Investor Presentaiton slide image

Investor Presentaiton

Determining Compliance: Regulatory Considerations What actions did the licensee take to verify the cybersecurity Did the licensee: incident? SFEES 1100101011110111011 Once ☐ Identify the affected systems or hardware? Determine the nature of the data maintained on those systems or hardware? ☐ Determine the type of incident. Was the disclosure: ☐ Internal or external? Caused by an employee or third party service provider? ☐ The result of a malicious attack? ☐ Determine whether the incident exposed or is reasonably likely to expose NPI? If so, was the data on the system encrypted? ☐ Determine whether PII was affected and the data elements that are at risk? 101101110110 1011010101 101101 unauthorized access, misuse of 116 016 disruption has been verified, 010111011101000111′ provide an 16 initial 0110101010101011 notification to 0101010101110 01111010110 the Director or his designee. 1100101011 110110101110 1011PASSWORD110101111 10110101010 0101110111010 11
View entire presentation