Management, compliance & auditing July 30, 2018 Penny Hoelscher How to Protect User Data with the Privacy by Design Framework The Privacy by Design framework (PbD) was first introduced by Dr Ann Cavoukian, Information and Privacy Commissioner of Ontario, in the 1990s. PbD “… advances...
Management, compliance & auditing May 27, 2018 Dimitar Kostadinov A brief guide to GDPR compliance The European Union (EU) has a new data protection law – the General Data Protection Regulation (henceforth "the GDPR" or "the Regulation") will replace the...
Management, compliance & auditing May 27, 2018 Ravi Das (writer/revisions editor) 10 things employers need to know about workplace privacy laws In today's fast-paced business world, a lot of job-related duties can be done virtually, or either in a brick-and-mortar office. Employees can use their Smartphones,...
Management, compliance & auditing May 18, 2018 Jonathan Lampe Top 5 email retention policy best practices Email retention policies are no longer just about conserving space on your Exchange server. Today you must take into account how your email retention controls...
Management, compliance & auditing February 28, 2018 Dimitar Kostadinov Expert Interview: Security & IT Risk Management Best Practices There is a certain correlation between a risk and an issue. To put it in simple terms, an issue is the result of a risk being realized. Therefore, risk management...
Management, compliance & auditing February 28, 2018 Yassine Aboukir Understanding the Role of Threat Modeling in Risk Management The increasing number of new security threats, breaches and regulations that have taken place in the past years has moved the process of threat modeling from...
Management, compliance & auditing February 9, 2018 Ravi Das (writer/revisions editor) 5 Steps to Conducting an Enterprise Security Risk Analysis In the world of cybersecurity, identifying risks and how they will impact the organization is of paramount importance. In general terms, risk is comprised of...
Management, compliance & auditing February 8, 2018 Stephen Moramarco How to Break Into the Field of Security Risk Management A career in risk management takes place along the front lines of the ongoing cyber war. You must be logical, analytical and level-headed in order to lead the...
Management, compliance & auditing January 24, 2018 Claudio Dodt How to Become an Information Systems Security Auditor Cybercrime numbers never fail to impress. According to Ponemon’s 2017 Cost of Cyber Crime Study, the number of security breaches increased over 27% in 2017....
Management, compliance & auditing January 18, 2018 Kieran Sullivan A Step-by-Step Guide to Data Security Compliance by Industry Knowing what expertise is available and which standards are relevant to your sector are the first steps to ensure organizations are regulation compliant. In...