Dataprivacy map

Data Privacy Roadmap: Where We Are, Where We’re Headed, How We Can Get There

by James Arnold, Ron Parham, Colleen Milazzo | September 21, 2023 | Data & Cybersecurity

Since the introduction of the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), data privacy has become an essential aspect of Third Party Risk Management (TPRM). With constant changes in data privacy regulations, staying up-to-date with international and stat ....

TPRM Ransomware

Third Party Focused Ransomware Strategy: An Enterprise-Wide Collaborative Strategy Guide for TPRM Professionals

by Bob Jones | June 12, 2023 | Data & Cybersecurity

While excellent ransomware guides and tools exist from various sources, our new guide (Third Party Focused Ransomware Strategy: An Enterprise-Wide Collaborative Strategy Guide for TPRM Professionals) and the related resources referenced throughout provide a Third Party Risk Management focused appro ....

Identity Theft

Identity Theft Awareness: Who Are You?

by Sabine Zimmer | January 30, 2023 | Data & Cybersecurity, Data Protection, Privacy

Have you discovered who you truly are? Did you take the Myers-Briggs? Do you know your sign? Abilities, attributes, and astrology be darned - to an identity thief, you just represent a unique set of numbers and the opportunity to abscond with your Personally Identifiable Information (PII). Thank ....

data

My Data Lies Over the Ocean, My Data Lies Over the Sea

by Sabine Zimmer | October 31, 2022 | Data & Cybersecurity

Data zips across the Atlantic over submarine communications cables and pings across the sea to and from satellites at light speed. These transatlantic data flows are critical to the economic relationship between the United States and the European Union: The White House places a $7.1 trillion value ....

Penetration Testing1

Penetration Testing in Risk Management

by Marisa Sgambati | August 3, 2022 | Data & Cybersecurity

You wouldn’t leave your home without making sure the door was shut and locked behind you. You wouldn’t install an alarm system that doesn’t sound when a burglar enters. So, why would you not take the same precautions for your company? Consistently testing the effectiveness of application secur ....

Gramm Leach Bliley Act GLBA

Spotlight on the Gramm-Leach-Bliley Act (GLBA)

by Linnea Solem | July 5, 2022 | Data Protection, Public Policy

Last week Bob Maley, Chief Security Officer at Black Kite and I led a Fireside Chat discussion on the current regulatory landscape regarding privacy and security. While state laws continue to advance and there is momentum for a Federal U.S. Privacy Regulation, the update by the Federal Trade Commiss ....

Next Page »