The Financial Industry Regulatory Authority (FINRA) is a non-governmental agency authorized by Congress to help regulate and protect the financial industry. Operating under the auspices of the SEC as a Self-Regulatory Organization (SRO), FINRA ensures that broker-dealers are honest and forthright and that financial data is kept secure.
Category: Compliance Standards
Staying informed about all of the cyber security compliance standards is essential to keeping your company safe from hackers. Read on to learn about the various steps you can take to stay up to date with your industry’s compliance standards.
-

NIST 800-171 Assessment Methodology Overview
The Defense Industrial Base (DIB) sector is a vast business network containing some of the most critical infrastructures in the US. Working in partnership with or for the Department of Defense (DoD) as a contractor can be lucrative, but that comes at the cost of high risks to your own company and the safety of all Americans. That’s why you’ll need to ensure compliance with various DoD cybersecurity frameworks, and the NIST 800-171 assessment methodology is a critical first step in that direction. (more…)
-

Beginner’s Guide to HITRUST ISO 27001 Mapping
Companies looking to expand their horizons in an increasingly mobile business environment are likely to face shifting, overlapping, and even conflicting compliance needs. The goal of “mapping frameworks” (or optimizing practices to satisfy multiple frameworks’ controls) minimizes inefficiencies while meeting all security requirements.
-

A Beginner’s Guide for HITRUST to ISO 27001 Mapping
Companies looking to expand their horizons in an increasingly mobile business environment are likely to face shifting, overlapping, and even conflicting compliance needs. The goal of “mapping frameworks” (or optimizing practices to satisfy multiple frameworks’ controls) minimizes inefficiencies while meeting all security requirements.
-

Your Guide to SOC 2 Cloud Security
One of COVID-19’s direct impacts on businesses has been the acceleration toward cloud solutions. Cloud computing and data storage have skyrocketed — in fact, cloud spending increased 37% during the first months of the pandemic. In turn, this means more companies now need to focus on their cloud security practices, especially concerning regulatory compliance requirements. For example, service organizations need to comply with the American Institute of CPAs (AICPA) SOC guidelines and SOC cloud security requirements.
-

What is a SOC 2 Report, and Do You Need One?
The American Institute of CPAs (AICPA) has determined a set of requirements your company may need to follow if it is a “service organization” that stores sensitive user data on the cloud. These requirements are known as Security Organization Controls (SOC), and audits to ensure they’re in place are referred to as SOC reporting.
-

Proposition 24 Updates To The CCPA
The California Consumer Privacy Act (CCPA) is barely in full swing, and regulators have already pushed through an update, proposition 24.Proposition 24 and the updates to the CCPA have left many businesses confused about the state of their privacy compliance.
-

Guide to DFARS Cybersecurity Compliance Requirements
Contracts with governmental agencies can be extremely valuable for businesses. This is especially true for contracts with the Department of Defense (DoD), which has abundant resources to offer its vendors. The catch is that the DFARS compliance requirements are among the most complex cybersecurity regulations for any US industry. Any company working with the DoD needs to be fully compliant. Nonetheless, resources spent meeting them are guaranteed to provide optimal ROI.
-

HITRUST Bridge Assessment for Healthcare IT Security
The HITRUST Alliance protects healthcare companies from cyberattacks by combining multiple regulatory compliance requirements into one uniform text — the Common Security Framework (CSF). The HITRUST Bridge Assessment makes it easier for businesses seeking re-certification.
-

Introduction to the SOC 2 Control Framework
The current information environment puts pressure on businesses to find partners, services, and products that build security into their foundation. With cyberattacks and data loss costing businesses millions every year, fewer are willing to acquire new software without knowing if they have implemented some security framework. (more…)
