DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Cybersecurity and Financial SystemResilience Report

July 27, 2022

Cybersecurity and Financial SystemResilience Report
The Consolidated Appropriations Act, 20211 (CAA) requires the Federal Reserve Board (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.

Spotlight

Lola.com

Lola.com makes Agile Travel Management real by providing a super simple way to manage, book and report on business travel, saving employers and travelers time and money. Happy employee travel experiences within a policy can be set up in five minutes. Lola.com uses machine learning and 24/7 support to help travelers easily book trips, while empowering managers to create policies, view budgets and expenditures, and monitor their globetrotting team efficiently. Based in Boston, the company was founded in 2015 by Paul English, co-founder of the travel booking site KAYAK, and is led by CEO Mike Volpe, previously CMO at HubSpot.

OTHER WHITEPAPERS
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

A Lifeline: Patient Safety and Cybersecurity

whitePaper | December 3, 2019

Healthcare information is unique and personal to us all.Indeed,the patient is at the center of healthcare, as it would not exist if the patient did not exist. Bits and bytes in today’s digital world have real significance when it come to patient care lives are on the line.

Read More
news image

CISA Stakeholder-Specific Vulnerability Categorization Guide

whitePaper | November 9, 2022

The CISA Stakeholder-Specific Vulnerability Categorization (SSVC) is a customized decision tree model that assists in prioritizing vulnerability response for the United States government (USG), state, local, tribal, and territorial (SLTT) governments; and critical infrastructure (CI) entities. This document serves as a guide for evaluating vulnerabilities using the CISA SSVC decision tree. The goal of SSVC is to assist in prioritizing the remediation of a vulnerability basedon the impact exploitation would have to the particular organization(s).

Read More
news image

GBM Security Whitepaper

whitePaper | November 10, 2019

We are living in an era of digital disruption. Multiple industries are being disrupted, or fear being disrupted in the near future. Business models are evolving to cater to the dynamic markets and digital transformation that seems to be the answer to changing business models. Digital transformation is rapidly becoming a key priority in most industries, as organizations adapt to changing markets by leveraging technologies to build IT-centric business models. In general, organizations are using digital transformation to reach their goals of achieving greater agility, improving operational efficiency, improving customer experiences, and developing new revenue streams.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More

Spotlight

Lola.com

Lola.com makes Agile Travel Management real by providing a super simple way to manage, book and report on business travel, saving employers and travelers time and money. Happy employee travel experiences within a policy can be set up in five minutes. Lola.com uses machine learning and 24/7 support to help travelers easily book trips, while empowering managers to create policies, view budgets and expenditures, and monitor their globetrotting team efficiently. Based in Boston, the company was founded in 2015 by Paul English, co-founder of the travel booking site KAYAK, and is led by CEO Mike Volpe, previously CMO at HubSpot.

Events