Identity Theft

Identity Theft Awareness: Who Are You?

by Sabine Zimmer | January 30, 2023 | Data & Cybersecurity, Data Protection, Privacy

Have you discovered who you truly are? Did you take the Myers-Briggs? Do you know your sign? Abilities, attributes, and astrology be darned - to an identity thief, you just represent a unique set of numbers and the opportunity to abscond with your Personally Identifiable Information (PII). Thank ....

Gramm Leach Bliley Act GLBA

Spotlight on the Gramm-Leach-Bliley Act (GLBA)

by Linnea Solem | July 5, 2022 | Data Protection, Public Policy

Last week Bob Maley, Chief Security Officer at Black Kite and I led a Fireside Chat discussion on the current regulatory landscape regarding privacy and security. While state laws continue to advance and there is momentum for a Federal U.S. Privacy Regulation, the update by the Federal Trade Commiss ....

MicrosoftTeams image 1

Online Safety For Children

by Marisa Sgambati | June 8, 2022 | Cyber Risk, Cybersecurity, Data & Cybersecurity, Data Protection

Technology is all around us. Smartphones, smart watches, cars, computers, refrigerators, and cameras have become an enormous part of our everyday lives. These introductions have challenged us to constantly adapt. We are living in (and raising families in) an evolving technological society. As a p ....

Protecting Data Center Infrastructures

Protecting Data-Center Infrastructures

by Kristen Hicks | April 25, 2022 | Data & Cybersecurity, Data Protection

We tend to think of the internet as mostly existing in the ether or “cyberspace,” but the online systems we depend on are tied to physical structures. And the physical side of your technology brings its own set of risks. When considering risk and vulnerabilities, many companies think first of ....

Data Governance

Data Governance For Risk Management

by Vivian Nguyen | February 2, 2022 | Data, Data Protection

Regulations, industry standards, and business strategies continue to change, making Data Governance more challenging to implement, particularly with your third party vendors. Shared Assessments recently hosted a webinar on Data Governance for your TPRM program where Shared Assessments experts sha ....

Untitled 15

Workplace Safety, Security, and Data Governance

by John Bree, Alpa Inamdar | October 2, 2021 | Cybersecurity, Data & Cybersecurity, Data Protection

As I walk across the lobby after my commute to the city and use my ID card to activate the turnstile, I wave to the security team and head to the elevator. Arriving on my team floor, I once again use my ID card to enter the office. “Good morning, Sowmya.” “Hey, Jimmy.” “Hola, Soni ....

Next Page »