A significant deadline is now approaching under the New York State Department of Financial Services (“DFS”) cybersecurity regulation, 23 NYCRR 500. On March 1, 2019, the two-year transitional period under the NY DFS regulation expires and all remaining requirements become effective. The final requirement concerns supply chain cybersecurity. Background The NY DFS cybersecurity framework requires… Read more »
Supply Chain
Sera-Brynn CTO to Present at SEALI Conference
Sera-Brynn Co-founder and Chief Technology Officer Darek Dabbs will present at the Southeastern Admiralty Law Institute conference with Darius K. Davenport, of Crenshaw, Ware & Martin, P.L.C., Norfolk, VA. With several recent cyberattacks targeting the shipping and logistics industry, Dabbs and Davenport will discuss “Anatomy of a Cyber Breach” on June 29. “As industries in… Read more »
Chief Strategist Speaks on Critical Compliance Issues at NYS Cyber Security Conference
On June 5, 2018 at 3:20 PM in Albany, NY, Sera-Brynn’s CSO will discuss critical cybersecurity compliance issues in the federal and defense contracting space — from strategic risk management to supply chain impacts. Heather Engel, Chief Strategy Officer at Sera-Brynn, will present “Strategic Planning for Cyber Risk: Protecting Data and Meeting Regulatory Requirements… Read more »
GOVERNMENT CONTRACTS CYBER CAFÉ SERIES: SUPPLY CHAIN AND THIRD-PARTY VENDOR MANAGEMENT
Join us for a new webinar series that will cover the top issues in government contracts and cybersecurity — all in just 45 minutes. The Government Contracts Cyber Café will provide coaching, training and analysis to help you work through the technical, legal, accounting and other requirements confronting your organization, with the goal of helping… Read more »
DFARS 7012 and Supply Chain Cyber Risk Management
Day-in and day-out, U.S. companies are under cyber-attack by criminals, hacktivists, bored kids and nation-states. Nation-state sponsored actors, including China and Russia, are known as Advanced Persistent Threat (APT) actors, and have been extremely successful in compromising the networks of commercial organizations, particularly those companies conducting work for the Department of Defense. In fact, these… Read more »