Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper December 7, 2021 Vigilanza sul mercato NPEs: Quale risposta dei Servicer alla rinnovata attenzione? L’11 novembre 2021 Banca d’Italia ha rilasciato la comunicazione “Servicers in operazioni di cartolarizzazione. Profili di rischiosità e linee di vigilanza” che integra e in alcuni casi specifica il quadro previsionale rinnovato con il recente (quarto) aggiornamento (luglio 2021) delle Disposizioni di vigilanza per gli intermediari finanziari (Circolare n. 288 del 3 aprile 2015, Titolo III, Cap.… Whitepaper October 25, 2021 COMPLIANCE PRIVACY: COME TRASFERIRE I DATI PERSONALI AL DI FUORI DELL'UE Dalle Raccomandazioni del Comitato Europeo per la protezione dei dati alle Clausole Contrattuali Standard della Commissione Europea quali sono le regole e come applicarle Secondo le raccomandazioni emanate il 18 giugno 2021 dall’European Data Protection Board (EDPB), le aziende devono dotarsi di una nuova metodologia per gestire i trasferimenti di dati personali all’estero ed essere in grado di… Whitepaper September 29, 2021 SUPPLY CHAIN SECURITY Come gestire i rischi cyber connessi alle esternalizzazioni di processi e servizi Il Governo ha di recente portato a 223 i soggetti inclusi nel Perimetro di Sicurezza Nazionale Cibernetico con il DPCM n. 81 del 14 aprile 2021, che integra un precedente DPCM (n. 131 del 30 luglio 2020) sugli obblighi per le imprese che nella catena di approvvigionamento utilizzano servizi/beni ICT di terze parti… Newsletter May 10, 2022 SIFMA Quantum Dawn VI A Decade of Testing and Resilience Over the past 10 years, the Securities Industry and Financial Markets Association (SIFMA) has coordinated a series of industrywide resilience exercises known as Quantum Dawn. These exercises provide a forum for financial firms, regulatory bodies, central banks, law enforcement, government agencies, trade associations and information-sharing organisations to… Whitepaper June 1, 2022 How can an enterprise use access management to establish a Zero Trust environment? A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based conditional… Whitepaper February 21, 2023 ISO 27001: 2022 - Key Changes and Approaches to Transition This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organisations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in… Flash Report July 31, 2023 SEC Cybersecurity Disclosure Enhancements: Efforts to Boost Investor Confidence On 26 July 2023, the U.S. Securities and Exchange Commission (SEC) adopted amendments1 to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing risk to public companies, investors and market… Flash Report May 14, 2021 President Biden executive order to strengthen U.S. Cybersecurity will impact federal agencies and public and private sector organisations On May 12, President Joe Biden issued the Executive Order on Improving the Nation’s Cybersecurity. This executive order (EO) is the most recent action by the administration to strengthen U.S. national cyber defenses and address cybersecurity threats and attacks that continue to grow in magnitude, impact and frequency. It is intended to protect networks in the federal, public and private sectors,… Client Story April 9, 2021 Global Chocolatier Adopts Privacy Technology to Prevent Data Exposure Data privacy has become a strategic priority as companies adapt to comply with rapidly proliferating data privacy laws. Recent years have seen the adoption of the European Union’s General Data Protection Regulation (GDPR), the more recent California Consumer Protection Act (CCPA), and similar regulations. These safeguards require companies to document the types of protected personal data used in… Whitepaper October 22, 2020 How Firms Can Tackle Technology Risk Blind Spots to Build Resilience Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt… Load More