Batten down the hatches. Fill the moat. Close the drawbridge. These are old concepts but relevant just the same in the digital age. With cybersecurity…
{
"data": {
"slug": "november-2017-special-report",
"title": "November 2017 Special Report",
"type": "issue",
"packageUrl": "",
"summary": "",
"cssFile": "november-2017-special-report.css",
"imageUrl": "//images.treasuryandrisk.com/treasuryandrisk/issue/2017/11/14/tr-special-report-23november-1.jpg",
"mediaUrl": "",
"blurb": "",
"articles": [
{
"uri": "/2017/11/14/six-steps-to-secure-your-treasury-risk-operations/",
"title": "Sponsored Content: Six Steps to Secure Your Treasury & Risk Operations",
"summary": "Batten down the hatches. Fill the moat. Close the drawbridge. These are old concepts but relevant just the same in the digital age. With cybersecurity…",
"byline": "Jerald Seti, VP Product Management, Openlink",
"kicker": "",
"tags": [],
"prettyDate": "November 14, 2017",
"wordcount": "591",
"timeToRead": "3 minute",
"readtime": "3",
"authors": [
{
"webUrl": "/author/profile/jerald-seti-vp-product-management-openlink/",
"name": "Jerald Seti, VP Product Management, Openlink"
}
],
"kickerNode": [],
"primaryCategory": {
"channelName": "",
"sectionName": "",
"uri": ""
},
"image": {
"uri": "",
"width": "",
"height": ""
}
},
{
"uri": "/2017/11/13/cybersecurity-best-practices-for-treasuries/",
"title": "Cybersecurity Best Practices for Treasuries",
"summary": "From two-factor authentication and segregation of duties to automated reconciliations",
"byline": "Susan Kelly",
"kicker": "Best Practices",
"tags": [],
"prettyDate": "November 13, 2017",
"wordcount": "708",
"timeToRead": "4 minute",
"readtime": "4",
"authors": [
{
"webUrl": "/author/profile/susan-kelly/",
"name": "Susan Kelly"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"primaryCategory": {
"channelName": "",
"sectionName": "",
"uri": ""
},
"image": {
"uri": "https://images.treasuryandrisk.com/contrib/content/uploads/sites/411/2017/11/novsr-main-image-200x248-01.jpg",
"width": "99",
"height": "59"
}
},
{
"uri": "/2017/11/14/third-parties-constitute-cybersecurity-gap/",
"title": "Third Parties Constitute Cybersecurity Gap",
"summary": "Almost a fifth of treasurers surveyed said their companies don't check suppliers' ID authentication methods.",
"byline": "Susan Kelly",
"kicker": "Best Practices",
"tags": [],
"prettyDate": "November 14, 2017",
"wordcount": "269",
"timeToRead": "2 minute",
"readtime": "2",
"authors": [
{
"webUrl": "/author/profile/susan-kelly/",
"name": "Susan Kelly"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"primaryCategory": {
"channelName": "",
"sectionName": "",
"uri": ""
},
"image": {
"uri": "",
"width": "",
"height": ""
}
},
{
"uri": "/2017/11/14/steeling-treasury-against-cyberthreats/",
"title": "Steeling Treasury Against Cyberthreats",
"summary": "As hackers rack up bigger heists, corporate treasurers need to step up their game against cybercrime.",
"byline": "Susan Kelly",
"kicker": "",
"tags": [],
"prettyDate": "November 14, 2017",
"wordcount": "3212",
"timeToRead": "17 minute",
"readtime": "17",
"authors": [
{
"webUrl": "/author/profile/susan-kelly/",
"name": "Susan Kelly"
}
],
"kickerNode": [],
"primaryCategory": {
"channelName": "",
"sectionName": "",
"uri": ""
},
"image": {
"uri": "https://images.treasuryandrisk.com/contrib/content/uploads/sites/411/2017/11/novsr-main-image-200x248-01.jpg",
"width": "99",
"height": "59"
}
}
],
"navigations": [],
"sponsors": []
}
}
T&R Express
Subscribe Today and Never Miss Another Story.
As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news and critical analysis you cannot afford to miss. Tailored just for you. In your inbox. Every day.