Legal Seminar, Chicago, IL

NAIC

 Access controls  Limit devices accessing core systems  Restrict physical access  Encrypt sensitive nonpublic information  Secure development of in-house applications  Update systems  Implement multi-factor authentication  Regularly test systems

 Verify audit trails  Prepare backups  Develop procedures for disposal

Synthesis of Security Requirements

 Board Involvement  CISO  Independent Risk Assessment  Regular Audits  Ongoing Defense Assessment  Separation of Duties

Made with FlippingBook - Online catalogs