Written Information Security Plan (WISP) Service & Audits

Category: Brain Storm

Written Information Security Plan (WISP) Service & Audits

Written Information Security Plan (WISP) Service & Audits

Why you need to consider a WISP   The Securities and Exchange Commission’s (SEC) Office of Compliance Inspections and Examinations (OCIE) has listed cybersecurity as a key focus area in its 2015 risk-based assessments. The addition of cybersecurity as a 2015 OCIE priority comes on the heels of the April 2014 release of sample cybersecurity […]

Cybersecurity is the Biggest Risk Facing the Financial System

Inadequate security technology and a pervasive culture of trust have left the worldwide financial industry open to a non-stop stream of cyber-attacks. The good news is that you don’t have to handle all of this alone; Brainlink can help. SWIFT bank attacks show the world how vulnerable the financial system really is; will you learn […]

CYBERSECURITY BASICS : KEY INSIGHTS from BOMA Cybertsecurity Panel

Recently, Raj Goel presented to answer the question “How Vulnerable Are You Building & Company Operations?”, the panel also included Todd Januzzi, CIO Paramount Group, and FBI’s SSA Albert Murray. The discussion began on the topic of how important is to backup files in a timely fashion. “First off, conduct a desktop exercise,” said Raj. […]

Brainlink International Redefines Disaster Recovery and Business Continuity for Professionals

Brainlink International Redefines Disaster Recovery and Business Continuity for Professionals

Key Lessons Learned From Hurricane Sandy Most IT consultants and providers want to believe they have disaster recovery and business continuity all figured out. They set up back-ups and assume that no matter how terrible the disaster, they’ll be able to bounce back immediately. However, the cybersecurity veterans at Brainlink International are urging CFOs and […]

Everything you need to know about the latest SEC OCIE Guidance Updates

The Security and Exchange Commission has released its first Investment Management Guidance Update in nearly two years, noting that “because funds are varied in their operations, they should tailor their compliance programs based on the nature and scope of their businesses”. A key factor in the update is that specified registrants are now required to use […]

The 5 Keys to an Effective Cyber Attack Response

The 5 Keys to an Effective Cyber Attack Response Cyber Attack Response

Imagine this… A staff member returning from a business trip calls you frantically from the airport – they left their company-issued laptop at the hotel, but the hotel staff hasn’t been able to find it. The worst part – that device has access to sensitive company systems and data. WHAT DO YOU DO? IT emergencies […]