February 21, 2023
    This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organisations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in…
  • Flash Report

    July 31, 2023
    On 26 July 2023, the U.S. Securities and Exchange Commission (SEC) adopted amendments1 to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing risk to public companies, investors and market…
  • Flash Report

    May 14, 2021
    On May 12, President Joe Biden issued the Executive Order on Improving the Nation’s Cybersecurity. This executive order (EO) is the most recent action by the administration to strengthen U.S. national cyber defenses and address cybersecurity threats and attacks that continue to grow in magnitude, impact and frequency. It is intended to protect networks in the federal, public and private sectors,…
  • Client Story

    April 9, 2021
    Data privacy has become a strategic priority as companies adapt to comply with rapidly proliferating data privacy laws. Recent years have seen the adoption of the European Union’s General Data Protection Regulation (GDPR), the more recent California Consumer Protection Act (CCPA), and similar regulations. These safeguards require companies to document the types of protected personal data used in…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
Loading...