Part 8 - Cyber Implications for Publicly Traded Companies

Video Activity

This lesson covers cyber implications of publicly traded companies. It is important to look at: 1. Identifying risks related to cybersecurity 2. Establishing cybersecurity governance 3. Including policies 4. Procedures and oversight processes 5. Protecting firm networks and information 6. Identifying and addressing risks associated with remote acce...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
48 minutes
Difficulty
Advanced
CEU/CPE
1
Video Description

This lesson covers cyber implications of publicly traded companies. It is important to look at: 1. Identifying risks related to cybersecurity 2. Establishing cybersecurity governance 3. Including policies 4. Procedures and oversight processes 5. Protecting firm networks and information 6. Identifying and addressing risks associated with remote access to client information and funds transfer requests 7. Identifying and addressing risks associated with vendors and third parties 8. Detecting unauthorized activity

Video Transcription
00:04
since we've focused on considerations for public sector activities like the U. S. Government is now important to turn our focus on the commercial sector. It's critically important that you understand that if you are currently working for an organization that is publicly traded,
00:19
much like Target is
00:21
thesis acuity, and Exchange Commission has been ramping up efforts to move from more of a just guidance perspective
00:30
to actually enforcement actions.
00:33
If you look, the annual reports that were filed by Target
00:37
purgative actually shows that shareholders that has sustained this bridge and how the costs
00:44
of responding to that breach impacted their bottom line. Recently in 2015 the Security Exchange Commission held a summit
00:53
and the number one concern that they had
00:55
cyber security.
00:57
So what if some of the things that the Security Exchange Commission will be looking for
01:02
they won't be able to identify risks related to cyber security,
01:06
cyber security, governance
01:07
policies,
01:10
procedures and oversight,
01:12
how you protect your firm's network and information?
01:17
How you identifying an address risks associated with remote access,
01:22
identifying and address risks associated with vendors and other third parties, their parties that sounds roughly familiar to May,
01:30
and detecting unauthorized activity
Up Next