Start the Conversation

Honeypot Field to Catch Bots
Honeypot Field to Catch Bots

Trust Center

Get details about DFIN’s security, privacy, compliance, resiliency, and the latest product security information.

Security Vault

Trust begins with transparency

Our mission is to build our products and services with security, privacy, compliance, and resiliency in mind. That’s why we created the Trust Center: to give you access to the latest information when you need it.

Security

  • Protect your data's integrity, availability, and confidentiality
  • Explore DFIN security products and services
  • Report a security issue
Learn more

Privacy

  • See how DFIN protects and respects individuals' privacy
  • View data protection guidelines
  • Explore global compliance data protection laws
Learn more

Compliance

  • Request compliance certificates
  • Global offerings (ISO/IEC, SOC, Bridge Letters, BSI, etc.)
  • Local and industry-specific certificates
Learn more

Security Matters

  • From the desk of the CISO
  • DFIN white papers
  • Knowledge Hub
  • Current threat landscape
Learn more

Compliance you can trust

Compliance brand - AICPA SOC Compliance brand - ISO 2700I Compliance brand - Cibersecurity Framework Compliance brand - GDPR

ActiveDisclosure

View our white paper detailing ActiveDisclosure's comprehensive security and privacy programs.

Learn more

Venue

View our white paper detailing Venue's comprehensive security and privacy programs.

Learn more

Arc Suite®

View our white paper detailing Arc Suite's comprehensive security and privacy programs.

Learn more
Phone expert Phone expert

We can provide additional information including our SOC 2 Type II report, once a Non-Disclosure Agreement is signed

Dannie Combs moderates at CNBC Technology Executive Council Summit

Dannie speaks with an executive panel to discuss the merger and integration of BB&T and SunTrust to form Truist Bank, how Truist turned to UiPath's Automation Cloud platform to build a digital workforce, automated over 150 processes, and tackled an unprecedented volume of fraudulent activity.

WHITE PAPER

How to secure today’s digital workplace

CISOs play a critical role in today's digital workplace, guiding executive leadership teams on how to align cybersecurity initiatives with business objectives.

Download white paper
CISO Whitepaper Handbook Cover
Dannie Combs - Chief Information Security Officer

From the desk of the CISO​

Led by Dannie Combs

CISO & CNBC Technology Executive Council Member
Security Icon

Security is integral to global operations

Our information security program is an integral part of our global operations. Over 10,000 businesses trust DFIN to safeguard their data. Our program is subject to annual independent audits for compliance and industry standards certifications, ensuring that our program not only meets but exceeds the most stringent of security requirements.

Security Icon

Data privacy is a top priority

Protecting our customer’s data privacy is a top priority. DFIN understands the importance of protecting the critical business and personal information entrusted to DFIN. We’re also committed to the General Data Protection Regulation (GDPR) compliance and have bolstered our already-strong data protection practices by evaluating and updating our company privacy policies and practices.

Security Icon

Meeting and exceeding compliance standards

DFIN is committed to achieving and maintaining the trust of our customers. Our data governance standards, policies, and procedures are informed by a full range of factors, including continuous monitoring of the security and privacy landscape to ensure our approach remains in step and complies with the latest state, federal, and international requirements.

Gain insights on responsible AI

Harnessing the Power of Responsible AI

Floyd Strimling, Chief Product Officer at DFIN, sits down with Dana Barrett to discuss responsible AI in financial reporting.

Floyd Strimling Podcast

Security matters

Our mission is to build our products and services with security, privacy, compliance, and resiliency in mind. That’s why we created the Trust Center: to give you access to the latest information when you need it.

DFIN leverages several technologies, processes, and procedures to ensure customer data remains secure. MFA (multi-factor authentication), data encryption in transit and at rest, EDR (Endpoint Detection and Response), antivirus and malware protection, robust access controls (based on least privileged access), and Network perimeter security to ensure comprehensive data protection for our clients.

DFIN leverages a Secure Software Development Life Cycle process (SSDLC) whereby security is incorporated into all stages of the software development life cycle. Static code analysis (SAST), Dynamic application scanning (DAST), continuous vulnerability scanning, secure software release management, software architecture reviews, and annual independent penetration testing contribute to DFIN's application security practice.

DFIN’s security team is made up of approximately 40 team members spread across several functional teams including Application Security, Cyber Threat Intelligence, Identity and Access Management, Security Architecture, Network Security, IT GRC (Governance, Risk, Compliance), Supply Chain Security, and Cyber Awareness and Advocacy, all under the leadership of our CISO, Dannie Combs. Additionally, DFIN partners with third-party security providers for 24x7 security monitoring and incident response.

Simply click the “Talk to an expert” button and we will be in touch!

DealMaker Cybersecurity Tablet
DFIN AND MORNING CONSULT RESEARCH

DealMaker Meter Cybersecurity Edition

69% of enterprise leaders say the risk outweighs the rewards of storing detailed data. Find out why and gain other valuable insights.

Download report

More findings, right this way

Article

Investment Companies 2025 Outlook

eric johnson
Read article

Calendar

2025 Investment Companies Regulatory Calendar

View calendar

Resources

How To Optimize the Investor Onboarding Process  

View resource

Resources

How to Create a Board Skills Matrix for Proxy Statements

View resource

Blog

DFIN's Software Success Continues in Third Quarter

Craig Clay
View blog

Case Study

How We Helped a Leading Enterprise Finance Management Company Streamline its IPO Process

Read case study

Resources

Optimizing Shareholder Communication & Engagement

View resource

Video Podcast

Webinar Replay: Navigating the New Cybersecurity Disclosure Landscape

Watch podcast

Blog

California’s Climate Disclosure Senate Bill 219 Signed into Law

Frank Kelley
View blog

Resources

AI In Financial Reporting

The Use of AI in Financial Reporting for Corporations - Card
View resource

Resources

M&A Industry Trends & Outlook 2025

Priya Shah
View resource

Case Study

How We Helped a Medical Technology Company Collaborate on Proxy Statements

Read case study

Case Study

How We Helped a Global Software Company Save Time & Money on SEC Filings and Statutory Reporting

Read case study

White Paper

How to Move From Voluntary to Regulated ESG Reporting - 3 Recommendations

Read white paper

Resources

Compensation Discussion and Analysis (CD&A) Guidelines

View resource

Resources

What Is a Proxy Statement?

View resource

Resources

Government Virtual Data Rooms: Secure, Compliant Solutions for Government Agencies

View resource

Blog

Transform Your Proxy Statement with Effective Design

schneider
View blog

Blog

EY Insights: Six Surprising Cyber-Attack Tactics

View blog

Case Study

How We Helped a Global Investment Bank Drive Secure Collaborations & Data Sharing Worldwide

Read case study