Gramm Leach Bliley Act GLBA

Spotlight on the Gramm-Leach-Bliley Act (GLBA)

by Linnea Solem | July 5, 2022 | Data Protection, Public Policy

Last week Bob Maley, Chief Security Officer at Black Kite and I led a Fireside Chat discussion on the current regulatory landscape regarding privacy and security. While state laws continue to advance and there is momentum for a Federal U.S. Privacy Regulation, the update by the Federal Trade Commiss ....

MicrosoftTeams image 1

Online Safety For Children

by Marisa Sgambati | June 8, 2022 | Cyber Risk, Cybersecurity, Data & Cybersecurity, Data Protection

Technology is all around us. Smartphones, smart watches, cars, computers, refrigerators, and cameras have become an enormous part of our everyday lives. These introductions have challenged us to constantly adapt. We are living in (and raising families in) an evolving technological society. As a p ....

Protecting Data Center Infrastructures

Protecting Data-Center Infrastructures

by Kristen Hicks | April 25, 2022 | Data & Cybersecurity, Data Protection

We tend to think of the internet as mostly existing in the ether or “cyberspace,” but the online systems we depend on are tied to physical structures. And the physical side of your technology brings its own set of risks. When considering risk and vulnerabilities, many companies think first of ....

Data Governance

Data Governance For Risk Management

by Vivian Nguyen | February 2, 2022 | Data, Data Protection

Regulations, industry standards, and business strategies continue to change, making Data Governance more challenging to implement, particularly with your third party vendors. Shared Assessments recently hosted a webinar on Data Governance for your TPRM program where Shared Assessments experts sha ....

Untitled 15

Workplace Safety, Security, and Data Governance

by John Bree, Alpa Inamdar | October 2, 2021 | Cybersecurity, Data & Cybersecurity, Data Protection

As I walk across the lobby after my commute to the city and use my ID card to activate the turnstile, I wave to the security team and head to the elevator. Arriving on my team floor, I once again use my ID card to enter the office. “Good morning, Sowmya.” “Hey, Jimmy.” “Hola, Soni ....

data retention policy

Data Retention Policy – How To Catch And Release Data

by Nasser Fattah | September 22, 2021 | Big Data, Data & Cybersecurity, Data Protection

“In catch and release fishing, anglers immediately release native fish - unharmed - back to the waters from which they are caught,” says the National Parks Service. The Parks Service also recommends that anglers “learn the regulations.” Catch and release fishing successfully takes practice, ....

Next Page »