{"id":576,"date":"2015-09-16T11:52:29","date_gmt":"2015-09-16T11:52:29","guid":{"rendered":"http:\/\/54.201.249.27\/?p=576"},"modified":"2015-09-16T11:52:29","modified_gmt":"2015-09-16T11:52:29","slug":"sec-and-doj-hacking-prosecutions-highlight-secs-increased-interest-in-cybersecurity-risks","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/sec-and-doj-hacking-prosecutions-highlight-secs-increased-interest-in-cybersecurity-risks\/","title":{"rendered":"SEC and DOJ Hacking Prosecutions Highlight SEC\u2019s Increased Interest in Cybersecurity Risks"},"content":{"rendered":"

The US Securities and Exchange Commission (SEC) and the Department of Justice (DOJ) recently filed civil and criminal actions in the largest hacking and securities fraud scheme of its kind ever prosecuted.[1] During a five-year period, the defendants allegedly stole approximately 150,000 confidential press releases from the servers of three newswire companies that contained information prepared by scores of public companies. Unbeknownst to the companies, the defendant hackers, who appear to all be foreign nationals, then sold the press releases to traders who traded ahead of the confidential information\u2019s public release and reaped millions of dollars in illegal profits.<\/p>\n

This case highlights the need for companies to ensure that they have adequate internal controls that cover data transfer at all stages of the use and life cycle. Any weak link in a cybersecurity program may be exploited or used by hackers as a back door to gain access to information. In this case, the cyber attack targeted third-party newswires and not the companies that originally created and possessed the information. A strong cybersecurity program is essential for companies to protect valuable and sensitive information and to avoid possible enforcement actions, fines, reputational harm, loss of business, and class action or other lawsuits brought for damages suffered by customers or clients.<\/p>\n

The SEC\u2019s focus is not limited to public companies. Recent findings by the SEC confirm the widespread nature of cybersecurity attacks in the financial industry. In February 2015, the SEC\u2019s Office of Compliance Inspectors and Examinations (OCIE) released a Risk Alert announcing that it had examined scores of broker-dealers and investment advisers\u2019 cybersecurity protocols.[2] Among the areas that the Risk Alert report focused on were identification and assessment of cybersecurity risks, risk associated with vendors and other third parties\u2019 systems, detection of unauthorized activity, risks associated with remote customer access, and the absence of a chief information security officer and\/or cyber insurance.[3]\u00a0 Strikingly, OCIE\u00a0 found that 88% of the broker-dealers and 74% of the investment advisers examined had experienced a cyber attack, either directly or through a vendor.[4]<\/p>\n

The SEC\u2019s increased emphasis on the adequacy of internal controls (generally) and cybersecurity at all stages of data transfer (specifically) should particularly interest public companies and financial institutions in their approach to detecting and mitigating cyber risks.<\/p>\n

Read the original full article on JDSUPRA Business Advisor<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

Companies are reminded of the need for strong internal controls. The US Securities and Exchange Commission (SEC) and the Department of Justice (DOJ) recently filed civil and criminal actions in the largest hacking and securities fraud scheme of its kind ever prosecuted.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/576"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=576"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/576\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}