New EU AI Regulations: 4 Data Points

Algorithm

New EU AI Regulations: 4 Data Points

by Eric Krell | May 3, 2021 | Data & Cybersecurity

In his 2010 dystopian novel Super Sad True Love Story, Gary Shteyngart portrays a near-future in which “credit poles” on city sidewalks continually ping pedestrians with updates of their credit-score. All citizens also wear pendants equipped with by “RateMe Plus” technology, a crowd-sourcing ....

AI Risk

AI Risk: Advanced Technology Adoption Requires Stronger Data Governance

by Eric Krell | May 2, 2021 | Data & Cybersecurity

The risks and rewards of artificial intelligence (AI) and other advanced technologies were on vivid display in the Wall Street Journal’s April 22 print edition. It’s not too late for third party risk management (TPRM) teams to track down the issue given the growing importance that their data gov ....

spotlight data governance

Spotlight on Data Governance – Data Privacy and Third Party Risk in 2021

by Linnea Solem, Adam Stone | April 23, 2021 | Data & Cybersecurity

At this year’s annual Shared Assessments Program Summit, Program Advisory Board and Board Risk Committee Members Linnea Solem and Adam Stone led a Privacy Breakout session on critical privacy and data governance developments in 2021 and the components most critical to effective third party risk ma ....

IoT RIsks

What Slasher Movies and IoT Security Have in Common: 3 Chilling Realities about IoT Risk

by Charlie Miller | March 2, 2021 | Data & Cybersecurity, Internet of Things (IoT)

CIO Magazine recently distributed an email promoting its “FutureEdge 50 Awards” with a playfully sinister line: I know what you did last summer... in IT... during the pandemic. Now get rewarded for your work. The plug is a reference to the campy late-‘90s slasher flick. The award recognizes ....

vulnerability

Establishing a Third Party Vulnerability Campaign – Webinar Overview

by Sabine Zimmer | February 16, 2021 | Cybersecurity, Data & Cybersecurity

In the wake of the Solarwinds attack, Tom Garrubba, Vice President and CISO, Shared Assessments led an expert panel discussion on establishing third party vulnerability campaigns. Speakers included: Frank Roppelt - Senior Manager, Security Policy and Vendor Risk at TD Ameritrade Rocco Grillo ....

IoT Law

Is the New Federal IoT Law a Sign?

by Charlie Miller | February 12, 2021 | Data & Cybersecurity, Internet of Things (IoT)

During the three years it took for the IoT Cyber Security Improvement Act of 2020 to complete its legislative journey, more than 11.8 billion devices were connected to the Internet. That’s a decidedly conservative estimate of IoT device growth, one based on former Cisco Chief Futurist David Evans ....

Next Page »