CV_SeptOct_24

CYBER PATROL • Use strong authentication such as multi-factor authentication and secure password policies to protect access to critical systems. • Apply network segmentation and firewalls to enhance security by limiting unauthorized access. • Educate employees on phishing and social engineering helps to mitigate the risks of these common attack vectors. • Protect user devices with encryption and mobile device management (MDM) tools. • Develop an incident response plan to rapidly detect, respond to and recover from security incidents. • Continuously monitor all systems and work closely with service providers to maintain security standards. A Shared Responsibility FTC compliance impacts numerous individuals across all levels of an organization. Oftentimes, companies struggle to achieve compliance due to a lack of communication and coordination between departments. Here is a breakdown of the key stakeholders for FTC compliance. • Chief information security officers (CISOs) must understand FTC regulations to design and implement security strategies that comply with legal requirements, protecting the company from data breaches and penalties. • Chief compliance officers (CCO) are responsible for ensuring that the company meets all regulatory requirements. Non-compliance can lead to legal consequences, financial penalties and damage to the company’s reputation. • Chief risk officers (CROs) mitigate risks associated with cybersecurity. This knowledge enables them to prioritize resources and strategies to reduce the likelihood of regulatory non-compliance. • Legal and compliance teams interpret and integrate regulations into different policies. Staying informed ensures that the organization’s practices align with legal requirements, avoiding fines or sanctions. • Chief technology officers (CTOs) and IT directors are responsible for ensuring that the company’s technology infrastructure is secure and compliant. Having knowledge of FTC regulations helps them make informed decisions about technology investments and security protocols. • Data privacy officers focus on protecting customer and company data. Understanding FTC regulations is crucial for implementing privacy measures that align with legal standards, which helps protect the company from data breaches and associated liabilities. • Boards and senior management have ultimate accountability for the company’s compliance posture. Making them aware of FTC regulations can help to provide the right oversight, allocate resources appropriately and ensure that cybersecurity is a priority. • Internal audit teams need to evaluate whether the company’s controls and practices meet FTC standards. Knowing these regulations enables them to provide accurate assessments and recommend necessary improvements. • Security and IT staff: The people who are directly responsible for implementing and maintaining security measures need to understand how to perform their duties in a compliant manner, and how to properly escalate and report compliance issues. • Third-party risk management teams: External partners must also comply with the FTC’s cybersecurity standards. This is necessary for reducing supply chain vulnerabilities. One way to improve collaboration across different teams and align with FTC regulations is to adopt the National Institute of Standards (NIST) Framework. The latest version, NIST 2.0, provides updated guidelines for achieving a modern and reliable cybersecurity risk management strategy. It aims to protect an organization’s people, processes, facilities and technology from breaches through risk assessments, security roadmapping and ongoing compliance reviews. “The CSF provides a basis for improved communication regarding cybersecurity expectations, planning and resources,” said NIST. “The CSF fosters bidirectional information flow between executives who focus on the organization’s priorities and strategic direction and managers who manage specific cybersecurity risks that could affect the achievement of those priorities. The CSF also supports a similar flow between managers and the practitioners who implement and operate the technologies. The left side of the figure indicates the importance of practitioners sharing their updates, insights, and concerns with managers and executives.” Brush Up on FTC Compliance at CVxEXPO24 Navigating FTC compliance can be a daunting task. However, it’s crucial for any organization that is serious about minimizing the risk of enforcement, avoiding costly penalties and safeguarding their reputation. One of the best ways to get up to speed with FTC compliance is to attend a workshop where you can ask questions and access expert insights. And there is no better opportunity than at CVxEXPO24, taking place November 12-14, in Scottsdale. Join Jonathan on Wednesday, Nov. 13 from 9:50 a.m. to 10:30 a.m. for a hands-on workshop that explains how to build a cybersecurity program that aligns with the latest FTC mandates. This session will provide step-by-step guidance for creating templates for policies, procedures, and controls that align with both FTC requirements and NIST CSF. Attendees will leave with a draft of a compliant cybersecurity program tailored to their organization’s needs. o Jonathan Cox is vice president of information security at C3 Complete. 32 CHANNELVISION | SEPTEMBER - OCTOBER 2024

RkJQdWJsaXNoZXIy NTg4Njc=