Management, compliance & auditing
 
    Management, compliance & auditing
Cybercrime numbers never fail to impress. According to Ponemon’s 2017 Cost of Cyber Crime Study, the number of security breaches increased over 27% in 2017.
 
                                January 24, 2018
Claudio Dodt 
    Management, compliance & auditing
Knowing what expertise is available and which standards are relevant to your sector are the first steps to ensure organizations are regulation compliant.
 
                                January 18, 2018
Kieran Sullivan 
    Management, compliance & auditing
Risk is inherent in any type of business endeavor whether you have a small or massive multinational business. When it comes to small- and medium-sized busine
 
                                January 17, 2018
Infosec 
    Management, compliance & auditing
Use this checklist to help you purchase the best cyber insurance policy for your company. Step 1. Determine if you need cyber insurance. Things to consider
 
                                January 16, 2018
Penny Hoelscher 
    Management, compliance & auditing
According to ISO 31000, the family of standards relating to risk management codified by the International Organization for Standardization, risks can be defi
 
                                January 12, 2018
Claudio Dodt 
    Management, compliance & auditing
Our supply chains are becoming ever more complex, not only in terms of the intricate web of suppliers and sub-suppliers, but also in the technologies used wi
 
                                January 11, 2018
Susan Morrow 
    Management, compliance & auditing
One of the most famous and largest cyberattacks of all time was the Target breach of 2013. The attack exposed the data records of more than 70 million people
 
                                January 10, 2018
Susan Morrow 
    Management, compliance & auditing
When it comes to risk planning and mitigation, it is important for you as an information security professional to understand the difference between a securit
 
                                January 09, 2018
Graeme Messina 
    Management, compliance & auditing
Understanding and complying with regulations provides companies with business opportunities and reduces risk. To many, information security looks to be go
 
                                January 08, 2018
Kieran Sullivan 
    Management, compliance & auditing
The General Data Protection Regulation (GDPR) is almost upon us. May 25th, 2018 is the auspicious day that begins the enactment of the regulation. In a surve
 
                                January 06, 2018
Susan MorrowIn this series
- The top security architect interview questions you need to know
- Top 10 cybersecurity best practices: Secure your organization’s data
- Is AI cybersecurity in your policies?
- Federal privacy and cybersecurity enforcement — an overview
- U.S. privacy and cybersecurity laws — an overview
- Common misperceptions about PCI DSS: Let’s dispel a few myths
- How PCI DSS acts as an (informal) insurance policy
- Keeping your team fresh: How to prevent employee burnout
- How foundations of U.S. law apply to information security
- Data protection Pandora's Box: Get privacy right the first time, or else
- Privacy dos and don'ts: Privacy policies and the right to transparency
- Starr McFarland talks privacy: 5 things to know about the new, online IAPP CIPT learning path
- Data protection vs. data privacy: What’s the difference?
- NIST 800-171: 6 things you need to know about this new learning path
- Working as a data privacy consultant: Cleaning up other people’s mess
- 6 ways that U.S. and EU data privacy laws differ
- Navigating local data privacy standards in a global world
- Building your FedRAMP certification and compliance team
- SOC 3 compliance: Everything your organization needs to know
- SOC 2 compliance: Everything your organization needs to know
- SOC 1 compliance: Everything your organization needs to know
- Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3
- How to comply with FCPA regulation – 5 Tips
- ISO 27001 framework: What it is and how to comply
- Why data classification is important for security
- Threat Modeling 101: Getting started with application security threat modeling [2021 update]
- VLAN network segmentation and security- chapter five [updated 2021]
- CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance
- IT auditing and controls – planning the IT audit [updated 2021]
- Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]
- Cyber threat analysis [updated 2021]
- Rapid threat model prototyping: Introduction and overview
- Commercial off-the-shelf IoT system solutions: A risk assessment
- A school district's guide for Education Law §2-d compliance
- IT auditing and controls: A look at application controls [updated 2021]
- 6 key elements of a threat model
- Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more
- Average IT manager salary in 2021
- Security vs. usability: Pros and cons of risk-based authentication
- Threat modeling: Technical walkthrough and tutorial
- Comparing endpoint security: EPP vs. EDR vs. XDR
- Role and purpose of threat modeling in software development
- 5 changes the CPRA makes to the CCPA that you need to know
- 6 benefits of cyber threat modeling
- What is threat modeling?
- First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?
- How to make cybersecurity budget cuts without sacrificing security
- How to mitigate security risk in international business environments
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- NY SHIELD Act: Security awareness and training requirements for New York businesses