Select regional store:

New York State’s cybersecurity regulation for Financial Services Webinars

The Cybersecurity Requirements for Financial Services Companies released by New York State’s Department of Financial Services (DFS) requires all NY financial institutions to implement security measures to protect themselves against cyber attacks. This was propelled by the increasing cyber threats facing the financial industry.

To support organizations in their NYDFS cybersecurity regulation projects, IT Governance has launched a series of free webinars you can download, or watch online.

On-demand NYDFS webinars

NY State’s Department of Financial Services cybersecurity regulation: How to meet requirements within deadlines.

NYDFS webinars on demand

This webinar is designed to update senior officers and boards about the potential impact on their organizations and how ISO 27001 can provide the controls for implementation

NY State’s cybersecurity legislation requirements for risk management, security of applications, and the appointed CISO

NYDFS webinars on demand

This webinar provides an overview of the CISO’s role and how to successfully set up and maintain a risk management program that aligns with the NYDFS cybersecurity requirements

A guide to risk assessments

NYDFS webinars on demand

Led by Alan Calder, IT Governance’s founder and CEO, and the webinar will cover the importance of the risk assessment process and the ideal timeframe in which it should be conducted to provide you with the information you need in order to meet the requirements.

Addressing penetration testing and vulnerabilities, and adding verification measures

NYDFS webinars on demand

In this webinar, we will cover best practices for penetration testing and vulnerability assessments, and how to train staff as part of creating a strong information security system that addresses people, processes, and technology

Data privacy, security measures, and managing third-party service providers

NYDFS webinars on demand

This webinar covers essential parts of the Regulation that include controls for the encryption and disposal of non-public information, multi-factor authentication, and monitoring third parties for compliance.

This website uses cookies. View our cookie policy