Start the Conversation

Honeypot Field to Catch Bots
Honeypot Field to Catch Bots

Reporting on our compliance

DFIN establishes various controls to ensure the confidentiality, integrity and availability of client data. Cornerstones of DFIN cybersecurity are ensuring our security controls are operating effectively and measuring the effectiveness of governance, risk and compliance programs.

Icon 1

IT Governance and Risk

Learn about IT governance and risk @DFIN.

Icon 1

Reports and documents

Learn how DFIN demonstrates compliance throughout the enterprise. Request-up-to-date reports and other artifacts.

IT Governance and Risk

DFIN’s IT governance is comprised of processes by which we align our IT (development, infrastructure, cybersecurity) practices within our overall business strategy. As a key part of our overall IT governance efforts, we are able to ensure efficiency, security, and effective resource use, as well as compliance with both internal and external regulations.

Additionally, DFIN’s IT governance ensures that the needs of our stakeholders, including our clients, are evaluated to determine enterprise objectives, and are used to set direction (in decision making and prioritization) to monitor performance and compliance.

DFIN’s IT risk management program applies risk management methods to manage IT related threats. Our efforts involve procedures, polices and tools to identify, assess and remediate potential threats and vulnerabilities within DFIN’s information technology landscape. This includes both internal risk analysis as well as third party supplier risk (supply chain security).

Icon 1

IT Governance and Risk

Learn about IT governance and risk @DFIN.

IT Governance and Risk

DFIN’s IT governance is comprised of processes by which we align our IT (development, infrastructure, cybersecurity) practices within our overall business strategy. As a key part of our overall IT governance efforts, we are able to ensure efficiency, security, and effective resource use, as well as compliance with both internal and external regulations.

Additionally, DFIN’s IT governance ensures that the needs of our stakeholders, including our clients, are evaluated to determine enterprise objectives, and are used to set direction (in decision making and prioritization) to monitor performance and compliance.

DFIN’s IT risk management program applies risk management methods to manage IT related threats. Our efforts involve procedures, polices and tools to identify, assess and remediate potential threats and vulnerabilities within DFIN’s information technology landscape. This includes both internal risk analysis as well as third party supplier risk (supply chain security).

Icon 1

Reports and documents

Learn how DFIN demonstrates compliance throughout the enterprise. Request-up-to-date reports and other artifacts.

Reports and documents

DFIN’s GRC (Governance Risk and Compliance) team manages compliance activities across DFIN’s technology landscape to ensure our adherence with industry and governmental regulations. A large part of the GRC team’s efforts center around evaluation defining control frameworks and then evaluating and testing controls within those frameworks. Additionally, DFIN GRC’s Compliance team evaluates and tests our IT standards, policies and procedures via continuous assessment.

DFIN understands that compliance is critical to our clients’ needs and makes several different reports and assessments available for review.

We can provide additional information including our SOC 2 Type II report, once a Non-Disclosure Agreement is signed

Insider by Dfin

Our CISO, Dannie Combs, discusses security and regulatory compliance

Read the blog
Dannie Combs - Chief Information Security Officer

More findings, right this way

Case Study

Why a Multinational Company Returned to ActiveDisclosure for Financial Reporting

Read case study

Blog

NYC Tech Week Panel Explores a Hot Topic: the IPO Journey

Craig Clay
View blog

Resources

Handling Reverse Mergers & Shell Company Disclosures

View resource

Resources

What is a Proxy Solicitor?

View resource

White Paper

ArcSuite Product Security Overview

Read white paper

Resources

Best Practices for Virtual Shareholder Meetings

View resource

Resources

How to Address SEC Comment Letters

View resource

Resources

Venture Capital Investment Lifecycle & Funding Rounds

View resource

White Paper

How to Present Financial Reports to Leadership

Read white paper

Resources

Fairness Opinions in Mergers and Acquisitions

View resource

Resources

Tender Offers vs. Mergers: Key Differences & Considerations In M&A

View resource

Resources

The Impact of Tariffs on Accounting and Financial Reporting

View resource

White Paper

How to Think and Act Like a Public Company - Today

Read white paper

Article

Mastering AI for Financial Reporting

Read article

Blog

DFIN's Software Transformation Boosted by ActiveDisclosure's Strong Quarterly Results

Craig Clay
View blog

Guide

XBRL OEF Taxonomy Element and Definition Guide

View guide

White Paper

XBRL Digital Tagging for CSRD & ESRS: How Companies Can Meet the EU’s New Digital Reporting Requirements

Read white paper

Report

Building an Effective Creation Process for Your Proxy Statement

schneider
Read report

Blog

The M&A Market Was Expected to Rebound in 2025. Here’s a Reality Check.

Craig Clay
View blog

White Paper

M&A Heats Up: How Finance Leaders are Seizing New Opportunities in 2025

Read white paper