article thumbnail

New Microsoft Security and Compliance Certifications (Feb 2021)

Perficient

This morning I was sipping on my cup of coffee and browsing through Microsoft’s Learn page when I stumbled upon a few new certifications and exams around Microsoft Security and Compliance ! Certification – Microsoft Certified: Security Operations Analyst Associate. Exam: Microsoft Security Operations Analyst SC-200 (beta).

article thumbnail

7 Steps to Define a Data Governance Structure for a Mid-Sized Bank (Without Losing Your Mind)

Perficient

Establish a single source of truth Create a glossary that doesn’t read like a legal document Accept that these definitions will change more often than a teenager’s social media profile It’s not perfect, but it’s governance, not a philosophical treatise on the nature of reality. So very, very wrong.

Data 221
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Banking Computer-Security Incident Notification Requirements Take Effect

Abrigo

New Rule Outlines Computer-Security Incident Notification Obligations for Banks Financial institutions and their service providers should prepare to meet new computer-security notice requirements by May 1, 2022. . Computer-security incident notifications required. Expand and Clarify.

Security 195
article thumbnail

Federal Reserve Changes Derivative Netting Rules

Perficient

The Federal Reserve is now expanding the definition of financial institutions to include: swap dealers and security-based swap dealers; 1. major swap participants (MSPs) and major security-based swap participants (MSBSPs); 2. major swap participants (MSPs) and major security-based swap participants (MSBSPs); 2.

article thumbnail

New IoT Security Bill Exposes Rising Data Protection, Safety Concerns

PYMNTS

Thus, IoT security is becoming an essential part of modern conversations. Department of Homeland Security (DHS) and data security and privacy practice chair of D.C.-based A lot of the devices we’re talking about have no security. They weren’t built with security in mind, and there really isn’t any way to patch them.”.

Security 205
article thumbnail

Track the Triad to Tria(d)ge

Perficient

The ever-patient loving lady carefully checked all the folds of the newspaper and confirmed that the cheque was definitely missing. The same procedure can be applied to any security incident or breach at home or at office. Confirming the Incident: He came home and informed his wife of the loss of the cheque.

Metro 539
article thumbnail

Hip On HIPAA: The Secret Sauce to Successful Marketing Campaigns

Perficient

The secret to understanding timing and creating truly impactful communications hinges on a deeper understanding of HIPAA’s definition of marketing. Most of us have had to go through HIPAA training, and we understand about data-security and protected information. HIPAA was created nearly 25 years ago.

Marketing 508