About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

What You Need to Know About the New SEC Security Breach Guidelines

In March 2022, the Securities Exchange Commission (SEC) outlined a new set of rules and amendments to try and further boost the financial sector’s security and strengthen defense against cyberattacks. The key aim of these proposals is to try and standardize the disclosure of cyberattack incidents to improve risk management and better inform investors across the whole sector.

Below you can find a closer look at the new guidelines and discover how these will affect the way you operate, your security obligations, and what you need to know to remain compliant with the SEC regulations.

The New SEC Guidelines

The new guidelines’ first element is all about cyberattack incident disclosure. It will require organizations to notify shareholders and the SEC in the event of a data breach or other unscheduled cyber event within four days of its occurrence. These new reporting guidelines will amend the existing Form 8-K. However, there is some confusion about what is and is not required to be disclosed.

A second proposal affects an organization’s requirements on Form 10-K, requiring them to include the responsibility for cybersecurity, as well as risk management and strategy, within the roles of the board of directors. Board members will also be required to disclose their cybersecurity experience, if applicable.

The first amendment around the disclosure of incidents has garnered the most attention, but the second could potentially have a more significant long-term impact. This places cybersecurity issues squarely at the board’s door, making it a vital part of any future business strategy. So, how do organizations go about complying with these new regulations?

What Organizations Need to Do

You need to have a cybersecurity incident response plan in place and make sure it is updated regularly. With just four business days to report any incident to the SEC, organizations need to be agile in their reporting, especially when most resources will be focused on minimizing the effects of the attack. It’s a good idea to trial run any incident response to measure response times.

Organizations should also try to develop straightforward internal reporting methods, offering staff training and clear language around reporting criteria so that everyone is invested, not just the relevant security officers. This is especially important now that board members are also required to be cyberattack literate.

Lastly, organizations need to ensure their security tools and applications, such as anti-malware software and encrypted email services, are up to date and effective. Don’t fall into the trap of assuming you are covered, even if you have invested in multiple controls. The only way to be sure your defenses are in place is to put them through rigorous and realistic testing. Unfortunately, many major security breaches happen in organizations where security tools are in place but fail to function as expected when required.

A Chance to Act

Rather than seeing these new guidelines as another burden or expense, you should instead view the new SEC proposals as an opportunity to further protect your business or organization. The threat of cyberattack is real and growing, and it is necessary that you do everything you can to address this before the worst happens.

Contact Information:

Name: Michael Bertini
Email: michael.bertini@iquanti.com
Job Title: Consultant

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.