Management, compliance & auditing May 19, 2020 Susan Morrow Critical security concerns facing government If the government enforces regulations, then its various departments and functions must also comply with those same regulations. Major data security regulations...
Management, compliance & auditing May 12, 2020 Karen Walsh Security first: Compliance by design Whether it’s the General Data Protection Regulation (GDPR) or the New York Stop Hacks and Improve Electronic Data Security Act (NY SHIELD), nearly every...
Management, compliance & auditing February 12, 2020 Rodika Tollefson Considering cyber insurance? Here’s what you need to know Fueled by the growing number of data breaches, an expanding attack surface and a shortage of cybersecurity talent, cyber risk is a mounting concern for organizations...
Management, compliance & auditing February 10, 2020 Karen Walsh What companies need to know about proposed changes to the Gramm-Leach-Bliley Act Also called the Financial Modernization Act of 1999, GLBA governs the way in which financial institutions must prevent the disclosure of consumer nonpublic...
Management, compliance & auditing December 10, 2019 Shubham Vashist Secure process audit A secure process audit is a type of security audit in which the tester (auditor) tests the application or server or any network device where he or she captures...
Management, compliance & auditing November 25, 2019 Tyra Appleby Best practices to ensure your organization is focused on the right types of risk All organizations face some type of risk. Risks are determined by organization type, clients, workers, vendors and logistics, among many other potential factors....
Management, compliance & auditing September 7, 2019 Tom Olzak Chapter 6 – End-user device security [updated 2019] This is Chapter 6 in Tom Olzak's book, "Enterprise Security: A practitioner’s guide." Chapter 5 is available here: VLAN Network Segmentation and Security-...
Management, compliance & auditing September 3, 2019 Dan Virgillito Acceptable Use Policy (AUP) template for public WiFi networks [Updated 2019] Acceptable Use Policies (AUPs) are an essential component to all organizations, companies, and other establishments offering Internet or Intranet access. According...
Management, compliance & auditing July 23, 2019 Tyra Appleby Supply chain threats in 2019 and beyond Businesses do not act alone when providing services or products to their customers. They often have manufacturers, suppliers and distributors included in their...
Management, compliance & auditing July 3, 2019 Patrick Mallory How privacy laws have changed security auditor requirements At the outset of 2018, it was hard to predict what the year ahead would have in store for consumer privacy. Between revelations of user data-sharing relationships...