Management, compliance & auditing
 
    Management, compliance & auditing
In May of 2018, the European Union’s General Data Protection Regulation (GDPR) came into force. This wide-reaching law touches any company, no matter what si
 
                                September 22, 2018
Susan Morrow 
    Management, compliance & auditing
What is internal auditing? According to the Institute of Internal Auditors (IIA), internal auditing is: "An independent, objective assurance and consulting
 
                                August 31, 2018
Ifeanyi Egede 
    Management, compliance & auditing
In May of 2018, after a two-year grace period, the General Data Protection Regulation (GDPR) was finally activated. GDPR exists to ensure that every company
 
                                August 24, 2018
Claudio Dodt 
    Management, compliance & auditing
Higher education is not only a popular way to expand one's knowledge; it can also open doors to employment and other opportunities. This translates into mill
 
                                August 18, 2018
Greg Belding 
    Management, compliance & auditing
Many organizations are subject to regulations that enforce compliance to federal standards, such as HIPAA. This is because these organizations often operate
 
                                August 17, 2018
Greg Belding 
    Management, compliance & auditing
The Fair Credit Reporting Act, or FCRA, is a piece of legislation passed by Congress in 1970 to promote fairness, accuracy and privacy for information that c
 
                                August 02, 2018
Greg Belding 
    Management, compliance & auditing
The Gramm-Leach-Bliley Act is a U.S. federal law created to control how financial institutions deal with a consumer's non-public personal information (NPI).
 
                                August 02, 2018
Brian Hickey 
    Management, compliance & auditing
The Red Flags Rule, or RFR, is one of the identity protection rules found in the Federal Credit Reporting Act (FCRA). More specifically, RFR deals with prote
 
                                August 02, 2018
Greg Belding 
    Management, compliance & auditing
Protecting children online should be of paramount importance to all, especially in today's world. In response to this pressing issue, in 1998 Congress enacte
 
                                August 02, 2018
Greg Belding 
    Management, compliance & auditing
Ensuring data privacy is one of the biggest challenges organizations face. A quick look at the statistics related to personal data leaks in 2017 is more than
 
                                August 01, 2018
Claudio DodtIn this series
- The top security architect interview questions you need to know
- Top 10 cybersecurity best practices: Secure your organization’s data
- Is AI cybersecurity in your policies?
- Federal privacy and cybersecurity enforcement — an overview
- U.S. privacy and cybersecurity laws — an overview
- Common misperceptions about PCI DSS: Let’s dispel a few myths
- How PCI DSS acts as an (informal) insurance policy
- Keeping your team fresh: How to prevent employee burnout
- How foundations of U.S. law apply to information security
- Data protection Pandora's Box: Get privacy right the first time, or else
- Privacy dos and don'ts: Privacy policies and the right to transparency
- Starr McFarland talks privacy: 5 things to know about the new, online IAPP CIPT learning path
- Data protection vs. data privacy: What’s the difference?
- NIST 800-171: 6 things you need to know about this new learning path
- Working as a data privacy consultant: Cleaning up other people’s mess
- 6 ways that U.S. and EU data privacy laws differ
- Navigating local data privacy standards in a global world
- Building your FedRAMP certification and compliance team
- SOC 3 compliance: Everything your organization needs to know
- SOC 2 compliance: Everything your organization needs to know
- SOC 1 compliance: Everything your organization needs to know
- Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3
- How to comply with FCPA regulation – 5 Tips
- ISO 27001 framework: What it is and how to comply
- Why data classification is important for security
- Threat Modeling 101: Getting started with application security threat modeling [2021 update]
- VLAN network segmentation and security- chapter five [updated 2021]
- CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance
- IT auditing and controls – planning the IT audit [updated 2021]
- Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]
- Cyber threat analysis [updated 2021]
- Rapid threat model prototyping: Introduction and overview
- Commercial off-the-shelf IoT system solutions: A risk assessment
- A school district's guide for Education Law §2-d compliance
- IT auditing and controls: A look at application controls [updated 2021]
- 6 key elements of a threat model
- Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more
- Average IT manager salary in 2021
- Security vs. usability: Pros and cons of risk-based authentication
- Threat modeling: Technical walkthrough and tutorial
- Comparing endpoint security: EPP vs. EDR vs. XDR
- Role and purpose of threat modeling in software development
- 5 changes the CPRA makes to the CCPA that you need to know
- 6 benefits of cyber threat modeling
- What is threat modeling?
- First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?
- How to make cybersecurity budget cuts without sacrificing security
- How to mitigate security risk in international business environments
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- NY SHIELD Act: Security awareness and training requirements for New York businesses