Start the Conversation

Honeypot Field to Catch Bots
Honeypot Field to Catch Bots

Trust Center

Get details about DFIN’s security, privacy, compliance, resiliency, and the latest product security information.

Security Vault

Trust begins with transparency

Our mission is to build our products and services with security, privacy, compliance, and resiliency in mind. That’s why we created the Trust Center: to give you access to the latest information when you need it.

Security

  • Protect your data's integrity, availability, and confidentiality
  • Explore DFIN security products and services
  • Report a security issue
Learn more

Privacy

  • See how DFIN protects and respects individuals' privacy
  • View data protection guidelines
  • Explore global compliance data protection laws
Learn more

Compliance

  • Request compliance certificates
  • Global offerings (ISO/IEC, SOC, Bridge Letters, BSI, etc.)
  • Local and industry-specific certificates
Learn more

Security Matters

  • From the desk of the CISO
  • DFIN white papers
  • Knowledge Hub
  • Current threat landscape
Learn more

Compliance you can trust

Compliance brand - AICPA SOC Compliance brand - ISO 2700I Compliance brand - Cibersecurity Framework Compliance brand - GDPR

ActiveDisclosure

View our white paper detailing ActiveDisclosure's comprehensive security and privacy programs.

Learn more

Venue

View our white paper detailing Venue's comprehensive security and privacy programs.

Learn more

Arc Suite®

View our white paper detailing Arc Suite's comprehensive security and privacy programs.

Learn more
Phone expert Phone expert

We can provide additional information including our SOC 2 Type II report, once a Non-Disclosure Agreement is signed

Dannie Combs moderates at CNBC Technology Executive Council Summit

Dannie speaks with an executive panel to discuss the merger and integration of BB&T and SunTrust to form Truist Bank, how Truist turned to UiPath's Automation Cloud platform to build a digital workforce, automated over 150 processes, and tackled an unprecedented volume of fraudulent activity.

WHITE PAPER

How to secure today’s digital workplace

CISOs play a critical role in today's digital workplace, guiding executive leadership teams on how to align cybersecurity initiatives with business objectives.

Download white paper
CISO Whitepaper Handbook Cover
Dannie Combs - Chief Information Security Officer

From the desk of the CISO​

Led by Dannie Combs

CISO & CNBC Technology Executive Council Member
Security Icon

Security is integral to global operations

Our information security program is an integral part of our global operations. Over 10,000 businesses trust DFIN to safeguard their data. Our program is subject to annual independent audits for compliance and industry standards certifications, ensuring that our program not only meets but exceeds the most stringent of security requirements.

Security Icon

Data privacy is a top priority

Protecting our customer’s data privacy is a top priority. DFIN understands the importance of protecting the critical business and personal information entrusted to DFIN. We’re also committed to the General Data Protection Regulation (GDPR) compliance and have bolstered our already-strong data protection practices by evaluating and updating our company privacy policies and practices.

Security Icon

Meeting and exceeding compliance standards

DFIN is committed to achieving and maintaining the trust of our customers. Our data governance standards, policies, and procedures are informed by a full range of factors, including continuous monitoring of the security and privacy landscape to ensure our approach remains in step and complies with the latest state, federal, and international requirements.

Gain insights on responsible AI

Harnessing the Power of Responsible AI

Floyd Strimling, Chief Product Officer at DFIN, sits down with Dana Barrett to discuss responsible AI in financial reporting.

Floyd Strimling Podcast

Security matters

Our mission is to build our products and services with security, privacy, compliance, and resiliency in mind. That’s why we created the Trust Center: to give you access to the latest information when you need it.

DFIN leverages several technologies, processes, and procedures to ensure customer data remains secure. MFA (multi-factor authentication), data encryption in transit and at rest, EDR (Endpoint Detection and Response), antivirus and malware protection, robust access controls (based on least privileged access), and Network perimeter security to ensure comprehensive data protection for our clients.

DFIN leverages a Secure Software Development Life Cycle process (SSDLC) whereby security is incorporated into all stages of the software development life cycle. Static code analysis (SAST), Dynamic application scanning (DAST), continuous vulnerability scanning, secure software release management, software architecture reviews, and annual independent penetration testing contribute to DFIN's application security practice.

DFIN’s security team is made up of approximately 40 team members spread across several functional teams including Application Security, Cyber Threat Intelligence, Identity and Access Management, Security Architecture, Network Security, IT GRC (Governance, Risk, Compliance), Supply Chain Security, and Cyber Awareness and Advocacy, all under the leadership of our CISO, Dannie Combs. Additionally, DFIN partners with third-party security providers for 24x7 security monitoring and incident response.

Simply click the “Talk to an expert” button and we will be in touch!

DealMaker Cybersecurity Tablet
DFIN AND MORNING CONSULT RESEARCH

DealMaker Meter Cybersecurity Edition

69% of enterprise leaders say the risk outweighs the rewards of storing detailed data. Find out why and gain other valuable insights.

Download report

More findings, right this way

White Paper

Meeting the Data Demands of Looming ESG Disclosure Rules: Ten Takeaways

Read white paper

White Paper

Accurate and Trustworthy Financial Reporting Relies on Strong Internal Controls

Read white paper

Blog

Voluntary Submission of Draft Registration Statements

View blog

Fact Sheet

Smaller Reporting Companies Must Comply with the SEC's Cybersecurity Rules

View fact sheet

Blog

Understanding Governance, Risk, and Compliance

View blog

Blog

The Comprehensive SOX Compliance Guide

View blog

Video Podcast

Webinar Replay: An Early Look at the 2024 Proxy Season

Watch podcast

Case Study

How We Helped a Pharma Company Capitalize on IPO Market Conditions and Timing

How We Helped a Pharma Company Capitalize on IPO Market Conditions and Timing - Card
Read case study

White Paper

In 2024, Inline XBRL: Ignorance is Not Bliss

In 2024, Inline XBRL, Ignorance is Not Bliss - Card
Read white paper

Blog

Understanding Confidential IPO Filings

Understanding Confidential IPO Filings - Card
View blog

Blog

Navigating the IPO Process: A Detailed Timeline for Going Public

Navigating The IPO Process: A Detailed Timeline For Going Public - Card
View blog

Blog

Guidance for the Final SEC Climate Disclosure Ruling & ESG Reporting

Guidance For The Final SEC Climate Disclosure Ruling & ESG Reporting - Card
View blog

Case Study

How We Helped an Electric Vehicle Company Save Time and Money Before and After Going Public

How We Helped an Electric Vehicle Company Save Time and Money Before and After Going Public - Card
Read case study

Blog

DFIN Q1 Earnings: Software Growth Suggests a Recovery of M&A and IPO Activity May Be Underway

Craig Clay
View blog

Article

New Investment Company Names Rule Drives Refined Investment Focus

New Investment Company Names Rule Drives Refined Investment Focus - Card
Read article

Blog

SEC Steps Up March to Machine-Readable Formats

truzzolino
View blog

Blog

The SEC’s Climate Rules Are Paused, But Likely Not for Long.

Craig Clay
View blog

Blog

What is The European Single Electronic Format (ESEF)?

What is ESEF - Card
View blog

Resources

What is an SEC Form S-3 Filing?

SEC Form S-3 - Card
View resource

Article

Cloud Solutions for Efficient ACFR and Government Financial Reporting

Cloud Solutions for Efficient ACFR and Government Financial Reporting - Card
Read article