May has many holidays; Mothers Day, Memorial Day, Cinco de Mayo, Star Wars Day (May the fourth), and, of course, the new GDPR Day. Almost everyone is ready for the first four, but we continue to get calls from those GDPR procrastinators to help them prepare. With less than a month left to GDPR Day, what is a procrastinating business to do? Here are six ways to get started.
Continue reading this post…
I have previously written about the importance of a privacy program to in part, manage trust between an organization and its customers. As more data breaches occur and privacy is made more of an issue that is embraced and examined by the general public, this trust will become more important. One example of this is the evolving situation at Facebook.
So, you have a formal data breach response plan in place or an informal plan of action in mind….now what? With Alabama and South Dakota in a race to become the 49th state to enact data breach notification legislation (for sure, no one wants to be the “last man standing” in this scenario!), it may be a good time to review your plan. Continue reading this post…Posted on April 9, 2018 by Kelly Cheary - No Comments
The privacy landscape shifts, it seems, every week. The changes may come from new laws or regulations, changes in public opinion, expansion (or contraction) of your business, or the introduction of new technology to your infrastructure. Throughout this turmoil you need to have a privacy program that is resilient, adaptable, and agile so it can take the buffeting from these shifts while continuing to provide guidance to your organization. Continue reading this post…Posted on March 23, 2018 by Bob Siegel - No Comments
It’s that time of year again; time for the IAPP’s Global Privacy Summit. Yes, I pack up this weekend to head to Washington, DC for training, seminars and, of course, networking. Continue reading this post…Posted on March 17, 2018 by Bob Siegel - No Comments
On our last webinar (as of this writing) I discussed how a company can handle data subject’s rights requests under GDPR. Many of these requests are going to require attention, such as those ‘right to be forgotten’ requests. Others may seem daunting but can be handled easily and may not require any direct participation from your end. Continue reading this post…Posted on March 8, 2018 by Ben Siegel - No Comments
Security metrics are somewhat of an enigma. Executives want something tangible to speak to and analyze yet they are not easy to define or measure. Most likely you will hear examples such as ‘number of laptops stolen’ or ‘number of servers with known vulnerabilities’, but what do those numbers mean? Why do we or should we care about them? Yes, they will help to indicate areas of risk or improvement, possible ROI, but before you start the never-ending process of defining security metrics, it is beneficial to understand your organization’s security level of maturity by utilizing CMMI maturity levels.
Let me begin by saying that the following text is intentionally ridiculous. I want to illustrate a point recently made about the upcoming E-Privacy Regulation, specifically related to direct marketing.
Imagine one day, President Trump is in France for a summit to discuss some topic of relevance to the international community. He grabs a diet coke and heads over to his monitor to watch a stream of his favorite informative news on Fox & Friends. Little does he know that lying in wait for him is a piece of targeted marketing specifically aimed towards him.
by Keri LeBlanc, Marketing Director, CyberDenfenses, Inc.
Founded in 2001 by military cybersecurity veterans, CyberDefenses works closely with enterprise clients to provide battle-tested managed security services. If there is anything we’ve learned over the years, it’s that effectively protecting your organization’s critical data from increasingly capable and determined adversaries requires a combination of trained people, well-designed processes, and modern tools. That’s why CyberDefenses’ approach encompasses a full suite of services, training and advisory guidance.
If you are going to store, access, process and/or transmit any critical or sensitive information on behalf of your organization or a third party then cyber insurance may be recommended. Continue reading this post…Posted on February 9, 2018 by Jen Spencer - No Comments
April 16, 2018
September 19, 2018Continue reading this post...
August 27, 2018Continue reading this post...