Investor Presentaiton
Determining Compliance: Regulatory Considerations
What actions did the licensee take to verify the cybersecurity
Did the licensee:
incident?
SFEES
1100101011110111011 Once
☐ Identify the affected systems or hardware?
Determine the nature of the data maintained
on those systems or hardware?
☐ Determine the type of incident. Was the
disclosure:
☐ Internal or external?
Caused by an employee or third party
service provider?
☐ The result of a malicious attack?
☐ Determine whether the incident exposed or is
reasonably likely to expose NPI? If so, was the
data on the system encrypted?
☐ Determine whether PII was affected and the
data elements that are at risk?
101101110110
1011010101
101101
unauthorized
access, misuse of 116
016
disruption has
been verified,
010111011101000111′ provide an 16
initial
0110101010101011 notification to
0101010101110
01111010110
the Director or
his designee.
1100101011 110110101110
1011PASSWORD110101111
10110101010
0101110111010
11View entire presentation