Monthly Archives: October 2015

What’s information worth?

Are bond prices worth $5.2billion?

“ICE Makes Big Bet on Bond Data,” The Wall Street Journal, October 27, 2015 C1.  ICE pays that much for competitor of Bloomberg and Thomson Reuters.

Or was it the relationships that Interactive Data Corp. has?

Advertisements

Leave a comment

Filed under Information, Value

Sources and methods

Where does the information you rely on really come from?  Should you be concerned that your employees brought it with them from their prior employer?

“Fed Secrets Case May Result in Fine,” The Wall Street Journal, October 27, 2015 C3. Former employee of the New York Fed joins Goldman and then shares some of his former employer’s information with Goldman clients.  Likely  fine to Goldman: $50million.

The good news is that “[a] higher ranking executive” at Goldman reported the matter to Compliance.

Leave a comment

Filed under Access, Business Case, Compliance, Compliance, Controls, Duty, Employees, Governance, Information, Internal controls, Management, Ownership, Ownership, Risk, Use

Scary thoughts

Admiral Michael Rogers has an interesting view on information security.  He wonders when the bad guys will transition from just stealing information to changing the information.  The changes will cause even more disruption.

“It’s Only a Matter of Time,” The Wall Street Journal, October 27, 2015 R7.

What if someone chose to alter, rather than delete, your information?  How do you respond?

Leave a comment

Filed under Access, Board, Business Case, Governance, IT, Protect assets, Protect information assets, Reliance, Risk, Security

Big data does not equal big success

I don’t refer to editorials in The Wall Street Journal as source materials in this blog.  So I won’t refer to the one in yesterday’s paper about big data, which makes the point that big data can also be dumb.  http://www.wsj.com/articles/notable-quotable-big-data-blunt-instrument-1444087132

I will mention another article, “Big Data’s Promise, Peril,” The Wall Street Journal, October 6, 2015 B7.  How do you get some of the benefit of big data without having to incur all the costs?

Leave a comment

Filed under Analytics, Board, Information, Oversight, Protect information assets, Value

Reading the blank space

What does it say when something that should be there, isn’t there?

“Time Gap Found In Clinton Emails,” The Wall Street Journal, October 1, 2015 A1. The first two months of Secretary Clinton’s emails as Secretary of State aren’t there.

Rose Mary Woods was a secretary in another administration.  She was the reported source of the missing 18 minutes in the Nixon tapes of Watergate fame.

The technology changes, but the melody’s the same.

Leave a comment

Filed under Board, Compliance, Controls, Duty, Employees, Governance, Information, Internal controls, IT, Legal, Management, Oversight, Oversight, Protect, Protect assets, Protect information assets, Requirements, Security, Value

Another car problem

VW has been much in the news of late.  But remember the Pope being driven around in a Fiat on his US tour?

“Fiat Failed to Report Auto Deaths,” The Wall Street Journal, September 30, 2015 B1. Fiat accused of not reporting injuries and deaths, as required by law.  Regulators notified Fiat in July.

Accurate and complete information in reports to the government.  Is there a trend?  Is this within the jurisdiction of an agency of the US government?

Leave a comment

Filed under Board, Business Case, Compliance, Compliance, Compliance Verification, Content, Controls, Directors, Duty, Employees, Governance, Internal controls, Oversight, Oversight, Risk, Third parties

Another multi-million user data breach

“Scottrade Data Breach May Affect Millions of Users,” The Wall Street Journal, October 3-4, 2015 B12. The names and addresses of 4.6 million clients hacked, beginning in late 2013.  Scottrade notified by the Feds in late August, but was asked to keep quiet until now.

That’s better than J.P. Morgan Chase, which had a breach affecting as many as 76 million households.

How effectively are you protecting information about your clients?

Leave a comment

Filed under Board, Business Case, Collect, Controls, Definition, Directors, Duty, Information, Internal controls, IT, Management, Oversight, Privacy, Protect, Protect assets, Protect information assets, Risk, Security, Third parties