{"id":67272,"date":"2009-10-22T16:10:20","date_gmt":"2009-10-22T08:10:20","guid":{"rendered":"http:\/\/www.i-sprint.com\/security-seminar-to-address-mas-trm-circular-for-insurance-industry-and-capital-markets\/"},"modified":"2023-04-28T16:19:12","modified_gmt":"2023-04-28T08:19:12","slug":"security-seminar-to-address-mas-trm-circular-for-insurance-industry-and-capital-markets","status":"publish","type":"post","link":"https:\/\/www.i-sprint.com\/ja\/security-seminar-to-address-mas-trm-circular-for-insurance-industry-and-capital-markets\/","title":{"rendered":"Security Seminar to address mas trm Circular for insurance industry and capital markets"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><h2 style=\"text-align: center;\"><strong>Security Seminar to address mas trm Circular for insurance industry and capital markets<\/strong><\/h2>\n<\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"400\" height=\"137\" alt=\"mas-min\" title=\"mas-min\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2009\/10\/mas-min.jpg\" class=\"img-responsive wp-image-67266\" srcset=\"https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2009\/10\/mas-min-200x69.jpg 200w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2009\/10\/mas-min.jpg 400w\" sizes=\"(max-width: 800px) 100vw, 400px\" loading=\"lazy\" \/><\/span><\/div><\/div><div class=\"fusion-text fusion-text-2\"><p>Venue: Ballroom 1, Amara Hotel Singapore, 165 Tanjong Pagar Road, Singapore 088539. MAS has sent out strong advisory for the adoption of sound control processes in managing technology risks and the implementation of security practices since 2001. Recently, regulatory guidelines have also been issued to review security practices in technology areas such as network and systems security, password protection, two factor authentication and data loss prevention for the insurance industry and capital markets. &lt; Circular No. SRD TR 02\/2009: Technology Risk Management Circular for Insurance and Capital market industries &gt; Any security breach today must now be disclosed. It can result in financial loss, massive loss of customer confidence and even imposition of punitive regulatory strictures by the authorities. Can we choose to ignore it?<\/p>\n<\/div><div class=\"fusion-image-carousel fusion-image-carousel-auto fusion-image-carousel-1 fusion-carousel-border\"><div class=\"awb-carousel awb-swiper awb-swiper-carousel\" data-autoplay=\"yes\" data-columns=\"2\" data-itemmargin=\"13\" data-itemwidth=\"180\" data-touchscroll=\"yes\" data-imagesize=\"auto\" style=\"--awb-columns:2;\"><div class=\"swiper-wrapper awb-image-carousel-wrapper fusion-flex-align-items-center\"><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img decoding=\"async\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/02\/MAS4-min-300x225.jpg\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img decoding=\"async\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/02\/MAS3-min-300x225.jpg\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img decoding=\"async\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/02\/MAS2-min-300x200.jpg\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-none\"><img decoding=\"async\" src=\"http:\/\/www.i-sprint.com\/wp-content\/uploads\/2017\/02\/MAS1-min-300x199.jpg\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><\/div><\/div><div class=\"awb-swiper-button awb-swiper-button-prev\"><i class=\"awb-icon-angle-left\" aria-hidden=\"true\"><\/i><\/div><div class=\"awb-swiper-button awb-swiper-button-next\"><i class=\"awb-icon-angle-right\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Recently, regulatory guidelines have also been issued to review security practices in technology areas such as network and systems security, password protection, two factor authentication and data loss prevention for the insurance industry and&#8230;&#8230;<\/p>\n","protected":false},"author":141,"featured_media":67266,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","footnotes":""},"categories":[174],"tags":[],"class_list":["post-67272","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ja-2"],"_links":{"self":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/67272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/comments?post=67272"}],"version-history":[{"count":3,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/67272\/revisions"}],"predecessor-version":[{"id":84376,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/67272\/revisions\/84376"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media\/67266"}],"wp:attachment":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media?parent=67272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/categories?post=67272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/tags?post=67272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}