Facebook and Trust

I have previously written about the importance of a privacy program to in part, manage trust between an organization and its customers. As more data breaches occur and privacy is made more of an issue that is embraced and examined by the general public, this trust will become more important. One ...

Is Your Response Plan Responsive Enough?

So, you have a formal data breach response plan in place or an informal plan of action in mind….now what?  With Alabama and South Dakota in a race to become the 49th state to enact data breach notification legislation (for sure, no one wants to be the “last man standing” in this scenario!),...

Looking forward to the IAPP Global Privacy Summit

It’s that time of year again; time for the IAPP’s Global Privacy Summit. Yes, I pack up this weekend to head to Washington, DC for training, seminars and, of course, networking.

Do It Your Self Rights Requests

On our last webinar (as of this writing) I discussed how a company can handle data subject’s rights requests under GDPR. Many of these requests are going to require attention, such as those ‘right to be forgotten’ requests. Others may seem daunting but can be handled easily and may not require an...

Define Maturity Then Your Metrics

Security metrics are somewhat of an enigma.  Executives want something tangible to speak to and analyze yet they are not easy to define or measure.  Most likely you will hear examples such as ‘number of laptops stolen’ or ‘number of servers with known vulnerabilities’, but what do those num...

Trump, Oliver, and Objection

Let me begin by saying that the following text is intentionally ridiculous. I want to illustrate a point recently made about the upcoming E-Privacy Regulation, specifically related to direct marketing. Imagine one day, President Trump is in France for a summit to discuss some topic of relevance t...

Delivering Security and Privacy Designed for Today’s Threats

by Keri LeBlanc, Marketing Director, CyberDenfenses, Inc. Founded in 2001 by military cybersecurity veterans, CyberDefenses works closely with enterprise clients to provide battle-tested managed security services. If there is anything we’ve learned over the years, it’s that effectively protecting...

Do I need cyber insurance?

If you are going to store, access, process and/or transmit any critical or sensitive information on behalf of your organization or a third party then cyber insurance may be recommended.

GDPR, the right to erasure, and backups

As we work with clients to prepare them for GDPR we deeply dive into data subjects’ rights. When we cover the right to erasure, the same question comes up, “what about backups?”