{"id":2115,"date":"2006-01-31T00:00:00","date_gmt":"2006-01-31T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/31\/identity-theft-laws-elevate-security-to-the-c-level\/"},"modified":"2021-12-30T11:40:42","modified_gmt":"2021-12-30T11:40:42","slug":"identity-theft-laws-elevate-security-to-the-c-level","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/31\/identity-theft-laws-elevate-security-to-the-c-level\/","title":{"rendered":"Identity Theft Laws Elevate Security to the C-Level"},"content":{"rendered":"<p>Information security should start from the top, experts say.  Numerous breaches in customer data security in 2005 have fueled calls for federal legislation that could lead to onerous security demands on financial institutions that hold consumer information.  Even if legislators show restraint in demanding new controls, it&#8217;s time for banks to create C-level security positions, experts suggest.  &#8220;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The government must assess the risk associated with certain data types so companies aren&#8217;t notifying consumers every time a breach of even noncritical data occurs,&#8221; asserts Jerry Cerasale of the Direct Marketing Association (DMA), a New York-based trade association representing more than 5,200 direct, database and interactive marketers.<\/p>\n<p>Fred Cohen, a principal analyst at Burton Group (Midvale, Utah), says enterprises should consider creating new positions or morphing existing ones to prepare for such legislation.  &#8220;The position of a chief information security officer (CISO) exists at many large firms, but it has not been a C-level position,&#8221; says Cohen.<\/p>\n<p>http:\/\/www.banktech.com\/showArticle.jhtml?articleID=177102701<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2115","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2115"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2115\/revisions"}],"predecessor-version":[{"id":4602,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2115\/revisions\/4602"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}